Active worms have posed a major security threat to the Internet, and many research efforts have focused on them. This paper is interested in internet worm that spreads via TCP, which accounts for the majority of internet traffic. It presents an approach that use a hybrid solution between two detection algorithms: behavior base detection and signature base detection to have the features of each of them. The aim of this study is to have a good solution of detecting worm and stealthy worm with the feature of the speed. This proposal was designed in distributed collaborative scheme based on the small-world network model to effectively improve the system performance.
Due to the significant role in understanding cellular processes, the decomposition of Protein-Protein Interaction (PPI) networks into essential building blocks, or complexes, has received much attention for functional bioinformatics research in recent years. One of the well-known bi-clustering descriptors for identifying communities and complexes in complex networks, such as PPI networks, is modularity function. The contribution of this paper is to introduce heuristic optimization models that can collaborate with the modularity function to improve its detection ability. The definitions of the formulated heuristics are based on nodes and different levels of their neighbor properties. The modulari
... Show MoreThe gravity and magnetic data of Tikrit-Kirkuk area in central Iraq were considered to study the tectonic situation in the area. The residual anomalies were separated from regional using space windows method with space of about 24, 12 and 10km to delineate the source level of the residual anomalies. The Total Horizontal Derivative (THD) is used to identify the fault trends in the basement and sedimentary rocks depending upon gravity and magnetic data. The identified faults in the study area show (NW-SE), less common (NE-SW) and rare (N-S) trends. Some of these faults extending from the basement to the upper most layer of the sedimentary rocks. It was found that the depth of some gravity and magnetic source range 12-13Km, which confirm th
... Show MoreGravity and magnetic data are used to study the tectonic situation of Kut- Dewania- Fajir and surrounding areas in central Iraq. The study includes the using of window method with different spacing to separate the residual from regional anomalies of gravity and magnetic data. The Total Horizontal Derivative (THD) techniques used to identify the fault trends in the basement and sedimentary rocks depending upon gravity and magnetic data. The obtained faults trends from gravity data are (N30W), (N60W) (N80E) and (N20E) and from magnetic data are (N30W), (N70E), (N20E),(N10W),(N40E). It is believed that these faults extend from the basement to the lower layers of the sedimentary rocks except the N60W trend that observed clearly in gravity in
... Show MoreThis work, introduces some concepts in bitopological spaces, which are nm-j-ω-converges to a subset, nm-j-ω-directed toward a set, nm-j-ω-closed mappings, nm-j-ω-rigid set, and nm-j-ω-continuous mappings. The mainline idea in this paper is nm-j-ω-perfect mappings in bitopological spaces such that n = 1,2 and m =1,2 n ≠ m. Characterizations concerning these concepts and several theorems are studied, where j = q , δ, a , pre, b, b.
A large amount of thermal energy is generated from burning hazardous chemical wastes, and the temperature of the flue gases in hazardous waste incinerators reaches up to (1200 °C). The flue gases are cooled to (40°C) and are treated before emission. This thermal energy can be utilized to produce electrical power by designing a system suitable for dangerous flue gases in the future depending on the results of much research about using a proto-type small steam power plant that uses safe fuel to study and develop the electricity generation process with water tube boiler which is manufactured experimentally with theoretical development for some of its parts which are inefficient in experimental work. The studied system gen
... Show MoreThe present study explores numerically the energy storage and energy regeneration during Melting and Solidification processes in Phase Change Materials (PCM) used in Latent Heat Thermal Energy Storage (LHTES) systems. Transient two-dimensional (2-D) conduction heat transfer equations with phase change have been solved utilizing the Explicit Finite Difference Method (FDM) and Grid Generation technique. A Fortran computer program was built to solve the problem. The study included four different Paraffin's. The effects of container geometrical shape, which included cylindrical and square sections of the same volume and heat transfer area, the container volume or mass of PCM, variation of mass flow rate of heat transfer fluid (HTF), and temp
... Show MoreABSTRACT this paper extends the literature on the elements and effect of financial literacy by investigating the elements of financial literacy and the impact of financial literacy on financial inclusion and savings. This research confirms the results of researches of other economies but exposes some dissimilarities as well. The principal factors of financial literacy are discovered to be government efficiency, educational level, income, economic performance and infrastructure. Both education levels and financial literacy are found to be meaningfully and positively linked to financial inclusion and savings in G20 economies
The inefficient use of spectrum is the key subject to overcome the upcoming spectrum crunch issue. This paper presents a study of performance of cooperative cognitive network via hard combining of decision fusion schemes. Simulation results presented different cooperative hard decision fusion schemes for cognitive network. The hard-decision fusion schemes provided different discriminations for detection levels. They also produced small values of Miss-Detection Probability at different values of Probability of False Alarm and adaptive threshold levels. The sensing performance was investigated under the influence of channel condition for proper operating conditions. An increase in the detection performance was achi
... Show MoreMost recent studies have focused on using modern intelligent techniques spatially, such as those
developed in the Intruder Detection Module (IDS). Such techniques have been built based on modern
artificial intelligence-based modules. Those modules act like a human brain. Thus, they should have had the
ability to learn and recognize what they had learned. The importance of developing such systems came after
the requests of customers and establishments to preserve their properties and avoid intruders’ damage. This
would be provided by an intelligent module that ensures the correct alarm. Thus, an interior visual intruder
detection module depending on Multi-Connect Architecture Associative Memory (MCA)