Ge-Au infrared photoconductive detection was prepared from germanium single crystal which were doped with different gold concentration using thermal evaporation. The spectral resonsivity (Rλ), spectral detectivity (D*) were determined as function of wavelength, also the resistance, conductivity in dark and with illumination to infrared radiation, the gain and relative photo response have been measured with different gold concentration. Remarkable improvements in the photoresponse gain were observed for the highest resistance specimen at the expense of spectral detectivity values.
في هذا البحث تم تحضير المركبات المعدنية النانوية الجديدة لأيونات البلاتين 4+و الذهب 3+ مع ليكاند قاعدة مانخ جديد مشتق من السيبروفلوكساسين بطريقة الموجات فوق الصوتية. تم تشخيص المعقدات النانوية والليكاند الجديد بأستخدام تقنيات فيزيائية و كيميائية مختلفة مثل أطياف الاشعة تحت الحمراء، حيود الاشعة السينية ، المجهر الالكتروني الماسح ، المجهر الالكتروني النافذ و مجهر القوة الذرية. تم تحديد نشاط مضادات الأك
... Show MoreUntil recently, researchers have utilized and applied various techniques for intrusion detection system (IDS), including DNA encoding and clustering that are widely used for this purpose. In addition to the other two major techniques for detection are anomaly and misuse detection, where anomaly detection is done based on user behavior, while misuse detection is done based on known attacks signatures. However, both techniques have some drawbacks, such as a high false alarm rate. Therefore, hybrid IDS takes advantage of combining the strength of both techniques to overcome their limitations. In this paper, a hybrid IDS is proposed based on the DNA encoding and clustering method. The proposed DNA encoding is done based on the UNSW-NB15
... Show MoreIn this paper, RBF-based multistage auto-encoders are used to detect IDS attacks. RBF has numerous applications in various actual life settings. The planned technique involves a two-part multistage auto-encoder and RBF. The multistage auto-encoder is applied to select top and sensitive features from input data. The selected features from the multistage auto-encoder is wired as input to the RBF and the RBF is trained to categorize the input data into two labels: attack or no attack. The experiment was realized using MATLAB2018 on a dataset comprising 175,341 case, each of which involves 42 features and is authenticated using 82,332 case. The developed approach here has been applied for the first time, to the knowledge of the authors, to dete
... Show MoreMost recent studies have focused on using modern intelligent techniques spatially, such as those
developed in the Intruder Detection Module (IDS). Such techniques have been built based on modern
artificial intelligence-based modules. Those modules act like a human brain. Thus, they should have had the
ability to learn and recognize what they had learned. The importance of developing such systems came after
the requests of customers and establishments to preserve their properties and avoid intruders’ damage. This
would be provided by an intelligent module that ensures the correct alarm. Thus, an interior visual intruder
detection module depending on Multi-Connect Architecture Associative Memory (MCA)
Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreThin films of ZnSe arc deposited on glass substrates by thermal evaporation in vacuum with different thickness (1000, 2700, 4000) A° temperature (293-373) °K are studies the electrical properties before and after annealing. The result show decrease D.0 conductivity and increasing the activation energy Eat.
Spiritual is one of modern subjects gained importance of their role in the meaning imparted to work and to promote a sense of belonging to the group and the community, including support personnel positive attitudes towards their work. The research aims to highlight the impact of the relationship between workplace spiritual and variable working attitudes to sample variant of the hospitals, health department BAGHDAD / Rusafa, and in order to achieve this, the researcher is based on the descriptive and analytical approach adopted for the analysis of the questionnaire and to test relations research and its variables. The research community (4) of hospitals in Sadr City, included've targeted 106 doctors and 222 nurses formed a whole (
... Show More