With the freedom offered by the Deep Web, people have the opportunity to express themselves freely and discretely, and sadly, this is one of the reasons why people carry out illicit activities there. In this work, a novel dataset for Dark Web active domains known as crawler-DB is presented. To build the crawler-DB, the Onion Routing Network (Tor) was sampled, and then a web crawler capable of crawling into links was built. The link addresses that are gathered by the crawler are then classified automatically into five classes. The algorithm built in this study demonstrated good performance as it achieved an accuracy of 85%. A popular text representation method was used with the proposed crawler-DB crossed by two different supervised classifiers to facilitate the categorization of the Tor concealed services. The results of the experiments conducted in this study show that using the Term Frequency-Inverse Document Frequency (TF-IDF) word representation with a linear support vector classifier achieves 91% of 5 folds cross-validation accuracy when classifying a subset of illegal activities from crawler-DB, while the accuracy of Naïve Bayes was 80.6%. The good performance of the linear SVC might support potential tools to help the authorities in the detection of these activities. Moreover, outcomes are expected to be significant in both practical and theoretical aspects, and they may pave the way for further research.
Iraqi western desert is characterized by a widespread karst phenomenon and caves. Euphrates formation (Lower Miocene) includes enormous sinkholes and cavities within carbonate rocks that usually cause severe damages to any kind of engineering facilities built over it. 3D resistivity imaging techniques were used in detecting this kind of cavities in complicated lithology. The 3D view was fulfilled by collating seven 2D imaging lines. The 2D imaging survey was carried out by Dipole-dipole array with (n) factor and electrode spacing (a) of 6 and 2m respectively. The horizontal slices of the 3D models give a good subsurface picture. There are many caves in all directions (x, y, z). They reveal many small caves near the surface. Thes
... Show MoreThe concentration of elements were analyzed of twelve cultivation medium (Peat moss, Perlite and Hermon) selected from Iraqi markets using X-ray fluorescence techniques. The analytical results show that the cultivation medium contained high concentration of (Na, Al, Si, S, K, Ca, Fe) and low concentration of (Mg, P, Cl, Ti, V, Cr, Mn, Co, Ni, Cu, Zn). The samples also contained trace concentration of (Ge, As, Se, Br, Sr, Y, Mo, Cd, I, Hg, Pb, U). The results were compared using atomic absorption spectrophotometric technique for measuring the concentration of (K, Ca, Cu, Mn, Zn, Pb).
The Results showed that there is significant difference in the concentration of each element in most of the samples. The concentrations of elements a
... Show MoreThis paper presents a comparison between the electroencephalogram (EEG) channels during scoliosis correction surgeries. Surgeons use many hand tools and electronic devices that directly affect the EEG channels. These noises do not affect the EEG channels uniformly. This research provides a complete system to find the least affected channel by the noise. The presented system consists of five stages: filtering, wavelet decomposing (Level 4), processing the signal bands using four different criteria (mean, energy, entropy and standard deviation), finding the useful channel according to the criteria’s value and, finally, generating a combinational signal from Channels 1 and 2. Experimentally, two channels of EEG data were recorded fro
... Show MoreThe study area is encompassed by the 33.59-34.93°N latitudes and 45.44-46.39°E longitudes and divided into four groups with respect to earthquake event locations. We determined fault plane solutions, moment magnitudes, focal depths, and trend of slip with the direction of the moment stress axes (P, N, and T) for 102 earthquakes. These earthquakes had a local magnitude in the range between 4.0 and 6.4 for the time period from January 2018 to the end of August 2019, with focal depths ranged between 6 and 17 km. Waveform moment tensor inversion technique was used to analyze the database constructed from seismic stations on local and neighboring country networks (Iraq, Iran, and Turkey). We separated the studie
... Show MoreThe skill of management educational activities gradually grow with the experience, but they differ from personal skill educator to another, because each style nanny personally and the way to work. There educator and active movement and vitality that look like happiness and clear during the implementation of the activity, and the other runs educational activities quietly, efficiently and without emotion and clear (dry, 2001: p. 274). And the stage of childhood is one of the most important stages that are based upon the future life as a whole because the man also confirmed by the School of analysis psychological is the son of his childhood and the best example to us what the Holy Prophet Muhammad (peace be upon him): (Every child i
... Show MoreIn the presence of deep submicron noise, providing reliable and energy‐efficient network on‐chip operation is becoming a challenging objective. In this study, the authors propose a hybrid automatic repeat request (HARQ)‐based coding scheme that simultaneously reduces the crosstalk induced bus delay and provides multi‐bit error protection while achieving high‐energy savings. This is achieved by calculating two‐dimensional parities and duplicating all the bits, which provide single error correction and six errors detection. The error correction reduces the performance degradation caused by retransmissions, which when combined with voltage swing reduction, due to its high error detection, high‐energy savings are achieved. The res
... Show MoreThe prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices
... Show MoreAbstract
This paper presents an intelligent model reference adaptive control (MRAC) utilizing a self-recurrent wavelet neural network (SRWNN) to control nonlinear systems. The proposed SRWNN is an improved version of a previously reported wavelet neural network (WNN). In particular, this improvement was achieved by adopting two modifications to the original WNN structure. These modifications include, firstly, the utilization of a specific initialization phase to improve the convergence to the optimal weight values, and secondly, the inclusion of self-feedback weights to the wavelons of the wavelet layer. Furthermore, an on-line training procedure was proposed to enhance the control per
... Show More