In modern years, internet and computers were used by many nations all overhead the world in different domains. So the number of Intruders is growing day-by-day posing a critical problem in recognizing among normal and abnormal manner of users in the network. Researchers have discussed the security concerns from different perspectives. Network Intrusion detection system which essentially analyzes, predicts the network traffic and the actions of users, then these behaviors will be examined either anomaly or normal manner. This paper suggested Deep analyzing system of NIDS to construct network intrusion detection system and detecting the type of intrusions in traditional network. The performance of the proposed system was evaluated by using Kdd cup 99 dataset. The experimental results displayed that the proposed module are best suited due to their high detection rate with false alarm rate.
This paper deal with the estimation of the shape parameter (a) of Generalized Exponential (GE) distribution when the scale parameter (l) is known via preliminary test single stage shrinkage estimator (SSSE) when a prior knowledge (a0) a vailable about the shape parameter as initial value due past experiences as well as suitable region (R) for testing this prior knowledge.
The Expression for the Bias, Mean squared error [MSE] and Relative Efficiency [R.Eff(×)] for the proposed estimator are derived. Numerical results about beha
... Show MoreIn this paper we introduced a new class of - called - and study their basic properties in nano topological spaces. We also introduce -closure and -interior and study some of their fundamental properties.
Suppose that F is a reciprocal ring which has a unity and suppose that H is an F-module. We topologize La-Prim(H), the set of all primary La-submodules of H , similar to that for FPrim(F), the spectrum of fuzzy primary ideals of F, and examine the characteristics of this topological space. Particularly, we will research the relation between La-Prim(H) and La-Prim(F/ Ann(H)) and get some results.
Single crystals of pure and Cu+2,Fe+2 doped potassium sulfate were grown from aqueous solutions by the slow evaporation technique at room temperature. with dimension of (11x9 x4)mm3 and ( 10x 8x 5)mm3 for crystal doping with Cu &Fe respectively. The influence of doping on crystal growth and its structure revealed a change in their lattice parameters(a=7.479 Ã… ,b=10.079 Ã… ,c=5.772 Ã…)for pure and doping (a=9.687 Ã…, b=14.926 Ã… ,c= 9.125 Ã…) & (a=9.638 Ã… , b= 8.045 Ã… ,c=3.271 Ã…) for Cu & Fe respectively. Structure analysis of the grown crystals were obtained by X-Ray powder diffraction measurements. The diffraction patterns were analyzed by the Rietveld refinement method. Rietveld refinement plo
... Show MoreIn this paper we introduce the definition of Lie ideal on inverse semiring and we generalize some results of Herstein about Lie structure of an associative rings to inverse semirings.
An algebra has been constructed from a (D, A)-stacked algebra A, under the conditions that , A 1 and . It is shown that when the construction of algebra B is built from a (D, A)-stacked monomial algebra A then B is a d-Koszul monomial algebra.
Petrophysical properties including volume of shale, porosity and water saturation are significance parameters for petroleum companies in evaluating the reservoirs and determining the hydrocarbon zones. These can be achieved through conventional petrophysical calculations from the well logs data such as gamma ray, sonic, neutron, density and deep resistivity. The well logging operations of the targeted limestone Mishrif reservoirs in Ns-X Well, Nasiriya Oilfield, south of Iraq could not be done due to some problems related to the well condition. The gamma ray log was the only recorded log through the cased borehole. Therefore, evaluating the reservoirs and estimating the perforation zones has not performed and the drilled well was
... Show MoreIn the image processing’s field and computer vision it’s important to represent the image by its information. Image information comes from the image’s features that extracted from it using feature detection/extraction techniques and features description. Features in computer vision define informative data. For human eye its perfect to extract information from raw image, but computer cannot recognize image information. This is why various feature extraction techniques have been presented and progressed rapidly. This paper presents a general overview of the feature extraction categories for image.
Ternary thin films have been clearly deposit using fully computerized system of spray pyrolysis technique onto glass substrates maintained at 310±5 °C. A mixture of an aqueous solution of thiourea, tin chloride dehydrate and copper chloride was used as spraying liquid. The optimumvolumetric ratio of mixing was found to be [S/(Cu+Sn)=1] at pH =1.5, in the present work. XRD examination was revealed CTS in a monoclinic phase. Number platform speeds were employed in the spraying process. XRD peaks were described at 2? = 28.39°, 33.02°, 47.34°, and 56.39° corresponding to , , , and , respectively. The FTIR investigations were certified a numeral of the chemical bond of Cu-, Sn- and S-. The grain size was observed in the range of nanosiz
... Show More