With the development of communication technologies for mobile devices and electronic communications, and went to the world of e-government, e-commerce and e-banking. It became necessary to control these activities from exposure to intrusion or misuse and to provide protection to them, so it's important to design powerful and efficient systems-do-this-purpose. It this paper it has been used several varieties of algorithm selection passive immune algorithm selection passive with real values, algorithm selection with passive detectors with a radius fixed, algorithm selection with passive detectors, variable- sized intrusion detection network type misuse where the algorithm generates a set of detectors to distinguish the self-samples. Practical Experiments showed the process to achieve a high rate of detection in the system designer using data NSL-KDD with 12 field without vulnerability to change the radius of the detector or change the number of reagents were obtained as the ratio between detection (0.984, 0.998, 0.999) and the ratio between a false alarm (0.003, 0.002, 0.001). Contrary to the results of experiments conducted on data NSL-KDD with 41 field contact, which affected the rate of detection by changing the radius and the number of the detector as it has been to get the proportion of uncovered between (0.44, 0.824, 0.992) and the percentage of false alarm between (0.5, 0.175, 0.003).
The introduction of Industry 4.0, to improve Internet of Things (IoT) standards, has sparked the creation of 5G, or highly sophisticated wireless networks. There are several barriers standing in the way of 5G green communication systems satisfying the expectations for faster networks, more user capacity, lower resource consumption, and cost‐effectiveness. 5G standards implementation would speed up data transmission and increase the reliability of connected devices for Industry 4.0 applications. The demand for intelligent healthcare systems has increased globally as a result of the introduction of the novel COVID‐19. Designing 5G communication systems presents research problems such as optimizing
The 17 α-ethinylestradiol (EE2) adsorption from aqueous solution was examined using a novel adsorbent made from rice husk powder coated with CuO nanoparticles (CRH). Advanced analyses of FTIR, XRD, SEM, and EDSwere used to identify the classification parameters of a CRH-like surface morphology, configuration, and functional groups. The rice husk was coated with CuO nanoparticles, allowing it to create large surface area materials with significantly improved textural qualities with regard to functional use and adsorption performance, according to a detailed characterization of the synthesized materials. The adsorption process was applied successfully with elimination effectiveness of 100% which can be kept up to 61.3%. The parameters of ads
... Show MoreThis study was carried out for direct detection of typhi and some of its multidrug resistance genes(tem,capt,gyrA&sul2)which encode for resistance to (Ampicillin, Chloramphenicol,Ciprofioxacin,Co-trimoxazole)by using Polymerase Chain Reaction technique .(71)blood samples for people suffering from typhoid fever symptoms depending on the clinical examination and (25)for control were collected. The results investigation for flic gene which encode for flagellin protein indicated that only (19)with percentage of (26,76%)gave appositive results while all control had a negative ones. Investigation for antibiotic resistance drug in samples which show positive results for flic gene showed that there is a multidrug for all antibiotics with (94.7
... Show MoreThis paper is focused on orthogonal function approximation technique FAT-based adaptive backstepping control of a geared DC motor coupled with a rotational mechanical component. It is assumed that all parameters of the actuator are unknown including the torque-current constant (i.e., unknown input coefficient) and hence a control system with three motor control modes is proposed: 1) motor torque control mode, 2) motor current control mode, and 3) motor voltage control mode. The proposed control algorithm is a powerful tool to control a dynamic system with an unknown input coefficient. Each uncertain parameter/term is represented by a linear combination of weighting and orthogonal basis function vectors. Chebyshev polynomial is used
... Show MoreA fast moving infrared excess source (G2) which is widely interpreted as a core-less gas and dust cloud approaches Sagittarius A* (Sgr A*) on a presumably elliptical orbit. VLT
In the field of civil engineering, the adoption and use of Falling Weight Deflectometers (FWDs) is seen as a response to the ever changing and technology-driven world. Specifically, FWDs refer to devices that aid in evaluating the physical properties of a pavement. This paper has assessed the concepts of data processing, storage, and analysis via FWDs. The device has been found to play an important role in enabling the operators and field practitioners to understand vertical deflection responses upon subjecting pavements to impulse loads. In turn, the resultant data and its analysis outcomes lead to the backcalculation of the state of stiffness, with initial analyses of the deflection bowl occurring in conjunction with the measured or assum
... Show MoreBackground: Generally, genetic disorders are a leading cause of spontaneous abortion, neonatal death, increased morbidity and mortality in children and adults as well. They a significant health care and psychosocial burden for the patient, the family, the healthcare system and the community as a whole. Chromosomal abnormalities occur much more frequently than is generally appreciated. It is estimated that approximately 1 of 200 newborn infants had some form of chromosomal abnormality. The figure is much higher in fetuses that do not survive to term. It is estimated that in 50% of first trimester abortions, the fetus has a chromosomal abnormality. Aim of the study: This study aims to shed some light on the results of chromosomal studies per
... Show MorePrediction of the formation of pore and fracture pressure before constructing a drilling wells program are a crucial since it helps to prevent several drilling operations issues including lost circulation, kick, pipe sticking, blowout, and other issues. IP (Interactive Petrophysics) software is used to calculate and measure pore and fracture pressure. Eaton method, Matthews and Kelly, Modified Eaton, and Barker and Wood equations are used to calculate fracture pressure, whereas only Eaton method is used to measure pore pressure. These approaches are based on log data obtained from six wells, three from the north dome; BUCN-52, BUCN-51, BUCN-43 and the other from the south dome; BUCS-49, BUCS-48, BUCS-47. Along with the overburden pressur
... Show MoreThe partial level density PLD of pre-equilibrium reactions that are described by Ericson’s formula has been studied using different formulae of single particle level density . The parameter was used from the equidistant spacing model (ESM) model and the non- equidistant spacing model (non-ESM) and another formula of are derived from the relation between and level density parameter . The formulae used to derive are the Roher formula, Egidy formula, Yukawa formula, and Thomas –Fermi formula. The partial level density results that depend on from the Thomas-Fermi formula show a good agreement with the experimental data.