Secure data communication across networks is always threatened with intrusion and abuse. Network Intrusion Detection System (IDS) is a valuable tool for in-depth defense of computer networks. Most research and applications in the field of intrusion detection systems was built based on analysing the several datasets that contain the attacks types using the classification of batch learning machine. The present study presents the intrusion detection system based on Data Stream Classification. Several data stream algorithms were applied on CICIDS2017 datasets which contain several new types of attacks. The results were evaluated to choose the best algorithm that satisfies high accuracy and low computation time.
In recent years, the positioning applications of Internet-of-Things (IoT) based systems have grown increasingly popular, and are found to be useful in tracking the daily activities of children, the elderly and vehicle tracking. It can be argued that the data obtained from GPS based systems may contain error, hence taking these factors into account, the proposed method for this study is based on the application of IoT-based positioning and the replacement of using IoT instead of GPS. This cannot, however, be a reason for not using the GPS, and in order to enhance the reliability, a parallel combination of the modern system and traditional methods simultaneously can be applied. Although GPS signals can only be accessed in open spaces, GP
... Show MoreBackground: Transitional cell carcinoma of the urinary bladder is one of the important malignancies in both sex groups .It is considered as a heterogenous neoplasm with different
biological behavior, in which the majority are early non invasive with tendency for recurrence and some may progress to invasive tumor. An important clinicopathological features are ,the tumor stage and histological grade which are used as prognostic parameters of the tumor and play an important role in therapy. Due to the subjectivity of the histological grading , the reproducibility was low . Many studies showed the value of quantitative analysis of the tumor as an important method in determining the recurrence of the tumor and
The immunity enjoyed by members of parliament is one of the most important guarantees for the performance of their parliamentary work, which protects them from threats or any reprisals against them.
There are two types of immunity:
Objective immunity: the member does not bear any responsibility for the opinions, ideas, and statements he expresses within the council or its committees, but even outside it by some systems.
Procedural immunity: that prevents criminal actions from being taken during or outside the session of the Council, with the approval of a body specified by the constitutions of the countries under study, but it is restricted by conditions and controls stipulated. It contains constitut
... Show MoreAg2O (Silver Oxide) is an important p-type (in chasm to most oxides which were n-type), with a high conductivity semiconductor. From the optical absorbance data, the energy gap value of the Ag2O thin films was 1.93 eV, where this value substantially depends on the production method, vacuum evaporation of silver, and optical properties of Ag2O thin films are also affected by the precipitation conditions. The n-type and p-type silicon substrates were used with porous silicon wafers to precipitate ±125 nm, as thick Ag2O thin film by thermal evaporation techniques in vacuum and via rapid thermal oxidation of 400oC and oxidation time 95 s, then characterized by measurement of
... Show MoreBackground: Cholera has been recognized as a killer disease since earliest time. The disease is caused by infection of the small intestine by Vibrio cholerae O1 and O1391 which is characterized by severe dehydrating diarrheal condition and is one disease in modern times that is epidemic, endemic and pandemic in nature. Objective: This study was carried out to detect and isolate V. cholerae from patients suffered from watery diarrhea, which may cause severe complications such as dehydration, shock followed by death. Materials and methods: stool specimens were collected from 308 patients with watery diarrhea. These samples were tested with many criteria such as TCBS agar, gram stain, biochemical tests and VITEK-2 system to improve the isolati
... Show MoreIn this article, it is interesting to estimate and derive the three parameters which contain two scales parameters and one shape parameter of a new mixture distribution for the singly type one censored data which is the branch of right censored sample. Then to define some special mathematical and statistical properties for this new mixture distribution which is considered one of the continuous distributions characterized by its flexibility. Next, using maximum likelihood estimator method for singly type one censored data based on the Newton-Raphson matrix procedure to find and estimate values of these three parameter by utilizing the real data taken from the National Center for Research and Treatment of Hematology/University of Mus
... Show MoreSteganography involves concealing information by embedding data within cover media and it can be categorized into two main domains: spatial and frequency. This paper presents two distinct methods. The first is operating in the spatial domain which utilizes the least significant bits (LSBs) to conceal a secret message. The second method is the functioning in the frequency domain which hides the secret message within the LSBs of the middle-frequency band of the discrete cosine transform (DCT) coefficients. These methods enhance obfuscation by utilizing two layers of randomness: random pixel embedding and random bit embedding within each pixel. Unlike other available methods that embed data in sequential order with a fixed amount.
... Show MoreThe challenges facing today's multi-customer and this is due to the multiplicity of products and speed in launching new products so search came to reveal the reveal the of the new product classification standards through a relationship (good products, low interest products, useful products and products desired) and the customer emotionally blackmail through deportation (fear, obligation and guilt). dentified the problem of the research in several questions focused on the nature of the relationship between the variables of research, and for that outline supposedly to search it expresses the head of one hypothesis and branched out of which four hypotheses subset, but in order to ensure the validity of the ass
... Show MoreThe estimation of the parameters of linear regression is based on the usual Least Square method, as this method is based on the estimation of several basic assumptions. Therefore, the accuracy of estimating the parameters of the model depends on the validity of these hypotheses. The most successful technique was the robust estimation method which is minimizing maximum likelihood estimator (MM-estimator) that proved its efficiency in this purpose. However, the use of the model becomes unrealistic and one of these assumptions is the uniformity of the variance and the normal distribution of the error. These assumptions are not achievable in the case of studying a specific problem that may include complex data of more than one model. To
... Show MoreThe new 4-[(7-chloro-2,1,3-benzoxadiazole)azo]-4,5-diphenyl imidazole (L) have been synthesized and characterized by micro elemental and thermal analyses as well as 1H.NMR, FT-IR, and UV-Vis spectroscopic techniques. (L) acts as a ligand coordinating with some metal ionsV(IV), Fe(III), Co(II), Ni(II), Cu(II), and Zn(II). Structures of the new compounds were characterized by elemental and thermal analyses as well as FT-IR and UV-Vis Spectra. The magnetic properties and electrical conductivities of metal complexes were also determined. Study of the nature of the complexes formed in ethanol following the mole ratio method.. The work also include a theoretical treatment of the formed complexes in the gas phase, this was done using the (hyperch
... Show More