Secure data communication across networks is always threatened with intrusion and abuse. Network Intrusion Detection System (IDS) is a valuable tool for in-depth defense of computer networks. Most research and applications in the field of intrusion detection systems was built based on analysing the several datasets that contain the attacks types using the classification of batch learning machine. The present study presents the intrusion detection system based on Data Stream Classification. Several data stream algorithms were applied on CICIDS2017 datasets which contain several new types of attacks. The results were evaluated to choose the best algorithm that satisfies high accuracy and low computation time.
This research is a theoretical study that deals with the presentation of the literature of statistical analysis from the perspective of gender or what is called Engendering Statistics. The researcher relied on a number of UN reports as well as some foreign sources to conduct the current study. Gender statistics are defined as statistics that reflect the differences and inequality of the status of women and men overall domains of life, and their importance stems from the fact that it is an important tool in promoting equality as a necessity for the process of sustainable development and the formulation of national and effective development policies and programs. The empowerment of women and the achievement of equality between men and wome
... Show MoreThis paper presents a method to organize memory chips when they are used to build memory systems that have word size wider than 8-bit. Most memory chips have 8-bit word size. When the memory system has to be built from several memory chips of various sizes, this method gives all possible organizations of these chips in the memory system. This paper also suggests a precise definition of the term “memory bank” that is usually used in memory systems. Finally, an illustrative design problem was taken to illustrate the presented method practically
Terrorist operations disturbed societies and threatened their existence due to destructive ideas carried by those groups that believe in radical change and the use of multiple methods to implement their ideas, as well as taking methods of concealment among society, so it has become difficult to detect them. The study's purpose is to locate sleeper cells of terrorist operations in areas dense with various human activities using remote sensing techniques and geographic information systems programs. The programs were used to analyze the group of terrorist incidents data that occurred in Baghdad in 2011 and study how to limit the crimes spreading in Baghdad. The study included building a model in spatial information systems for site
... Show MoreRefractive indices (nD), viscosities (η) and densities (r) were deliberated for the binary mixtures created by dipropyl amine with 1-octanol, 1-heptanol, 1-hexanol, 1-pentanol and tert-pentyl alcohol at temperature 298.15 K over the perfect installation extent. The function of Redlich-Kister were used to calculate and renovated of the refractive index deviations (∆nD), viscosity deviations (ηE), excess molar Gibbs free energy (∆G*E) and excess molar volumes(Vm E). The standard errors and coefficients were respected by this function. The values of ∆nD, ηE, Vm E and ∆G*E were plotted against mole fraction of dipropyl amine. In all cases the obtained ηE, ∆G*E, Vm E and ∆nD values were negative at 298.15K. Effect of carbon atoms
... Show MoreThe question on affine Riesz basis of Walsh affine systems is considered. An affine Riesz basis is constructed, generated by a continuous periodic function that belongs to the space on the real line, which has a derivative almost everywhere; in connection with the construction of this example, we note that the functions of the classical Walsh system suffer a discontinuity and their derivatives almost vanish everywhere. A method of regularization (improvement of differential properties) of the generating function of Walsh affine system is proposed, and a criterion for an affine Riesz basis for a regularized generating function that can be represented as a sum of a series in the Rademacher system is obtained.
Task scheduling in an important element in a distributed system. It is vital how the jobs are correctly assigned for each computer’s processor to improve performance. The presented approaches attempt to reduce the expense of optimizing the use of the CPU. These techniques mostly lack planning and in need to be comprehensive. To address this fault, a hybrid optimization scheduling technique is proposed for the hybridization of both First-Come First-Served (FCFS), and Shortest Job First (SJF). In addition, we propose to apply Simulated Annealing (SA) algorithm as an optimization technique to find optimal job’s execution sequence considering both job’s entrance time and job’s execution time to balance them to reduce the job
... Show MoreThe study conducted to demonstrate the effect of copper nanoparticles (Cu-NPs) on the seminal vesicle and testosterone hormone of males' albino mice. Twenty mice were used and divided into four groups control group and three groups that orally administrated with 100 mg/kg Cu-NPs for 7, 14 and 21 days and each group have 5 animals. Then, the blood was withdrawn from the animals to measure the level of the hormone testosterone in the next day after all the dosages period and then the animal was sacrificed. Seminal vesicles isolated from each animal and measured weight then histological sections were prepared to observe the changes of seminal vesicles sections. Then the morphometric was carried out to the lining cells and their nucleus and
... Show MoreThis research deals with a 2D seismic structural and stratigraphic interpretation of Khan Al-Baghdadi area which is located in the western part of Iraq in Anbar governorate. Two main seismic reflectors are identified within the Silurian and Ordovician; these are the Hot_shale_1 within Akkas Formation and the Top Khabour Formation, which were deposited during the Paleozoic, based on synthetic seismogram of Akk_3 well near the study area. Time, depth, and velocity maps show the presence of two anticline structures trending east-west and located on the west side of the study area. The first is the Tulul structure (here denoted as A) and the second is denoted as B. Also, the maps show the increase in time towards the
... Show MoreActivity recognition (AR) is a new interesting and challenging research area with many applications (e.g. healthcare, security, and event detection). Basically, activity recognition (e.g. identifying user’s physical activity) is more likely to be considered as a classification problem. In this paper, a combination of 7 classification methods is employed and experimented on accelerometer data collected via smartphones, and compared for best performance. The dataset is collected from 59 individuals who performed 6 different activities (i.e. walk, jog, sit, stand, upstairs, and downstairs). The total number of dataset instances is 5418 with 46 labeled features. The results show that the proposed method of ensemble boost-based classif
... Show MoreAn experimental study was conducted to determine the performance of a solar electric refrigeration system. The system contained flat photovoltaic solar panel which absorbs the solar energy and convert it to electrical energy, used to run the refrigeration cycle. Two refrigeration cycles with electrical solar panel were used over a period of 12 months, the first one with classical parts known in refrigeration cycle, while the second one introduced heat exchanger which improves the coefficient of performance by saving the consumed energy. The coefficient of performance of these refrigeration cycles with compressor efficiency 85% are 2.102 and 2.57 respectively. The overall efficiency of the two systems are 18.9% and 23.13%.