With the development of communication technologies for mobile devices and electronic communications, and went to the world of e-government, e-commerce and e-banking. It became necessary to control these activities from exposure to intrusion or misuse and to provide protection to them, so it's important to design powerful and efficient systems-do-this-purpose. It this paper it has been used several varieties of algorithm selection passive immune algorithm selection passive with real values, algorithm selection with passive detectors with a radius fixed, algorithm selection with passive detectors, variable- sized intrusion detection network type misuse where the algorithm generates a set of detectors to distinguish the self-samples. Practical Experiments showed the process to achieve a high rate of detection in the system designer using data NSL-KDD with 12 field without vulnerability to change the radius of the detector or change the number of reagents were obtained as the ratio between detection (0.984, 0.998, 0.999) and the ratio between a false alarm (0.003, 0.002, 0.001). Contrary to the results of experiments conducted on data NSL-KDD with 41 field contact, which affected the rate of detection by changing the radius and the number of the detector as it has been to get the proportion of uncovered between (0.44, 0.824, 0.992) and the percentage of false alarm between (0.5, 0.175, 0.003).
The tremendous political transformations that took place in Iraq after 2003 led by the USA and its allies led to a change of its political system under the slogan of liberating Iraq from dictatorship, establishing a democratic system and spreading freedom among members of the society.
However, democracy was a mantle under which the US intended to achieve its expansionist ambitions in the region. It did not come to liberate Iraq as it claimed, but it occupied Iraq and all its materialistic and human resources. Thus, this change resulted in lots of negative events and societal pests that affected the entire social system and values. Youth is an important segment; it is one of the most affected age groups with the happenings and accident
An adaptive nonlinear neural controller to reduce the nonlinear flutter in 2-D wing is proposed in the paper. The nonlinearities in the system come from the quasi steady aerodynamic model and torsional spring in pitch direction. Time domain simulations are used to examine the dynamic aero elastic instabilities of the system (e.g. the onset of flutter and limit cycle oscillation, LCO). The structure of the controller consists of two models :the modified Elman neural network (MENN) and the feed forward multi-layer Perceptron (MLP). The MENN model is trained with off-line and on-line stages to guarantee that the outputs of the model accurately represent the plunge and pitch motion of the wing and this neural model acts as the identifier. Th
... Show Moreتم التطرق في هذا البحث الى دور الذكاء الاصطناعي والتكنولوجيا الحديثة في العملية التدريبية بما يخدم أهدافه والاستفادة منه من خلال المخرجات الجيدة، حيث ان توظيف التكنولوجيا في تدريب رياضة المبارزة يسهل العملية التدريبية على المدرب واللاعب ويساهم في تقليل الجهد المبذول والوقت المستغرق ، وهدفت الدراسة الى التعرف على تأثير الجهاز المصنع في ضبط المسافة بين القدمين لدى عينة البحث ،استخدم المنهج التجريبي بت
... Show MoreIn this work, the effect of vortex shedding on the solar collector performance of the parabolic trough solar collector (PTSC) was estimated experimentally. The effect of structure oscillations due to wind vortex shedding on solar collector performance degradation was estimated. The performance of PTSC is evaluated by using the useful heat gain and the thermal instantaneous efficiency. Experimental work to simulate the vortex shedding excitation was done. The useful heat gain and the thermal efficiency of the parabolic trough collector were calculated from experimental measurements with and without vortex loading. The prototype of the collector was fabricated for this purpose. The effect of vortex shedding at different operation condition
... Show MoreBecause the Coronavirus epidemic spread in Iraq, the COVID-19 epidemic of people quarantined due to infection is our application in this work. The numerical simulation methods used in this research are more suitable than other analytical and numerical methods because they solve random systems. Since the Covid-19 epidemic system has random variables coefficients, these methods are used. Suitable numerical simulation methods have been applied to solve the COVID-19 epidemic model in Iraq. The analytical results of the Variation iteration method (VIM) are executed to compare the results. One numerical method which is the Finite difference method (FD) has been used to solve the Coronavirus model and for comparison purposes. The numerical simulat
... Show MoreThe use of worn-out agricultural nozzles in pesticide application has a negative effect on the efficiency and cost of the application process. It also has an effect on environmental pollution due to an excessive amount of pesticide being applied when spraying with worn-out nozzles. In this paper, the resistance to wear of three different internal design hydraulic nozzles was ascertained. Changes in the flow rate and spray distribution as a result of this wear were also investigated. The wear test was done inside a closed system, and it was accelerated using an abrasive material to generate 100 h of wear. The tested nozzles were the Turbo TeeJet (TT)-twin chambered, Turbo Twinjet (TTj60)-dual outlet, and Drift Guard (DG)-pre-orifice.
... Show MoreExperimental work has been performed on three capillary tubes of different lengths and diameters using R-12 and R-134a. The test also studies the effect of discharge and speed of evaporator fan. The results clearly showed that refrigerant type and discharge significantly influence the temperature drop across the capillary tube. While the speed of evaporator fan has small effect. Experimental results showed that the temperature gradient for the two refrigerants are the same, but after approximatly one meter the temperature gradient of R-134a is steeper than R-12.
Software cost management is a significant feature of project management. As such, it needs to be employed in a project or line of work. Software cost management is integral to software development failures, which, in turn, cause software failure. Thus, it is imperative that software development professionals develop their cost management skills to deliver successful software projects. The aim of this study is to examine the impact of cost management success factors with project management factors and three agile methodologies – Extreme Programming (XP), Scrum and Kanban methodologies which are used in the Pakistani software industry. To determine the results, the researchers applied quantitative approach through an extensive survey on
... Show More