Most intrusion detection systems are signature based that work similar to anti-virus but they are unable to detect the zero-day attacks. The importance of the anomaly based IDS has raised because of its ability to deal with the unknown attacks. However smart attacks are appeared to compromise the detection ability of the anomaly based IDS. By considering these weak points the proposed
system is developed to overcome them. The proposed system is a development to the well-known payload anomaly detector (PAYL). By
combining two stages with the PAYL detector, it gives good detection ability and acceptable ratio of false positive. The proposed system improve the models recognition ability in the PAYL detector, for a filtered unencrypted HTTP subset traffic of DARPA 1999 data set, from 55.234% in the PAYL system alone to 99.94% in the proposed system; due to the existence of the neural network self-organizing map (SOM). In addition SOM decreases the ratio of false positive from 44.676% in the PAYL system alone to 5.176% in the proposed system. The proposed system provides 80% detection ability of smart worms that are meant to invade the PAYL detector in the PAYL system alone, due to the existence of the randomization stage in the proposed system.
ABSTRACT: BACKGROUND: Arthroscopic knee surgeries are performed in very large numbers worldwide, and in spite of relatively low complication rate, but the total number is significant. Some of these complications are due to tourniquet use and can be serious. OBJECTIVE: Is to asses if automated pump (with or without) dilute epinephrine saline irrigation can replace the tourniquet use in soft tissue arthroscopic knee surgeries. PATIENTS AND METHODS: 36 patients (9 females 25 % and 27 males 75 %) were included in this prospective experimental nonrandomized study, and were necessitated soft tissue arthroscopic knee surgeries. Patients were divided into two groups, in group A (patients) tourniquet and automated pump were used. In group B (18 pati
... Show MoreIn the last years, a new technology called Cloud computing has been developed. Empirical and previous studies, commonly examined in business field and other domains. In this study, the significant factors that affecting the adoption of cloud computing have been examined using a frequency analysis that have been explored by the previous studies. The results showed that the most effected factors were relative advantage which followed by security and privacy, complexity, innovativeness, and external support. In this study the model of technology organization-environment was used to examine the significant factors that affecting the adoption of cloud computing.
This study focuses on studying an oscillation of a second-order delay differential equation. Start work, the equation is introduced here with adequate provisions. All the previous is braced by theorems and examplesthat interpret the applicability and the firmness of the acquired provisions
In many applications such as production, planning, the decision maker is important in optimizing an objective function that has fuzzy ratio two functions which can be handed using fuzzy fractional programming problem technique. A special class of optimization technique named fuzzy fractional programming problem is considered in this work when the coefficients of objective function are fuzzy. New ranking function is proposed and used to convert the data of the fuzzy fractional programming problem from fuzzy number to crisp number so that the shortcoming when treating the original fuzzy problem can be avoided. Here a novel ranking function approach of ordinary fuzzy numbers is adopted for ranking of triangular fuzzy numbers with simpler an
... Show MoreThe aim of this paper is to design a PID controller based on an on-line tuning bat optimization algorithm for the step-down DC/DC buck converter system which is used in the battery operation of the mobile applications. In this paper, the bat optimization algorithm has been utilized to obtain the optimal parameters of the PID controller as a simple and fast on-line tuning technique to get the best control action for the system. The simulation results using (Matlab Package) show the robustness and the effectiveness of the proposed control system in terms of obtaining a suitable voltage control action as a smooth and unsaturated state of the buck converter input voltage of ( ) volt that will stabilize the buck converter sys
... Show MoreData-driven models perform poorly on part-of-speech tagging problems with the square Hmong language, a low-resource corpus. This paper designs a weight evaluation function to reduce the influence of unknown words. It proposes an improved harmony search algorithm utilizing the roulette and local evaluation strategies for handling the square Hmong part-of-speech tagging problem. The experiment shows that the average accuracy of the proposed model is 6%, 8% more than HMM and BiLSTM-CRF models, respectively. Meanwhile, the average F1 of the proposed model is also 6%, 3% more than HMM and BiLSTM-CRF models, respectively.
KE Sharquie, AA Noaimi, BA Saleh, Journal of Cosmetics, Dermatological Sciences and Applications, 2016 - Cited by 15
KE Sharquie, MM Al-Waiz, AA Al-Nuaimy, Saudi medical journal, 2005 - Cited by 8