With the development of communication technologies for mobile devices and electronic communications, and went to the world of e-government, e-commerce and e-banking. It became necessary to control these activities from exposure to intrusion or misuse and to provide protection to them, so it's important to design powerful and efficient systems-do-this-purpose. It this paper it has been used several varieties of algorithm selection passive immune algorithm selection passive with real values, algorithm selection with passive detectors with a radius fixed, algorithm selection with passive detectors, variable- sized intrusion detection network type misuse where the algorithm generates a set of detectors to distinguish the self-samples. Practical Experiments showed the process to achieve a high rate of detection in the system designer using data NSL-KDD with 12 field without vulnerability to change the radius of the detector or change the number of reagents were obtained as the ratio between detection (0.984, 0.998, 0.999) and the ratio between a false alarm (0.003, 0.002, 0.001). Contrary to the results of experiments conducted on data NSL-KDD with 41 field contact, which affected the rate of detection by changing the radius and the number of the detector as it has been to get the proportion of uncovered between (0.44, 0.824, 0.992) and the percentage of false alarm between (0.5, 0.175, 0.003).
The theoretical analysis depends on the Classical Laminated Plate Theory (CLPT) that is based on the Von-K ráman Theory and Kirchhov Hypothesis in the deflection analysis during elastic limit as well as the Hooke's laws of calculation the stresses. New function for boundary condition is used to solve the forth degree of differential equations which depends on variety sources of advanced engineering mathematics. The behavior of composite laminated plates, symmetric and anti-symmetric of cross-ply angle, under out-of-plane loads (uniform distributed loads) with two different boundary conditions are investigated to obtain the central deflection for mid-plane by using the Ritz method. The computer programs is built using Ma
... Show MoreThe present study focused mainly on the vibration analysis of composite laminated plates subjected to
thermal and mechanical loads or without any load (free vibration). Natural frequency and dynamic
response are analyzed by analytical, numerical and experimental analysis (by using impact hammer) for
different cases. The experimental investigation is to manufacture the laminates and to find mechanical
and thermal properties of glass-polyester such as longitudinal, transverse young modulus, shear modulus,
longitudinal and transverse thermal expansion and thermal conductivity. The vibration test carried to
find the three natural frequencies of plate. The design parameters of the laminates such as aspect ratio,
thickness
In our research, we dealt with one of the most important issues of linguistic studies of the Holy Qur’an, which is the words that are close in meaning, which some believe are synonyms, but in the Arabic language they are not considered synonyms because there are subtle differences between them. Synonyms in the Arabic language are very few, rather rare, and in the Holy Qur’an they are completely non-existent. And how were these words, close in meaning, translated in the translation of the Holy Qur’an by Almir Kuliev into the Russian language.
By taking into account various food components in the ecosystem, the research intends to develop a set of difference equations to simulate a plant-herbivore interaction of Holling Type II. We determine the local stability of the equilibrium points for the scenarios of extinction, semi-extinction (extinction for one species), and coexistence using the Linearized Stability Theorem. For a suitable Lyapunov function, we investigate theoretical findings to determine the global stability of the coexisting equilibrium point. It is clear that the system exhibits both Flip and Neimark-Sacker bifurcation under particular circumstances using the central manifold theorem and the bifurcation theory. Numerical simulations are
... Show MoreIn this paper, we introduce an exponential of an operator defined on a Hilbert space H, and we study its properties and find some of properties of T inherited to exponential operator, so we study the spectrum of exponential operator e^T according to the operator T.
The need to exchange large amounts of real-time data is constantly increasing in wireless communication. While traditional radio transceivers are not cost-effective and their components should be integrated, software-defined radio (SDR) ones have opened up a new class of wireless technologies with high security. This study aims to design an SDR transceiver was built using one type of modulation, which is 16 QAM, and adding a security subsystem using one type of chaos map, which is a logistic map, because it is a very simple nonlinear dynamical equations that generate a random key and EXCLUSIVE OR with the originally transmitted data to protect data through the transmission. At th
... Show MoreIn this paper we prove that the planar self-assembling micelle system
has no Liouvillian, polynomial and Darboux first integrals. Moreover, we show that the system
has only one irreducible Darboux polynomial with the cofactor being if and only if via the weight homogeneous polynomials and only two irreducible exponential factors and with cofactors and respectively with be the unique Darbox invariant of system.
Аннотация
в статье рассматриваются проблемы преподавания русской литературы в иракской аудитории.. Использование литературы в преподавании иностранного языка, как правило, имеет две цели. Первая-чисто лингвистическая .. Вторая цель, однако, ассоциируется больше с экстралингвистикой и представляет собой ознакомление студентов с различными аспектами русской жизни, культуры,
... Show MoreThrough recent years many researchers have developed methods to estimate the self-similarity and long memory parameter that is best known as the Hurst parameter. In this paper, we set a comparison between nine different methods. Most of them use the deviations slope to find an estimate for the Hurst parameter like Rescaled range (R/S), Aggregate Variance (AV), and Absolute moments (AM), and some depend on filtration technique like Discrete Variations (DV), Variance versus level using wavelets (VVL) and Second-order discrete derivative using wavelets (SODDW) were the comparison set by a simulation study to find the most efficient method through MASE. The results of simulation experiments were shown that the performance of the meth
... Show MoreTheoretical calculation of the electronic current at N 3 contact with TiO 2 solar cell devices ARTICLES YOU MAY BE INTERESTED IN Theoretical studies of electronic transition characteristics of senstizer molecule dye N3-SnO 2 semiconductor interface AIP Conference. Available from: https://www.researchgate.net/publication/362813854_Theoretical_calculation_of_the_electronic_current_at_N_3_contact_with_TiO_2_solar_cell_devices_ARTICLES_YOU_MAY_BE_INTERESTED_IN_Theoretical_studies_of_electronic_transition_characteristics_of_senstiz [accessed May 01 2023].