Secure data communication across networks is always threatened with intrusion and abuse. Network Intrusion Detection System (IDS) is a valuable tool for in-depth defense of computer networks. Most research and applications in the field of intrusion detection systems was built based on analysing the several datasets that contain the attacks types using the classification of batch learning machine. The present study presents the intrusion detection system based on Data Stream Classification. Several data stream algorithms were applied on CICIDS2017 datasets which contain several new types of attacks. The results were evaluated to choose the best algorithm that satisfies high accuracy and low computation time.
<p>Energy and memory limitations are considerable constraints of sensor nodes in wireless sensor networks (WSNs). The limited energy supplied to network nodes causes WSNs to face crucial functional limitations. Therefore, the problem of limited energy resource on sensor nodes can only be addressed by using them efficiently. In this research work, an energy-balancing routing scheme for in-network data aggregation is presented. This scheme is referred to as Energy-aware and load-Balancing Routing scheme for Data Aggregation (hereinafter referred to as EBR-DA). The EBRDA aims to provide an energy efficient multiple-hop routing to the destination on the basis of the quality of the links between the source and destination. In
... Show MoreIn this paper a new method is proposed to perform the N-Radon orthogonal frequency division multiplexing (OFDM), which are equivalent to 4-quadrature amplitude modulation (QAM), 16-QAM, 64-QAM, 256-QAM, ... etc. in spectral efficiency. This non conventional method is proposed in order to reduce the constellation energy and increase spectral efficiency. The proposed method gives a significant improvement in Bit Error Rate performance, and keeps bandwidth efficiency and spectrum shape as good as conventional Fast Fourier Transform based OFDM. The new structure was tested and compared with conventional OFDM for Additive White Gaussian Noise, flat, and multi-path selective fading channels. Simulation tests were generated for different channels
... Show MorePublic-private partnership (PPP) has been used over the past 20-30 years by governments in developed countries to meet the public demand for infrastructural services. In Iraq, the PPP concept is comparatively new to the Government of Iraq (GoI), where the government has historically taken most of the responsibility for providing public services. There are few PPP projects in Iraq. However, the number is increasing. Recently the Iraqi market has experienced a number of attempts of PPP in different sectors, especially after the new investment law in 2006. The aim of this paper is to evaluate the investment environment in Iraq and to indicate the main factors affecting PPP in particular for infrastructure projects. Some literature review and
... Show MoreThe concealment of data has emerged as an area of deep and wide interest in research that endeavours to conceal data in a covert and stealth manner, to avoid detection through the embedment of the secret data into cover images that appear inconspicuous. These cover images may be in the format of images or videos used for concealment of the messages, yet still retaining the quality visually. Over the past ten years, there have been numerous researches on varying steganographic methods related to images, that emphasised on payload and the quality of the image. Nevertheless, a compromise exists between the two indicators and to mediate a more favourable reconciliation for this duo is a daunting and problematic task. Additionally, the current
... Show MoreIn the present study, a powder mixture of elements Ti and Ni was mechanically alloyed in a high energy ball mill. Microstructure of the nanosized amorphous milled product in different stages of milling has been characterized by X- ray diffraction, scanning electron microscopy and differential thermal analysis. We found that time of mechanical alloying is more significant to convert all crystalline structure to the amorphous phase. Nanocrystalline phase was achieved as a result of the mechanical alloying process. The results also indicates that the phase transformation and the grain size occurs in these alloys are controlled by ball milling time
The process of converting coordinates is, still, considered an important and difficult issue due to the way of conversion from geographic ellipsoidal system to the projected flat system. The most common method uses contiguous UTM system as one of the most accurate systems in the conversion process, but the users of the
system face problems related to contiguity, especially at the large areas that lie within more than one zone. The aim of the present research is to solve the problem related to the multiple zones coverage found in the Iraqi territory using a mathematical model based on the use of Taylor series. The most accurate conversion equation used in this paper was based on the 4th order polynomial of two variables. The calculatio
Studying the spatially distribution pattern of fuel station in province of Baghdad
was done by utilizing GIS techniques which they are the most powerful tools for
design, display and analysis for the spatial data. Nearest Neighbor Analysis method
was applied for analyzing the spatial distributions of the fuel stations. Baghdad was
considered to be divided in to two main parts (outskirts of Baghdad and center of
Baghdad). The nearest neighbour for all parts of Baghdad indicates for the
distribution pattern is random and differs from place to another in randomly rate.
Abstract:
Central banks seek to control and supervise credit and follow it up effectively due to the high credit risks surrounding it that may lead to damage to banks, and may even lead to damage to the reputation and confidence of the banking system as a whole.
The main role of supervisory control is to control credit by controlling it from excessive expansion during periods of economic inflation or its revitalization and improvement and expansion of credit transactions in cases of economic recession, or when central banks desire to support the national economy or support a sector of various
... Show MoreIn this work, the dynamic behavior of discrete models is analyzed with Beverton- Holt function growth . All equilibria are found . The existence and local stability are investigated of all its equilibria.. The optimal harvest strategy is done for the system by using Pontryagin’s maximum principle to solve the optimality problem. Finally numerical simulations are used to solve the optimality problem and to enhance the results of mathematical analysis
The present study was done to identify the karyotype of Mystus pelusius fish , which is the only representative of the family Bagridae in Iraq, they have been caught from Tigris river in AL-Kraat area of Baghdad city, the results show that the diploid chromosome number was 2n=32 and the males chromosomal types included 2n=(6m+13sm+7st+6t)and fundamental number FN=51, in females chromosomal types included 2n=(6m+12sm+8st+6t)with FN=50,also it observed that the first submetacentric pair was the largest within the biarmed chromosomes .The results revealed that the male heterogamety and the female homogamety , accordingly it follows the sex determination system (XX / XY) , as the (X) chromosome represented by medium sized submetacentr
... Show More