Most intrusion detection systems are signature based that work similar to anti-virus but they are unable to detect the zero-day attacks. The importance of the anomaly based IDS has raised because of its ability to deal with the unknown attacks. However smart attacks are appeared to compromise the detection ability of the anomaly based IDS. By considering these weak points the proposed
system is developed to overcome them. The proposed system is a development to the well-known payload anomaly detector (PAYL). By
combining two stages with the PAYL detector, it gives good detection ability and acceptable ratio of false positive. The proposed system improve the models recognition ability in the PAYL detector, for a filtered unencrypted HTTP subset traffic of DARPA 1999 data set, from 55.234% in the PAYL system alone to 99.94% in the proposed system; due to the existence of the neural network self-organizing map (SOM). In addition SOM decreases the ratio of false positive from 44.676% in the PAYL system alone to 5.176% in the proposed system. The proposed system provides 80% detection ability of smart worms that are meant to invade the PAYL detector in the PAYL system alone, due to the existence of the randomization stage in the proposed system.
An investigation was conducted for the study of extraction of metal ions using aqueous biphasic systems. The extraction of iron, zinc and copper from aqueous sulphate media at different kinds of extractants SCN− , Cl- and I- , different values of pH of the feed solution, phase ratio, concentration of metals, concentration of extractant, concentration of polymer, and concentration of salt was investigated. Atomic absorption spectrophotometer was used to measure the concentration of iron, zinc and copper in the aqueous phase throughout the experiments. The results of the extraction experiments showed the use of SCN− as extractant, pH=2.5, phase ratio=1.5, concentration of metals 1g/l, concentration of extractant 0.06 %, concentration o
... Show MoreA Photo Dynamic Therapy (PDT) is a technique which is used with Laser to treat many of cancer
tissues. This paper deals with the relatively new therapeutic technique (PDT) with pulsed Nd:glass Laser
which was applied to human soft tissues (Ovary and Kidney tissues), and to the hard tissues (freshly
extracted human teeth), with power density of 280 watt/mm2 and exposure time 330 usec. Different
dyes (Blue, methylene, eosin, and orange) were applied to the area before irradiation to study the effect
of the pigments on the laser interaction with biological tissues. The zone of treatment (Z-necrosis) with
aid of MATLAB was determined. The relationship of zone of treatment with exposure time,
accumulated damage and fracti
The present study aims at answering the following questions:.
1-Which is more effective in enriching students. Vocabulary ,the use of short stories or the traditional way?
2-What extent has the use of short stories an effect upon the students. achievement in vocabulary test?
3- Is there any significant difference between the male and female student of the experimental group in vocabulary achievement test?
 
... Show MoreThe primary objective of this study is to manage price market items in the construction of walls for affordable structures with load-bearing hollow masonry units using the ACI 211.1 blend design with a slump range of 25-50 mm that follows the specification limits of IQS 1077. It was difficult to reach a suitable cement weight to minimum content (economic and environmental goal), so many trail mixtures were cast. A portion (10-20%) of the coarse aggregates was replaced with concrete, tile, and clay-brick waste. Finally, two curing methods were used: immersion under water as normal curing, and water spraying as it is closer to the field conditions. The recommendation in IQS 1077 to increase the curing period from 14 to 28 days was tak
... Show MoreA number of compression schemes were put forward to achieve high compression factors with high image quality at a low computational time. In this paper, a combined transform coding scheme is proposed which is based on discrete wavelet (DWT) and discrete cosine (DCT) transforms with an added new enhancement method, which is the sliding run length encoding (SRLE) technique, to further improve compression. The advantages of the wavelet and the discrete cosine transforms were utilized to encode the image. This first step involves transforming the color components of the image from RGB to YUV planes to acquire the advantage of the existing spectral correlation and consequently gaining more compression. DWT is then applied to the Y, U and V col
... Show MoreThis paper provides the result of an investigation to use of crushed clay brick as
aggregates in producing concrete. Eight different crushed clay brick aggregate concretes were
used in this investigation. Compressive strength, splitting tensile strength and pulse velocity of
crushed clay brick aggregates concrete were determined and compare to natural aggregate
concrete. The compressive strength of crushed clay brick aggregates concretes were always
lower than the compressive strength of natural aggregates concrete regardless the age of
concrete, but the crushed clay brick aggregates concrete showed better performance as the age of
concrete increases and average reduction in compressive strength were 33.5% at the age
Introduction: All-ceramic crowns are widely used in prosthodontics and cosmetic dentistry due to their good esthetic and proper physical properties. Chipping of ceramic is one of the most common post-insertion complications, that can be fixed either extraoral or intraorally. The latter is time time-effective alternative, less traumatic, and low-cost. A newer objective method of laser is a surface modification of ceramics to increase surface roughness. The aim of this study is to provide a review of Er,Cr;YSGG (2960nm) in intraoral repair and shear bond strength (SBS). Method: A thorough search considering Google Scholar and PubMed published data and ten articles found wh
... Show MoreWith the revolutionized expansion of the Internet, worldwide information increases the application of communication technology, and the rapid growth of significant data volume boosts the requirement to accomplish secure, robust, and confident techniques using various effective algorithms. Lots of algorithms and techniques are available for data security. This paper presents a cryptosystem that combines several Substitution Cipher Algorithms along with the Circular queue data structure. The two different substitution techniques are; Homophonic Substitution Cipher and Polyalphabetic Substitution Cipher in which they merged in a single circular queue with four different keys for each of them, which produces eight different outputs for
... Show MoreThe type of video that used in this proposed hiding a secret information technique is .AVI; the proposed technique of a data hiding to embed a secret information into video frames by using Discrete Cosine Transform (DCT), Discrete Wavelet Transform (DWT) and Curvelet Transform (CvT). An individual pixel consists of three color components (RGB), the secret information is embedded in Red (R) color channel. On the receiver side, the secret information is extracted from received video. After extracting secret information, robustness of proposed hiding a secret information technique is measured and obtained by computing the degradation of the extracted secret information by comparing it with the original secret information via calculating the No
... Show More