The importance of efficient vehicle detection (VD) is increased with the expansion of road networks and the number of vehicles in the Intelligent Transportation Systems (ITS). This paper proposes a system for detecting vehicles at different weather conditions such as sunny, rainy, cloudy and foggy days. The first step to the proposed system implementation is to determine whether the video’s weather condition is normal or abnormal. The Random Forest (RF) weather condition classification was performed in the video while the features were extracted for the first two frames by using the Gray Level Co-occurrence Matrix (GLCM). In this system, the background subtraction was applied by the mixture of Gaussian 2 (MOG 2) then applying a number of pre-processing operations, such as Gaussian blur filter, dilation, erosion, and threshold. The main contribution of this paper is to propose a histogram equalization technique for complex weather conditions instead of a Gaussian blur filter for improving the video clarity, which leads to increase detection accuracy. Based on the previous steps, the system defines each region in the frame expected to contain vehicles. Finally, Support Vector Machine (SVM) classifies the defined regions into a vehicle or not. As compared to the previous methods, the proposed system showed high efficiency of about 96.4% and ability to detect vehicles at different weather conditions.
Recent researches showed that DNA encoding and pattern matching can be used for the intrusion-detection system (IDS), with results of high rate of attack detection. The evaluation of these intrusion detection systems is based on datasets that are generated decades ago. However, numerous studies outlined that these datasets neither inclusively reflect the network traffic, nor the modern low footprint attacks, and do not cover the current network threat environment. In this paper, a new DNA encoding for misuse IDS based on UNSW-NB15 dataset is proposed. The proposed system is performed by building a DNA encoding for all values of 49 attributes. Then attack keys (based on attack signatures) are extracted and, finally, Raita algorithm is app
... Show MoreUntil recently, researchers have utilized and applied various techniques for intrusion detection system (IDS), including DNA encoding and clustering that are widely used for this purpose. In addition to the other two major techniques for detection are anomaly and misuse detection, where anomaly detection is done based on user behavior, while misuse detection is done based on known attacks signatures. However, both techniques have some drawbacks, such as a high false alarm rate. Therefore, hybrid IDS takes advantage of combining the strength of both techniques to overcome their limitations. In this paper, a hybrid IDS is proposed based on the DNA encoding and clustering method. The proposed DNA encoding is done based on the UNSW-NB15
... Show MoreSome of the main challenges in developing an effective network-based intrusion detection system (IDS) include analyzing large network traffic volumes and realizing the decision boundaries between normal and abnormal behaviors. Deploying feature selection together with efficient classifiers in the detection system can overcome these problems. Feature selection finds the most relevant features, thus reduces the dimensionality and complexity to analyze the network traffic. Moreover, using the most relevant features to build the predictive model, reduces the complexity of the developed model, thus reducing the building classifier model time and consequently improves the detection performance. In this study, two different sets of select
... Show MoreNowadays, internet security is a critical concern; the One of the most difficult study issues in network security is "intrusion detection". Fight against external threats. Intrusion detection is a novel method of securing computers and data networks that are already in use. To boost the efficacy of intrusion detection systems, machine learning and deep learning are widely deployed. While work on intrusion detection systems is already underway, based on data mining and machine learning is effective, it requires to detect intrusions by training static batch classifiers regardless considering the time-varying features of a regular data stream. Real-world problems, on the other hand, rarely fit into models that have such constraints. Furthermor
... Show MoreAir Temperature is mainly affect the condition of temporal and spatial weather. This influence may be very high on some weather variables such as pressure, humidity and winds, also the Extreme of these variables can be considered as an indicator of the impact and intensity of the pressure systems. The data of the European Centre for Medium-Range Weather Forecasts (ECMWF) during the summer months (June, July and August) of the period (2006 - 2017) were used to extract the Extreme of Daily Maximum Temperatures (EDMT) for four stations in Iraq (Baghdad, Basra, Khanaqin and AL-Rutba). The results that the number of extreme cases characteristics is nine, one of which is the beginning of the season, and the other
... Show MoreIn recent years, there has been expanding development in the vehicular part and the number of vehicles moving on the road in all the sections of the country. Vehicle number plate identification based on image processing is a dynamic area of this work; this technique is used for security purposes such as tracking of stolen cars and access control to restricted areas. The License Plate Recognition System (LPRS) exploits a digital camera to capture vehicle plate numbers is used as input to the proposed recognition system. Basically, the developing system is consist of three phases, vehicle license plate localization, character segmentation, and character recognition, the License Plate (LP) detection is presented using canny
... Show MoreHeat transfer process and fluid flow in a solar chimney used for natural ventilation are investigated numerically in the present work. Solar chimney was tested by selecting different positions of absorber namely: at the back side, front side, and at the middle of the air gap. CFD analysis based on finite volume method is used to predict the thermal performance, and air flow in two dimensional solar chimney under unsteady state condition, to identify the effect of different parameters such as solar radiation. Results show that a solar chimney with absorber at the middle of the air gap gives better ventilation performance. A comparison between the numerical and previous experimental results shows fair agreement.
The behaviour of the electrical conductivity (σ) and the activation energies (Ea1, Ea2) have been investigated on a-InAs thin films as a function of thickness (250,350,450,550,650) nm, before and after heat treatment. The films were annealed at (373, 423, 473) K for one hour. The films contain two types of transport mechanisms, and the electrical conductivity (σ) increases whereas the activation energy (Ea) would decrease as the films thickness increases.
In the early 90s military operations and United Nations Special Commission “UNSCOM” teams have been destroyed the past Iraqi chemical program. Both operations led an extensive number of scattered remnants of contaminated areas. The quantities of hazardous materials, incomplete destructed materials, and toxic chemicals were sealed in two bunkers. Deficiency of appropriate destruction technology led to spreading the contamination around the storage site. This paper aims to introduce the environmental detection of the contamination in the storage site area using geospatial analysis technique. The environmental contamination level of nutrients and major ions such as sulphate (SO4), potassium (K), sodium (Na), magnesi
... Show More