With the development of communication technologies for mobile devices and electronic communications, and went to the world of e-government, e-commerce and e-banking. It became necessary to control these activities from exposure to intrusion or misuse and to provide protection to them, so it's important to design powerful and efficient systems-do-this-purpose. It this paper it has been used several varieties of algorithm selection passive immune algorithm selection passive with real values, algorithm selection with passive detectors with a radius fixed, algorithm selection with passive detectors, variable- sized intrusion detection network type misuse where the algorithm generates a set of detectors to distinguish the self-samples. Practical Experiments showed the process to achieve a high rate of detection in the system designer using data NSL-KDD with 12 field without vulnerability to change the radius of the detector or change the number of reagents were obtained as the ratio between detection (0.984, 0.998, 0.999) and the ratio between a false alarm (0.003, 0.002, 0.001). Contrary to the results of experiments conducted on data NSL-KDD with 41 field contact, which affected the rate of detection by changing the radius and the number of the detector as it has been to get the proportion of uncovered between (0.44, 0.824, 0.992) and the percentage of false alarm between (0.5, 0.175, 0.003).
In drilling processes, the rheological properties pointed to the nature of the run-off and the composition of the drilling mud. Drilling mud performance can be assessed for solving the problems of the hole cleaning, fluid management, and hydraulics controls. The rheology factors are typically termed through the following parameters: Yield Point (Yp) and Plastic Viscosity (μp). The relation of (YP/ μp) is used for measuring of levelling for flow. High YP/ μp percentages are responsible for well cuttings transportation through laminar flow. The adequate values of (YP/ μp) are between 0 to 1 for the rheological models which used in drilling. This is what appeared in most of the models that were used in this study. The pressure loss
... Show MoreThe matter of handwritten text recognition is as yet a major challenge to mainstream researchers. A few ways deal with this challenge have been endeavored in the most recent years, for the most part concentrating on the English pre-printed or handwritten characters space. Consequently, the need to effort a research concerning to Arabic texts handwritten recognition. The Arabic handwriting presents unique technical difficulties because it is cursive, right to left in writing and the letters convert its shapes and structures when it is putted at initial, middle, isolation or at the end of words. In this study, the Arabic text recognition is developed and designed to recognize image of Arabic text/characters. The proposed model gets a single l
... Show MoreLet M be a n-dimensional manifold. A C1- map f : M M is called transversal if for all m N the graph of fm intersect transversally the diagonal of MM at each point (x,x) such that x is fixed point of fm. We study the minimal set of periods of f(M per (f)), where M has the same homology of the complex projective space and the real projective space. For maps of degree one we study the more general case of (M per (f)) for the class of continuous self-maps, where M has the same homology of the n-dimensional sphere.
In this paper, the Normality set will be investigated. Then, the study highlights some concepts properties and important results. In addition, it will prove that every operator with normality set has non trivial invariant subspace of .
Relation on a set is a simple mathematical model to which many real-life data can be connected. A binary relation on a set can always be represented by a digraph. Topology on a set can be generated by binary relations on the set . In this direction, the study will consider different classical categories of topological spaces whose topology is defined by the binary relations adjacency and reachability on the vertex set of a directed graph. This paper analyses some properties of these topologies and studies the properties of closure and interior of the vertex set of subgraphs of a digraph. Further, some applications of topology generated by digraphs in the study of biological systems are cited.
One of the recent significant but challenging research studies in computational biology and bioinformatics is to unveil protein complexes from protein-protein interaction networks (PPINs). However, the development of a reliable algorithm to detect more complexes with high quality is still ongoing in many studies. The main contribution of this paper is to improve the effectiveness of the well-known modularity density ( ) model when used as a single objective optimization function in the framework of the canonical evolutionary algorithm (EA). To this end, the design of the EA is modified with a gene ontology-based mutation operator, where the aim is to make a positive collaboration between the modularity density model and the proposed
... Show Morehe development of multidrug resistance in Gram-negative bacteria is a major problem faced antimicrobial therapy and management of infectious diseases. Too many resistance mechanisms were developed since the antimicrobial agents were produced and actually used. The mechanisms involved in antimicrobial agents' resistance are, modifying enzymes, alteration of the target site of antimicrobials and prevention of antimicrobials accumulation inside the bacterial cells. The latest is accomplished by two mechanisms: alteration of outer membrane permeability and efflux pumps. Efflux pumps are either chromosomal or plasmid-encoded although chromosomal encoded efflux pumps are common in Gram-negative bacteria. Resistance nodulation division (RND) efflu
... Show MoreOrthodontic treatment is an inclusive treatment that includes growth adjustment of the craniofacial area and alveolar bone reconstruction that affects the movement of teeth. Apply orthodontic forces to correct teeth anomaly via alveolar bone remodeling includes a combination of cellular and molecular events in the gum. Orthodontic tooth movement is based on force induced periodontal ligament and alveolar bone remodeling. Mechanical motivation on a tooth causes an inflamed response in the gum tissue. Inflammatory immune markers stimulate the biological processes associated with alveolar bone resorption. The aim of this article is shedding light on the significance role inflammatory immune response in orthodontic treatment.
Several directional wells have been drilled in Majnoon oilfield at wide variation in drilling time due to different drilling parameters applied for each well. This technical paper shows the importance of proper selection of the bit, Mud type, applied weight on Bit (WOB), Revolution per minute (RPM), and flow rate based on the previous wells drilled. Utilizing the data during drilling each section for directional wells that's significantly could improve drilling efficiency presented at a high rate of penetration (ROP). Based on the extensive study of three directional wells of 35 degree inclination (MJ-51, MJ-52, and MJ-54) found that the applied drilling parameters for MJ-54 and the bit type within associated drilling parameters to drill
... Show More