In this work, ZnO quantum dots (Q.dots) and nanorods were prepared. ZnO quantum dots were prepared by self-assembly method of zinc acetate solution with KOH solution, while ZnO nanorods were prepared by hydrothermal method of zinc nitrate hexahydrate Zn (NO3)2.6H2O with hexamethy lenetetramin (HMT) C6H12N4. The optical , structural and spectroscopic properties of the product quantum dot were studied. The results show the dependence of the optical properties on the crystal dimension and the formation of the trap states in the energy band gap. The deep levels emission was studied for n-ZnO and p-ZnO. The preparation ZnO nanorods show semiconductor behavior of p-type, which is a difficult process by doping because native defects.
Until recently, researchers have utilized and applied various techniques for intrusion detection system (IDS), including DNA encoding and clustering that are widely used for this purpose. In addition to the other two major techniques for detection are anomaly and misuse detection, where anomaly detection is done based on user behavior, while misuse detection is done based on known attacks signatures. However, both techniques have some drawbacks, such as a high false alarm rate. Therefore, hybrid IDS takes advantage of combining the strength of both techniques to overcome their limitations. In this paper, a hybrid IDS is proposed based on the DNA encoding and clustering method. The proposed DNA encoding is done based on the UNSW-NB15
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreThe logistic regression model is an important statistical model showing the relationship between the binary variable and the explanatory variables. The large number of explanations that are usually used to illustrate the response led to the emergence of the problem of linear multiplicity between the explanatory variables that make estimating the parameters of the model not accurate.
... Show MoreThe application of low order panel method with the Dirichlet boundary condition on complex aircraft configuration have been studied in high subsonic and transonic speeds. Low order panel method has been used to solve the case of the steady, inviscid and compressible flow on a forward swept wing – canard configuration with cylindrical fuselage and a vertical stabilizer with symmetrical cross section. The aerodynamic coefficients for the forward swept wing aircraft were calculated using measured wake shape from an experimental work on same model configuration. The study showed that the application of low order panel method can be used with acceptable results
In this research, porous silicon (PS) prepared by anodization etching on surface of single crystalline p-type Si wafer, then Gold nanoparticle (AuNPs) prepared by pulsed laser ablation in liquid. NPs deposited on PS layer by drop casting. The morphology of PS, AuNPs and AuNPs/PS samples were examined by AFM. The crystallization of this sample was characterized by X-ray diffraction (XRD). The electrical properties and sensitivity to CO2 gas were investigated to Al/AuNPs/PS/c-Si/Al, we found that AuNPs plays crucial role to enhance this properties.
The field of Optical Character Recognition (OCR) is the process of converting an image of text into a machine-readable text format. The classification of Arabic manuscripts in general is part of this field. In recent years, the processing of Arabian image databases by deep learning architectures has experienced a remarkable development. However, this remains insufficient to satisfy the enormous wealth of Arabic manuscripts. In this research, a deep learning architecture is used to address the issue of classifying Arabic letters written by hand. The method based on a convolutional neural network (CNN) architecture as a self-extractor and classifier. Considering the nature of the dataset images (binary images), the contours of the alphabet
... Show Moreهناك دائما حاجة إلى طريقة فعالة لتوليد حل عددي أكثر دقة للمعادلات التكاملية ذات النواة المفردة أو المفردة الضعيفة لأن الطرق العددية لها محدودة. في هذه الدراسة ، تم حل المعادلات التكاملية ذات النواة المفردة أو المفردة الضعيفة باستخدام طريقة متعددة حدود برنولي. الهدف الرئيسي من هذه الدراسة هو ايجاد حل تقريبي لمثل هذه المشاكل في شكل متعددة الحدود في سلسلة من الخطوات المباشرة. أيضا ، تم افتراض أن مقام النواة
... Show More