With the high usage of computers and networks in the current time, the amount of security threats is increased. The study of intrusion detection systems (IDS) has received much attention throughout the computer science field. The main objective of this study is to examine the existing literature on various approaches for Intrusion Detection. This paper presents an overview of different intrusion detection systems and a detailed analysis of multiple techniques for these systems, including their advantages and disadvantages. These techniques include artificial neural networks, bio-inspired computing, evolutionary techniques, machine learning, and pattern recognition.
Purpose: The research seeks to develop the implications of intellectual human capital, and social capital in business organizations, and will be accomplished on three levels, the first level (the level of description) to identify, diagnose and display content philosophical Strategic Human Resource Management at the thought of modern administrative represented by human capital and Ras social capital. The second level (level of analysis) and the analysis of the extent of the impact of alignment between human capital, and social capital in the organizational strength of the organizations. The third level (Level predict) the formulation of a plan to strengthen the organizational strength in business organizations and to develop speci
... Show MoreThe need to exchange large amounts of real-time data is constantly increasing in wireless communication. While traditional radio transceivers are not cost-effective and their components should be integrated, software-defined radio (SDR) ones have opened up a new class of wireless technologies with high security. This study aims to design an SDR transceiver was built using one type of modulation, which is 16 QAM, and adding a security subsystem using one type of chaos map, which is a logistic map, because it is a very simple nonlinear dynamical equations that generate a random key and EXCLUSIVE OR with the originally transmitted data to protect data through the transmission. At th
... Show MoreIn this paper, a modified derivation has been introduced to analyze the construction of C-space. The profit from using C-space is to make the process of path planning more safety and easer. After getting the C-space construction and map for two-link planar robot arm, which include all the possible situations of collision between robot parts and obstacle(s), the A* algorithm, which is usually used to find a heuristic path on Cartesian W-space, has been used to find a heuristic path on C-space map. Several modifications are needed to apply the methodology for a manipulator with degrees of freedom more than two. The results of C-space map, which are derived by the modified analysis, prove the accuracy of the overall C-space mapping and cons
... Show MoreThis article aims to provide a bibliometric analysis of intellectual capital research published in the Scopus database from 1956 to 2020 to trace the development of scientific activities that can pave the way for future studies by shedding light on the gaps in the field. The analysis focuses on 638 intellectual capital-related papers published in the Scopus database over 60 years, drawing upon a bibliometric analysis using VOSviewer. This paper highlights the mainstream of the current research in the intellectual capital field, based on the Scopus database, by presenting a detailed bibliometric analysis of the trend and development of intellectual capital research in the past six decades, including journals, authors, countries, inst
... Show MoreWe present the notion of bipolar fuzzy k-ideals with thresholds (
Numeral recognition is considered an essential preliminary step for optical character recognition, document understanding, and others. Although several handwritten numeral recognition algorithms have been proposed so far, achieving adequate recognition accuracy and execution time remain challenging to date. In particular, recognition accuracy depends on the features extraction mechanism. As such, a fast and robust numeral recognition method is essential, which meets the desired accuracy by extracting the features efficiently while maintaining fast implementation time. Furthermore, to date most of the existing studies are focused on evaluating their methods based on clean environments, thus limiting understanding of their potential a
... Show MoreIn this work, a simulated study was carried out for designing a novel spiral rectangular patch of microstrip antenna that is used in ultra-wideband applications by using a high frequency structure simulator software (HFSS). A substrate with dielectric constant of 4.4 and height 2.10 mm (commercial substrate height available is about 0.8-1.575 mm) has been used for the design of the proposed antenna. The design basis for enhancing bandwidth in the frequency range 6.63 - 10.93 GHz is based on increasing the edge areas that positively affect the antenna's efficiency. This design makes the designed antenna cost less by reducing the area of the patch. It has been noticed that the bandwidth of the antenna under this study is increasing to 4.30
... Show MoreObjective: The evaluation of serum osteocalcin (OSN) for Iraqi infertile patients to see the effect of osteocalcin insufficiency, which may lead to a decreased level of testosterone production in males that may cause infertility. Methods: Forty two newly diagnosed infertile males age range (24–47) years and thirty two apparently healthy males as controls age range (25–58) years. Serum levels of testosterone (TEST), stimulating follicle hormone (FSH) and luteinizing hormone (LH), prolactin (PROL), osteocalcin OSN, and fasting blood sugar (FBS) were performed in both patients and controls. Estimation of serum OSN by Immulite1000 auto-analyzer, TEST, FSH, LH, PROL, and FBS by Immulite2000 auto-analyzer. Results: Infertile patients
... Show More