Active worms have posed a major security threat to the Internet, and many research efforts have focused on them. This paper is interested in internet worm that spreads via TCP, which accounts for the majority of internet traffic. It presents an approach that use a hybrid solution between two detection algorithms: behavior base detection and signature base detection to have the features of each of them. The aim of this study is to have a good solution of detecting worm and stealthy worm with the feature of the speed. This proposal was designed in distributed collaborative scheme based on the small-world network model to effectively improve the system performance.
Face Detection by skin color in the field of computer vision is a difficult challenge. Detection of human skin focuses on the identification of pixels and skin-colored areas of a given picture. Since skin colors are invariant in orientation and size and rapid to process, they are used in the identification of human skin. In addition features like ethnicity, sensor, optics and lighting conditions that are different are sensitive factors for the relationship between surface colors and lighting (an issue that is strongly related to color stability). This paper presents a new technique for face detection based on human skin. Three methods of Probability Density Function (PDF) were applied to detect the face by skin color; these ar
... Show MoreRemote sensing and GIS applications (Geoinformatics tools) involve a wide range of techniques for providing a solution for future water resources management and offer an excellent means to improve knowledge of sustainable planning. Al-Razzaza is the second largest lake in Iraq; it is a common source of fishery fortune and floodwater reservoir in southwestern Iraq. In recent years, the lake faced a noticeable amount of desiccation, which is considered a threat to the biodiversity and wildlife of the lake. The study aimed to detect the Lake's spatiotemporal changes from 1988 to 2018. Multi satellite-derived indices were investigated for the extracting of the lake water body. Results showed that the lake volume decrea
... Show MoreThe presence of natural voids and fractures (weak zones) in subsurface gypsiferous soil and gypsum, within the University of Al-Anbar, western Iraq. It causes a harsher problem for civil engineering projects. Electrical resistivity technique is applied as an economic decipher for investigation underground weak zones. The inverse models of the Dipole-dipole and Pole-dipole arrays with aspacing of 2 m and an n-factor of 6 clearly show that the resistivity contrast between the anomalous part of the weak zone and the background. The maximum thickness and shape are well defined from 2D imaging with Dipole-dipole array, the maximum thickness ranges between 9.5 to 11.5 m. It is concluded that the 2D imaging survey is a useful technique and more
... Show MoreIn this research a proposed technique is used to enhance the frame difference technique performance for extracting moving objects in video file. One of the most effective factors in performance dropping is noise existence, which may cause incorrect moving objects identification. Therefore it was necessary to find a way to diminish this noise effect. Traditional Average and Median spatial filters can be used to handle such situations. But here in this work the focus is on utilizing spectral domain through using Fourier and Wavelet transformations in order to decrease this noise effect. Experiments and statistical features (Entropy, Standard deviation) proved that these transformations can stand to overcome such problems in an elegant way.
... Show MoreThe aim of this paper is to determine the effect of internal marketing through three dimensions: vision, development, and reward - on organizational citizenship behavior in three private universities in Iraq. Organizations’ view of their members as internal customers could be made them more realistic in dealing with the reasons for leaving and going to other organizations. This can promote business organizations to build an organizational environment that contributes to making the organization look like the homeland of those workers. The research method is descriptive and analytical. The tool for data collection was the questionnaire. Statistical software (SPSS V.23 and AMOS V.23) was used to analyze the data. The research sample was r
... Show MoreThis research involves studying the mechanical properties and corrosion behavior of “low carbon steel” (0.077wt% C) before and after welding using Arc, MIG and TIG welding. The mechanical properties include testing of microhardness, tensile strength, the results indicate that microhardness of TIG, MIG welding is more than arc welding, while tensile strength in arc welding more than TIG and MIG.
The corrosion behavior of low carbon weldments was performed by potentiostat at scan rate 3mV.sec-1 in 3.5% NaCl to show the polarization resistance and calculate the corrosion rate from data of linear polarization by “Tafel extrapolation method”. The results indicate that the TIG welding increase the corrosion current d
... Show MoreEnsuring reliable data transmission in Network on Chip (NoC) is one of the most challenging tasks, especially in noisy environments. As crosstalk, interference, and radiation were increased with manufacturers' increasing tendency to reduce the area, increase the frequencies, and reduce the voltages. So many Error Control Codes (ECC) were proposed with different error detection and correction capacities and various degrees of complexity. Code with Crosstalk Avoidance and Error Correction (CCAEC) for network-on-chip interconnects uses simple parity check bits as the main technique to get high error correction capacity. Per this work, this coding scheme corrects up to 12 random errors, representing a high correction capac
... Show MoreInternet technology has revolutionized the landscape of communication technologies in the modern era. However, because the internet is open to the public, communication security cannot be guaranteed. As a result, data concealment approaches have been developed to ensure confidential information sharing. Various methods have emerged to achieve the goal of secure data communication via multimedia documents. This study proposes a method, which is both adaptable and imperceptible, for concealing a secret text in a color image. From an adaptivity perspective, image corners are detected using the Harris corner detection algorithm and utilized as anchor points for picking the optimal hiding regions of interest using Bezier curve interp
... Show MoreBackground: Nowadays, the environmentally friendly procedures must be developed to avoid using harmful compounds in synthesis methods. Their increase interest in creating and researching silver nanoparticles (AgNPs) because of their numerous applications in many fields especially medical fields such as burn, wound healing, dental and bone implants, antibacterial, viral, fungal, and arthropodal activities. Biosynthesis of nanoparticles mediated pigments have been widely used as antimicrobial agent against microorganisms. Silver nanoparticles had synthesized by using melanin from locally isolate Pseudomonas aeruginosa, and used as antimicrobial activity against pathogenic microorganisms. Aim of the study: Isolation of Pseudomonas aeruginosa
... Show MoreThe aim of the study was to find out the correlations and impact between the variable of ethical leadership behavior and university performance at Sumer University. Use the descriptive analytical method by adopting the questionnaire tool to collect data. The questionnaire was distributed electronically to 113 teachers at Sumer University and the response was from 105 teachers. The research results showed that there is a correlation and effect relationship between the search variables. In addition, the responding university does not have ethically defined standards in terms of performance of the work of the cadres working there. Finally, the research presented a set of recommendations aimed at tackling problems in the ethical lead
... Show More