In this search, Ep/SiO2 at (3, 6, 9, 12 %) composites is prepared by hand Lay-up method, to measure the change in the thermal conductivity and Impact Strength of epoxy resin before and after immersion in H2SO4 Solution with a 0.3N for 10 days. The results before immersion decreases with the increase of the weight ratios of the reinforcement material (SiO2), It changed from (82.6×10-2 to 38.7×10-2 W/m.°C) with change weight ratios from (3 to 12) % respectively, but after immersion time in the chemical solution where it was (65.6×10-2 W/m.°C) at the weight ratios (6 %) and became (46.6 × 10-2 W/m.°C) after immersion in sulfuric acid. The results of the Impact strength decreased by increasing the percentage weight ratio, it changed from (1.48 to 0.87 kJ/m2) with change weight ratios from (3 to 12) % respectively, but found an increase in the value of Impact Strength after immersion in the chemical solution Where it was (1.28 kJ/m2) at the weight ratio of 6 % and became (1.82 kJ/m2) at the same weight ratio after immersion in sulfuric acid at normality of 0.3 for 10 days.
In modern years, internet and computers were used by many nations all overhead the world in different domains. So the number of Intruders is growing day-by-day posing a critical problem in recognizing among normal and abnormal manner of users in the network. Researchers have discussed the security concerns from different perspectives. Network Intrusion detection system which essentially analyzes, predicts the network traffic and the actions of users, then these behaviors will be examined either anomaly or normal manner. This paper suggested Deep analyzing system of NIDS to construct network intrusion detection system and detecting the type of intrusions in traditional network. The performance of the proposed system was evaluated by using
... Show MoreVaried uses of international rivers in the past few decades dramatically, resulting in this multiplicity of uses and all associated with it for the occurrence of freshwater scarcity activities, and thus an increase in conflicts and disputes around on the rights of each of the riparian countries to benefit from the waters of the river at various purposes, particularly the establishment of dams on some of them as is the case (Renaissance Ethiopian) big impact on downstream countries Dam (Egypt and Sudan), due to the Oukuahma at the end of the Nile Valley made them vulnerable to environmental fluctuations, political crises facing the Nile basin countries, and any reduction in the proportion of water is not only the Nile River, but for all r
... Show MoreThe concepts of higher Bi- homomorphism and Jordan higher Bi- homomorphism have been introduced and studied the relation between Jordan and ordinary higher Bi- homomorphism also the concepts of Co- higher Bi- homomorphism and Co- Jordan higher Bi- homomorphism introduced and the relation between them in Banach algebra have also been studied.
Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreToday, the role of cloud computing in our day-to-day lives is very prominent. The cloud computing paradigm makes it possible to provide demand-based resources. Cloud computing has changed the way that organizations manage resources due to their robustness, low cost, and pervasive nature. Data security is usually realized using different methods such as encryption. However, the privacy of data is another important challenge that should be considered when transporting, storing, and analyzing data in the public cloud. In this paper, a new method is proposed to track malicious users who use their private key to decrypt data in a system, share it with others and cause system information leakage. Security policies are also considered to be int
... Show MoreMultiple applications use offline handwritten signatures for human verification. This fact increases the need for building a computerized system for signature recognition and verification schemes to ensure the highest possible level of security from counterfeit signatures. This research is devoted to developing a system for offline signature verification based on a combination of local ridge features and other features obtained from applying two-level Haar wavelet transform. The proposed system involves many preprocessing steps that include a group of image processing techniques (including: many enhancement techniques, region of interest allocation, converting to a binary image, and Thinning). In feature extraction and
... Show MoreAutomated clinical decision support system (CDSS) acts as new paradigm in medical services today. CDSSs are utilized to increment specialists (doctors) in their perplexing decision-making. Along these lines, a reasonable decision support system is built up dependent on doctors' knowledge and data mining derivation framework so as to help with the interest the board in the medical care gracefully to control the Corona Virus Disease (COVID-19) virus pandemic and, generally, to determine the class of infection and to provide a suitable protocol treatment depending on the symptoms of patient. Firstly, it needs to determine the three early symptoms of COVID-19 pandemic criteria (fever, tiredness, dry cough and breat
... Show MoreA substantial portion of today’s multimedia data exists in the form of unstructured text. However, the unstructured nature of text poses a significant task in meeting users’ information requirements. Text classification (TC) has been extensively employed in text mining to facilitate multimedia data processing. However, accurately categorizing texts becomes challenging due to the increasing presence of non-informative features within the corpus. Several reviews on TC, encompassing various feature selection (FS) approaches to eliminate non-informative features, have been previously published. However, these reviews do not adequately cover the recently explored approaches to TC problem-solving utilizing FS, such as optimization techniques.
... Show More