Secure data communication across networks is always threatened with intrusion and abuse. Network Intrusion Detection System (IDS) is a valuable tool for in-depth defense of computer networks. Most research and applications in the field of intrusion detection systems was built based on analysing the several datasets that contain the attacks types using the classification of batch learning machine. The present study presents the intrusion detection system based on Data Stream Classification. Several data stream algorithms were applied on CICIDS2017 datasets which contain several new types of attacks. The results were evaluated to choose the best algorithm that satisfies high accuracy and low computation time.
In current generation of technology, a robust security system is required based on biometric trait such as human gait, which is a smooth biometric feature to understand humans via their taking walks pattern. In this paper, a person is recognized based on his gait's style that is captured from a video motion previously recorded with a digital camera. The video package is handled via more than one phase after splitting it into a successive image (called frames), which are passes through a preprocessing step earlier than classification procedure operation. The pre-processing steps encompass converting each image into a gray image, cast off all undesirable components and ridding it from noise, discover differen
... Show MoreClassification of network traffic is an important topic for network management, traffic routing, safe traffic discrimination, and better service delivery. Traffic examination is the entire process of examining traffic data, from intercepting traffic data to discovering patterns, relationships, misconfigurations, and anomalies in a network. Between them, traffic classification is a sub-domain of this field, the purpose of which is to classify network traffic into predefined classes such as usual or abnormal traffic and application type. Most Internet applications encrypt data during traffic, and classifying encrypted data during traffic is not possible with traditional methods. Statistical and intelligence methods can find and model traff
... Show MoreIn this paper, the peristaltic flow under the impact of heat transfer, rotation and induced magnetic field of a two dimensional for the Bingham plastic fluid is discussed. The coupling among of momentum with rotational, energy and the induced magnetic field equations are achieved by the perturbation approximation method and the mathematica software to solve equations that are nonlinear partial differential equations. The fluid moves in an asymmetric channel, and assumption the long wavelength and low Reynolds number, approximation are used for deriving a solution of the flow. Expression of the axial velocity, temperature, pressure gradient, induced magnetic field, magnetic force, current density are developed the eff
... Show MoreABSTRACT
In this research been to use some of the semi-parametric methods the based on the different function penalty as well as the methods proposed by the researcher because these methods work to estimate and variable selection of significant at once for single index model including (SCAD-NPLS method , the first proposal SCAD-MAVE method , the second proposal ALASSO-MAVE method ) .As it has been using a method simulation time to compare between the semi-parametric estimation method studied , and various simulation experiments to identify the best method based on the comparison criteria (mean squares error(MSE) and average mean squares error (AMSE)).
And the use
... Show MoreThe extracting of personal sprite from the whole image faced many problems in separating the sprite edge from the unneeded parts, some image software try to automate this process, but usually they couldn't find the edge or have false result. In this paper, the authors have made an enhancement on the use of Canny edge detection to locate the sprite from the whole image by adding some enhancement steps by using MATLAB. Moreover, remove all the non-relevant information from the image by selecting only the sprite and place it in a transparent background. The results of comparing the Canny edge detection with the proposed method shows improvement in the edge detection.
The extrasolar planets in the vicinity of stars are expected to be bright enough
and are very difficult to be observed by direct detection. The problem is attributed to
the side loops of the star that created due to the telescope diffraction processing.
Several methods have been suggested in the literatures are being capable to detect
exoplanet at a separation angle of 4λ/D and at a contrast ratio of 10-10. These
methods are more than one parameter function and imposing limitations on the inner
working distance. New simple method based on a circular aperture combined with a
third power Gaussian function is suggested. The parameters of this function are then
optimized based on obtaining a minimum inner working dis
The National Charter for Education and Training in 1999 defined the principles, pillars and main objectives of the Moroccan education system, building on the various reforms of the early twenty-first century and the attempt to breathe new life into this reference document. Through partial and incremental changes, a total inability to tackle the root causes of the Moroccan education system and training has been revealed. This research has been conducted to answer the questions of education in the foreground national concerns and priorities in the discourse of the main political actors in Morocco that have been raised and remain interesting and can be expressed in the following question: Morocco still fails to meet the challenge of educati
... Show MoreBackground:Ovulation constitutes a central event in ovarian physiology, and ovulatory dysfunction which is a relevant cause of female infertility. Mammalian ovulation is comparable to aninflammatory reaction since many of the molecules responsible for inducing the inflammatorycascade including PGs, leukotrienes and various cytokines have been describedin the ovary.
Objectives:This study was designed to compare between the effects of some NSAIDs(aspirin,diclofenac sodium and meloxicam)on the ovulatory process and the reproductive tract of female mice.
Materials and methods:Twenty four female mice were subdivided into 4groups (6 animals/group).The first received distilled water serve as control group, the second receivedaspirin (7.5
Singapore has invested its human resources for the development of the country since earlier times, so it has directed attention to the education sector. Education and development complement each other, as investment in education has contributed over several years to the development of Singapore economy and has made it one of the strongest economies in Asia and the world. Despite the obstacles that faced educational policies in Singapore, the presence of a wise leadership capable of overcoming difficulties and solving them, and providing the appropriate atmosphere for the development of education has contributed significantly to making it one of the most advanced educational systems in the world, and making this system the main pillar for
... Show MoreThe research aims to know the influence of the intellectual capital on the internal control system in a sample of General Inspection Offices in Iraq. The research includes a sample of individuals who are working in these offices total sample (46) individuals distributed according to functional levels (General Inspector, Deputy Inspector General, and Director) , The data and information were collected by using questionnaire, which is done for this purpose, as well as personal interviews in order to reach to the results that achieve the aim of this research , Two hypotheses were formed , the first hypothesis consists of (4) secondary hypothesis , All these hypotheses were tested by using statistical tools such as (percentages, freq
... Show More