In modern years, internet and computers were used by many nations all overhead the world in different domains. So the number of Intruders is growing day-by-day posing a critical problem in recognizing among normal and abnormal manner of users in the network. Researchers have discussed the security concerns from different perspectives. Network Intrusion detection system which essentially analyzes, predicts the network traffic and the actions of users, then these behaviors will be examined either anomaly or normal manner. This paper suggested Deep analyzing system of NIDS to construct network intrusion detection system and detecting the type of intrusions in traditional network. The performance of the proposed system was evaluated by using Kdd cup 99 dataset. The experimental results displayed that the proposed module are best suited due to their high detection rate with false alarm rate.
الذات والتحصيل الدراسي . وقد استخدمت الباحثة المنهج الوصفي التحليلي، وبلغت عينة الدراسة (500) طالبًا وطالبة، تم اختيارهم بالطريقة الطبقية العشوائية وهي تمثل (15%) من مجتمع الدراسة البالغ (3328) طالباً وطالبة من طلبة المرحلة الإعدادية واستخدمت الباحثة مقياسين تم بناء مقياس لقياس الجوهر والمظهر وتبني مقياس فاعلية الذات بعد إن قامت بترجمته وتعريبه وجعله ملائم للبيئة العراقية، كم تم استخراج درجات التحصيل الدراسي للع
... Show MoreMetaheuristic is one of the most well-known fields of research used to find optimum solutions for non-deterministic polynomial hard (NP-hard) problems, for which it is difficult to find an optimal solution in a polynomial time. This paper introduces the metaheuristic-based algorithms and their classifications and non-deterministic polynomial hard problems. It also compares the performance of two metaheuristic-based algorithms (Elephant Herding Optimization algorithm and Tabu Search) to solve the Traveling Salesman Problem (TSP), which is one of the most known non-deterministic polynomial hard problems and widely used in the performance evaluations for different metaheuristics-based optimization algorithms. The experimental results of Ele
... Show MoreThe sending of information at the present time requires the speed and providing protection for it. So compression of the data is used in order to provide speed and encryption is used in order to provide protection. In this paper a proposed method is presented in order to provide compression and security for the secret information before sending it. The proposed method based on especial keys with MTF transform method to provide compression and based on RNA coding with MTF encoding method to provide security. The proposed method based on multi secret keys. Every key is designed in an especial way. The main reason in designing these keys in special way is to protect these keys from the predication of the unauthorized users.
The modern systems that have been based upon the hash function are more suitable compared to the conventional systems; however, the complicated algorithms for the generation of the invertible functions have a high level of time consumption. With the use of the GAs, the key strength is enhanced, which results in ultimately making the entire algorithm sufficient. Initially, the process of the key generation is performed by using the results of n-queen problem that is solved by the genetic algorithm, with the use of a random number generator and through the application of the GA operations. Ultimately, the encryption of the data is performed with the use of the Modified Reverse Encryption Algorithm (MREA). It was noticed that the
... Show MoreThis study has been conducted to examin the effect of sodium propionate at different level of 0.03,0.06,0.10% on the number of bacteria and mold and to extend the storage life of laboratory processed biscuit. The results indicated that the use of 0.10% sodium propionate prolonged the storage peroid until the third month, while the use of 0.20% sodium propionate showed no growth of bacteria up to six month of storage, three types of bacteria has been isolated from processed biscuit, namely, Staphylococcus aureus, Bacillus cereus, Esherichia coli. using 0.10% sodium propionate showed no growth of mold up to three month of storage ,while using of 0.15 % and 0.20% sodium propionate prevent the growth
... Show MoreThis study has been conducted to examin the effect of potassium sorbate at different level of 0.03,0.06,0.10% on the number of bacteria and mold and to extend the storage life of laboratory processed biscuit. The results indicated that the use of 0.03% potassium sorbate prolonged the storage peroid until the third month .three types of bacteria has been isolated from processed biscuit, namely, Staphylococcus aureus, Bacillus cereus, Esherichia coli using 0.06% potassium sorbate showed no growth of bacteria up to six month of storage ,while using of 0.03% and 0.06% potassium sorbate prevent the growth of mold up to three and six months of storage respectively. Both Aspergillus and Penicillium were isolated from the processed biscuit.
Image steganography is undoubtedly significant in the field of secure multimedia communication. The undetectability and high payload capacity are two of the important characteristics of any form of steganography. In this paper, the level of image security is improved by combining the steganography and cryptography techniques in order to produce the secured image. The proposed method depends on using LSBs as an indicator for hiding encrypted bits in dual tree complex wavelet coefficient DT-CWT. The cover image is divided into non overlapping blocks of size (3*3). After that, a Key is produced by extracting the center pixel (pc) from each block to encrypt each character in the secret text. The cover image is converted using DT-CWT, then the p
... Show MoreOne of the significant stages in computer vision is image segmentation which is fundamental for different applications, for example, robot control and military target recognition, as well as image analysis of remote sensing applications. Studies have dealt with the process of improving the classification of all types of data, whether text or audio or images, one of the latest studies in which researchers have worked to build a simple, effective, and high-accuracy model capable of classifying emotions from speech data, while several studies dealt with improving textual grouping. In this study, we seek to improve the classification of image division using a novel approach depending on two methods used to segment the images. The first
... Show MoreBackground: Low back pain is the most common health problem in men and women between the ages of 20 and 50 years. The lumbar disc prolapse has a major role in this condition. Treatment is either conservative or surgical. The most common surgical interventions are either laminectomy or interlaminar approach.
Objective: To determine which is the best surgical approach for the patient according to his/her type of disc herniation.
Patients and methods: A comparative clinical study conducted in the Neurosciences Hospital, Baghdad, Iraq from January 2016 to January 2018. In this paper we evaluated the clinical outcome following both approaches
Results:
... Show More