Active worms have posed a major security threat to the Internet, and many research efforts have focused on them. This paper is interested in internet worm that spreads via TCP, which accounts for the majority of internet traffic. It presents an approach that use a hybrid solution between two detection algorithms: behavior base detection and signature base detection to have the features of each of them. The aim of this study is to have a good solution of detecting worm and stealthy worm with the feature of the speed. This proposal was designed in distributed collaborative scheme based on the small-world network model to effectively improve the system performance.
The investigation of signature validation is crucial to the field of personal authenticity. The biometrics-based system has been developed to support some information security features.Aperson’s signature, an essential biometric trait of a human being, can be used to verify their identification. In this study, a mechanism for automatically verifying signatures has been suggested. The offline properties of handwritten signatures are highlighted in this study which aims to verify the authenticity of handwritten signatures whether they are real or forged using computer-based machine learning techniques. The main goal of developing such systems is to verify people through the validity of their signatures. In this research, images of a group o
... Show MoreWith the high usage of computers and networks in the current time, the amount of security threats is increased. The study of intrusion detection systems (IDS) has received much attention throughout the computer science field. The main objective of this study is to examine the existing literature on various approaches for Intrusion Detection. This paper presents an overview of different intrusion detection systems and a detailed analysis of multiple techniques for these systems, including their advantages and disadvantages. These techniques include artificial neural networks, bio-inspired computing, evolutionary techniques, machine learning, and pattern recognition.
Abstract
The current research aims to examine the effectiveness of a training program for children with autism and their mothers based on the Picture Exchange Communication System to confront some basic disorders in a sample of children with autism. The study sample was (16) children with autism and their mothers in the different centers in Taif city and Tabuk city. The researcher used the quasi-experimental approach, in which two groups were employed: an experimental group and a control group. Children aged ranged from (6-9) years old. In addition, it was used the following tools: a list of estimation of basic disorders for a child with autism between (6-9) years, and a training program for children with autism
... Show MoreThe icon and the symbol represent the constituents of the communication process, through their intellectual and philosophical concepts that have been addressed by the current research that it has touched upon their importance in conveying the design idea for the recipient and showing the specificity of each one of them in the communication process. The research problem has been limited by the following question: what are the communication roles that the symbol and the icon present for the user in designing the industrial product?
The research objective is to reveal the theoretical visualization that describes the icon and the symbol in the industrial product and its importance in the communication process through stating the of simil
In this paper, tunable optical band-pass filters based on Polarization Maintaining Fiber –Mach Zehnder Interferometer presented. Tunability of the band-pass filter implemented by applying different mechanical forces N on the micro-cavities splicing regions (MCSRs). The micro-cavity formed by using three variable-lengths of single-mode polarization-maintaining fiber with (8, 16, 24) cm lengths, splice between two segments of (SMF-28) with (26, 13) cm lengths, using the fusion splicing technique. Ellipsoidal shape micro-cavities experimentally achieved parallel to the propagation axis having dimensions between (12-24) μm of width and (4-12) μm of length. A micro-cavity with width and length as high as 24 μm and 12 μ
... Show MoreCyber security is a term utilized for describing a collection of technologies, procedures, and practices that try protecting an online environment of a user or an organization. For medical images among most important and delicate data kinds in computer systems, the medical reasons require that all patient data, including images, be encrypted before being transferred over computer networks by healthcare companies. This paper presents a new direction of the encryption method research by encrypting the image based on the domain of the feature extracted to generate a key for the encryption process. The encryption process is started by applying edges detection. After dividing the bits of the edge image into (3×3) windows, the diffusions
... Show MoreAn enzyme linked immunosorbent assay (ELISA) for the detection and quantitation of human immunoglobulin G (IgG) antibodies against vero- cytotoxine (VT) producing Escherichia coli serogroup O157:H7 was produced. E. coli O157: H7 lipopolysaccharide was extracted from locally isolated strains by using hot phenol- water method, followed by partial purification using gel filtration chromatography by sepharose- 4B. The purity of the lipopolysaccharide was checked by measuring the protein and nucleic acid content and then used as antigen. Four isolates of vero- cytotoxin producing E. coli serogroup O157:H7 was obtained by culturing 350 stool samples from children suffering from bloody diarrhea. These isolates were identified on bacteriological, s
... Show MoreMany designs have been suggested for unipolar magnetic lenses based on changing the width of the inner bore and fixing the other geometrical parameters of the lens to improve the performance of unipolar magnetic lenses. The investigation of a study of each design included the calculation of its axial magnetic field the magnetization of the lens in addition to the magnetic flux density using the Finite Element Method (FEM) the Magnetic Electron Lenses Operation (MELOP) program version 1 at three different values of current density (6,4,2 A/mm2). As a result, the clearest values and behaviors were obtained at current density (2 A/mm2). it was found that the best magnetizing properties, the high
... Show MoreThis research involves design and simulation of GaussianFSK transmitter in UHF band using direct modulation of ΣΔ fractional-N synthesizer with the following specifications:
Frequency range (869.9– 900.4) MHz, data rate 150kbps, channel spacing (500 kHz), Switching time 1 µs, & phase noise @10 kHz = -85dBc.
New circuit techniques have been sought to allow increased integration of radio transmitters and receivers, along with new radio architectures that take advantage of such techniques. Characteristics such as low power operation, small size, and low cost have become the dominant design criteria by which these systems are judged.
A direct modulation by ΣΔ fractional-N synthesizer is proposed
... Show MoreThe aim of this research is to measure and analyze the gap between the actual reality and the requirements of the environmental management system in the middle refineries company/refinery cycle according to ISO14001: 2015, as well as to measure the availability of a clean production strategy and test the relationship and impact between the availability of the requirements of the standard and a clean production strategy for the actual reality in the company.
The research problem was determined by the extent to which the requirements of the environmental management system are applied according to ISO14001: 2015 in the middle refineries company? To what extent are the required clean production strategies ava
... Show More