Active worms have posed a major security threat to the Internet, and many research efforts have focused on them. This paper is interested in internet worm that spreads via TCP, which accounts for the majority of internet traffic. It presents an approach that use a hybrid solution between two detection algorithms: behavior base detection and signature base detection to have the features of each of them. The aim of this study is to have a good solution of detecting worm and stealthy worm with the feature of the speed. This proposal was designed in distributed collaborative scheme based on the small-world network model to effectively improve the system performance.
Design sampling plan was and still one of most importance subjects because it give lowest cost comparing with others, time live statistical distribution should be known to give best estimators for parameters of sampling plan and get best sampling plan.
Research dell with design sampling plan when live time distribution follow Logistic distribution with () as location and shape parameters, using these information can help us getting (number of groups, sample size) associated with reject or accept the Lot
Experimental results for simulated data shows the least number of groups and sample size needs to reject or accept the Lot with certain probability of
... Show MoreMicrobial activity of Ellagic acid when mixed with some types of candy toward Streptococcus mutans microorganism was studied. The main purpose of carrying out this study is to produce a new type of candy that contains Ellagic acid in addition to xylitol instead of sucrose to prevent dental caries. The results show that the inhibitory action of Ellagic acid was more effective when mixed with this type of candy for the purpose of reducing Streptococcus mutans microorganisms, while sensory evaluation was applied in this study to 20 volunteers to that candy sample evaluated which contain (5 mg/ml) Ellagic acid with 100g xylitol to determine consumers acceptability of this sample of candy. The results were expressed as mean value, slandered d
... Show MoreIn this work, the design and implementation of a smart energy metering system has been developed. This system consists of two parts: billing center and a set of distributed smart energy meters. The function of smart energy meter is measuring and calculating the cost of consumed energy according to a multi-tariff scheme. This can be effectively solving the problem of stressing the electrical grid and rising consumer awareness. Moreover, smart energy meter decreases technical losses by improving power factor. The function of the billing center is to issue a consumer bill and contributes in locating the irregularities on the electrical grid (non-technical losses). Moreover, it sends the switch off command in case of the consumer bill is not
... Show MoreSecurity reflects a permanent and complex movement that complies with international and societal needs and developments in all its dimensions, interactions and levels. To constitute a universal demand for all States, communities and individuals. The question of security is one of the most important motivations and motivations that govern the behavior, and even the objectives of those societies and States. These groups or individuals have always sought to avoid fear and harm, and to provide stability, safety and security. In the light of this, security studies have been among the important fields of study in the field of international and strategic relations. The field witnessed many theoretical efforts, from the traditional perspective,
... Show MoreThe emergence of the Internet and its transformation in the early nineties of the last century led to a means of mass communication that brought about significant structural changes in the media map.
Over the course of historical development, the public did not engage the media in its behavior in the implementation and dissemination of an idea, generalization or theory put forward by media experts or practitioners through these means to do it. Blogs represent the most important service provided by the Internet in recent years which has gained special importance in the media field. Where the word “Blogs” has several names: (alternative media), (blogging press), (popular press) and other names.
The medi
... Show MoreThe matter of handwritten text recognition is as yet a major challenge to mainstream researchers. A few ways deal with this challenge have been endeavored in the most recent years, for the most part concentrating on the English pre-printed or handwritten characters space. Consequently, the need to effort a research concerning to Arabic texts handwritten recognition. The Arabic handwriting presents unique technical difficulties because it is cursive, right to left in writing and the letters convert its shapes and structures when it is putted at initial, middle, isolation or at the end of words. In this study, the Arabic text recognition is developed and designed to recognize image of Arabic text/characters. The proposed model gets a single l
... Show MoreThe evolution in the field of Artificial Intelligent (AI) with its training algorithms make AI very important in different aspect of the life. The prediction problem of behavior of dynamical control system is one of the most important issue that the AI can be employed to solve it. In this paper, a Convolutional Multi-Spike Neural Network (CMSNN) is proposed as smart system to predict the response of nonlinear dynamical systems. The proposed structure mixed the advantages of Convolutional Neural Network (CNN) with Multi -Spike Neural Network (MSNN) to generate the smart structure. The CMSNN has the capability of training weights based on a proposed training algorithm. The simulation results demonstrated that the proposed
... Show More