Secure data communication across networks is always threatened with intrusion and abuse. Network Intrusion Detection System (IDS) is a valuable tool for in-depth defense of computer networks. Most research and applications in the field of intrusion detection systems was built based on analysing the several datasets that contain the attacks types using the classification of batch learning machine. The present study presents the intrusion detection system based on Data Stream Classification. Several data stream algorithms were applied on CICIDS2017 datasets which contain several new types of attacks. The results were evaluated to choose the best algorithm that satisfies high accuracy and low computation time.
Production sites suffer from idle in marketing of their products because of the lack in the efficient systems that analyze and track the evaluation of customers to products; therefore some products remain untargeted despite their good quality. This research aims to build a modest model intended to take two aspects into considerations. The first aspect is diagnosing dependable users on the site depending on the number of products evaluated and the user's positive impact on rating. The second aspect is diagnosing products with low weights (unknown) to be generated and recommended to users depending on logarithm equation and the number of co-rated users. Collaborative filtering is one of the most knowledge discovery techniques used positive
... Show MoreEnergy use is second to staffing in building operating costs. Sustainable technology in the energy sector is based on utilizing renewable sources of energy such as solar, wind, glazing systems, insulation. Other areas of focus include heating, ventilation and air conditioning; novel materials and construction methods; improved sensors and monitoring systems; and advanced simulation tools that can help building designers make more energy efficient choices. The objective of this research is studying the effect of insulations on energy consumption of buildings in Iraq and identifying the amount of energy savings from application th
... Show MoreThis paper presents a new RGB image encryption scheme using multi chaotic maps. Encrypting an image is performed via chaotic maps to confirm the properties of secure cipher namely confusion and diffusion are satisfied. Also, the key sequence for encrypting an image is generated using a combination of 1D logistic and Sine chaotic maps. Experimental results and the compassion results indicate that the suggested scheme provides high security against several types of attack, large secret keyspace and highly sensitive.
This paper delves into the significant role played by local social and traditional structures in shaping Traditional Community Tenure (TCT) within Iraqi Land Tenure Legislation (ILTR), and examines their impact on gender inequalities, with a specific focus on women's land tenure rights. The methodological approach employed in this study identified the sources of barriers to gender equality within TCT as outlined in ILTR at two different bilateral levels, with input obtained from key stakeholders in a selected city in Iraq. The case study survey encompassed three districts, which served as local layers within the historic sectors of the Iraqi city of Al-Nasiriya. the study employed quantitative methods, including a household surveyو with
... Show MoreIn this paper, a cognitive system based on a nonlinear neural controller and intelligent algorithm that will guide an autonomous mobile robot during continuous path-tracking and navigate over solid obstacles with avoidance was proposed. The goal of the proposed structure is to plan and track the reference path equation for the autonomous mobile robot in the mining environment to avoid the obstacles and reach to the target position by using intelligent optimization algorithms. Particle Swarm Optimization (PSO) and Artificial Bee Colony (ABC) Algorithms are used to finding the solutions of the mobile robot navigation problems in the mine by searching the optimal paths and finding the reference path equation of the optimal
... Show MoreThe control function of important functions in the system of government for several reasons , perhaps the most important of the magnitude of spending and spending in one of the tools adopted in the implementation of the control function.
Perhaps the most prominent stages of the development budget in terms of setup and use in the budget programs and performance , as specialized literature show its importance in strengthening financial and operationl
... Show MoreThe Multiple Signal Classification (MUSIC) algorithm is the most popular algorithm to estimate the Angle of Arrival (AOA) of the received signals. The analysis of this algorithm (MUSIC) with typical array antenna element ( ) shows that there are two false direction indication in the plan
aligned with the axis of the array. In this paper a suggested modification on array system is proposed by using two perpendiculars crossed dipole array antenna in spite of one array antenna. The suggested modification does not affect the AOA estimation algorithm. The simulation and results shows that the proposed solution overcomes the MUSIC problem without any effect on the performance of the system.
Competitive swimming is a highly researched area and technological developments have aided advances in the understanding of the biomechanical principles that underpin these elements and govern propulsion. Moreover, those working in the sports field especially in swimming are interested in studying, analyzing, evaluating and developing motor skills by diagnosing the strengths and weaknesses of the skill, and accordingly, coaches and specialists correct these errors. The researchers chose this (Butterfly swimming) and the (arm length) is an important variable because the success of the stroke is greatly dependent on the propulsion generated from the arm pull, and swimmers with a longer arm span have a mechanical advantage with the resulting f
... Show MoreThis paper aims to introduce a concept of an equilibrium point of a dynamical system which will call it almost global asymptotically stable. We also propose and analyze a prey-predator model with a suggested function growth in prey species. Firstly the existence and local stability of all its equilibria are studied. After that the model is extended to an optimal control problem to obtain an optimal harvesting strategy. The discrete time version of Pontryagin's maximum principle is applied to solve the optimality problem. The characterization of the optimal harvesting variable and the adjoint variables are derived. Finally these theoretical results are demonstrated with numerical simulations.
We propose a new method for detecting the abnormality in cerebral tissues present within Magnetic Resonance Images (MRI). Present classifier is comprised of cerebral tissue extraction, image division into angular and distance span vectors, acquirement of four features for each portion and classification to ascertain the abnormality location. The threshold value and region of interest are discerned using operator input and Otsu algorithm. Novel brain slices image division is introduced via angular and distance span vectors of sizes 24˚ with 15 pixels. Rotation invariance of the angular span vector is determined. An automatic image categorization into normal and abnormal brain tissues is performed using Support Vector Machine (SVM). St
... Show More