With the development of communication technologies for mobile devices and electronic communications, and went to the world of e-government, e-commerce and e-banking. It became necessary to control these activities from exposure to intrusion or misuse and to provide protection to them, so it's important to design powerful and efficient systems-do-this-purpose. It this paper it has been used several varieties of algorithm selection passive immune algorithm selection passive with real values, algorithm selection with passive detectors with a radius fixed, algorithm selection with passive detectors, variable- sized intrusion detection network type misuse where the algorithm generates a set of detectors to distinguish the self-samples. Practical Experiments showed the process to achieve a high rate of detection in the system designer using data NSL-KDD with 12 field without vulnerability to change the radius of the detector or change the number of reagents were obtained as the ratio between detection (0.984, 0.998, 0.999) and the ratio between a false alarm (0.003, 0.002, 0.001). Contrary to the results of experiments conducted on data NSL-KDD with 41 field contact, which affected the rate of detection by changing the radius and the number of the detector as it has been to get the proportion of uncovered between (0.44, 0.824, 0.992) and the percentage of false alarm between (0.5, 0.175, 0.003).
Today, the role of cloud computing in our day-to-day lives is very prominent. The cloud computing paradigm makes it possible to provide demand-based resources. Cloud computing has changed the way that organizations manage resources due to their robustness, low cost, and pervasive nature. Data security is usually realized using different methods such as encryption. However, the privacy of data is another important challenge that should be considered when transporting, storing, and analyzing data in the public cloud. In this paper, a new method is proposed to track malicious users who use their private key to decrypt data in a system, share it with others and cause system information leakage. Security policies are also considered to be int
... Show MoreThe drill bit is the most essential tool in drilling operation and optimum bit selection is one of the main challenges in planning and designing new wells. Conventional bit selections are mostly based on the historical performance of similar bits from offset wells. In addition, it is done by different techniques based on offset well logs. However, these methods are time consuming and they are not dependent on actual drilling parameters. The main objective of this study is to optimize bit selection in order to achieve maximum rate of penetration (ROP). In this work, a model that predicts the ROP was developed using artificial neural networks (ANNs) based on 19 input parameters. For the
viruses are responsible for a large proportion of lower respiratory tract infections (LRTIs). Other causes of LRTIs are bacteria: Streptococcus pneumoniae, Haemophilus influenzae, Klebsiella pneumoniae, and Staphylococcus aureus being the most common. Sputum samples are commonly used in the microbiological laboratory for diagnosing lower respiratory infections. Objective: The aim of this study to evaluate the causative bacteria and antibiotics sensitivity in culture of sputum samples. Patients Methods: A retrospective study performed in the microbiology department of Al Immamin Al Kahdimin Medical laboratory in Baghdad. The results of sputum cultures collected from the files between 2016 and 2019. A tota
... Show MoreThe aim of this study was to making an analytical study in some kinematics variables in (200) meter breaststroke swimming to first ranking in championship 2003 – Spanish. The swimming in our country still suffering from several obstruction with retarded it’s development for the better since the investigators observe the insufficiency of swimming in our country to any analytical study for the international champions, this led to no specific and scientific discovering to these advanced levels as the estimation of the value of performance from the Iraqi coaches dependent on personality observation dependent on their opinion without referring to the specific and scientific diction. The investigators dependent on several kinematics variables
... Show MoreThis article studies a comprehensive methods of edge detection and algorithms in digital images which is reflected a basic process in the field of image processing and analysis. The purpose of edge detection technique is discovering the borders that distinct diverse areas of an image, which donates to refining the understanding of the image contents and extracting structural information. The article starts by clarifying the idea of an edge and its importance in image analysis and studying the most noticeable edge detection methods utilized in this field, (e.g. Sobel, Prewitt, and Canny filters), besides other schemes based on distinguishing unexpected modifications in light intensity and color gradation. The research as well discuss
... Show MoreIn this paper, a compact genetic algorithm (CGA) is enhanced by integrating its selection strategy with a steepest descent algorithm (SDA) as a local search method to give I-CGA-SDA. This system is an attempt to avoid the large CPU time and computational complexity of the standard genetic algorithm. Here, CGA dramatically reduces the number of bits required to store the population and has a faster convergence. Consequently, this integrated system is used to optimize the maximum likelihood function lnL(φ1, θ1) of the mixed model. Simulation results based on MSE were compared with those obtained from the SDA and showed that the hybrid genetic algorithm (HGA) and I-CGA-SDA can give a good estimator of (φ1, θ1) for the ARMA(1,1) model. Anot
... Show MoreThe equation of Kepler is used to solve different problems associated with celestial mechanics and the dynamics of the orbit. It is an exact explanation for the movement of any two bodies in space under the effect of gravity. This equation represents the body in space in terms of polar coordinates; thus, it can also specify the time required for the body to complete its period along the orbit around another body. This paper is a review for previously published papers related to solve Kepler’s equation and eccentric anomaly. It aims to collect and assess changed iterative initial values for eccentric anomaly for forty previous years. Those initial values are tested to select the finest one based on the number of iterations, as well as the
... Show MoreIs a high degree of economic freedom an important part in the development of the economies of developing countries in the last decade of the twentieth century and the beginning of the twentieth century and the atheist. This is because a test subject (deltoid analysis of the relationship between the degree of economic freedom and foreign trade of selected developing countries for the period
( 1990 -2005) to determine the degree of economic freedom in foreign trade promotion in Singapore and Turkey. The research recommends a number of recommendations, the most important is the responsibility of the Ministry of Planning in Iraq that is providing the necessary data for the Fraser Institute, the aim of increasing cooperation