Most intrusion detection systems are signature based that work similar to anti-virus but they are unable to detect the zero-day attacks. The importance of the anomaly based IDS has raised because of its ability to deal with the unknown attacks. However smart attacks are appeared to compromise the detection ability of the anomaly based IDS. By considering these weak points the proposed
system is developed to overcome them. The proposed system is a development to the well-known payload anomaly detector (PAYL). By
combining two stages with the PAYL detector, it gives good detection ability and acceptable ratio of false positive. The proposed system improve the models recognition ability in the PAYL detector, for a filtered unencrypted HTTP subset traffic of DARPA 1999 data set, from 55.234% in the PAYL system alone to 99.94% in the proposed system; due to the existence of the neural network self-organizing map (SOM). In addition SOM decreases the ratio of false positive from 44.676% in the PAYL system alone to 5.176% in the proposed system. The proposed system provides 80% detection ability of smart worms that are meant to invade the PAYL detector in the PAYL system alone, due to the existence of the randomization stage in the proposed system.
The traffic congestion caused by the increase in the number of vehicles in the cities as a result of the increase in the population and the density of construction requires the provision of appropriate infrastructure and the provision of transport systems and logistics services that meet the needs of the population to meet the many challenges now and in the future by introducing various modes of transport , In accordance with integrated plans such as the use of (pedestrian friendly environments, bicycles and their own paths, light rail, metro, express bus, as well as public transport buses and others), through the development of Projects High-level roads, such as the annual and major roads, etc., and integrated with the urban planning of
... Show MoreThe financial fraud considers part of large concept to management and financial corruption, the financial fraud is appeared especially after corporate, that is Emerge agency theory, that is because recognize relationship between the management company and stakeholder, that is through group from constriction in order to block the management to fraud practice, that on the basis was choose another party in order fraud this practice and give opinion on financial statement, that consider basis decision making from stakeholder to basis the report auditor about creditability this is statement that reflect real activity for the company.The Auditor in order to lead work him Full professionalism to must using group from control Techniques, that is
... Show MoreThe effectiveness of detecting and matching of image features using multiple views of a specified scene using dynamic scene analysis is considered to be a critical first step for many applications in computer vision image processing. The Scale invariant feature transform (SIFT) can be applied very successfully of typical images captured by a digital camera.
In this paper, firstly the SIFT and its variants are systematically analyzed. Then, the performances are evaluated in many situations: change in rotation, change in blurs, change in scale and change in illumination. The outcome results show that each algorithm has its advantages when compared with other algorithms
This paper include the problem of segmenting an image into regions represent (objects), segment this object by define boundary between two regions using a connected component labeling. Then develop an efficient segmentation algorithm based on this method, to apply the algorithm to image segmentation using different kinds of images, this algorithm consist four steps at the first step convert the image gray level the are applied on the image, these images then in the second step convert to binary image, edge detection using Canny edge detection in third Are applie the final step is images. Best segmentation rates are (90%) obtained when using the developed algorithm compared with (77%) which are obtained using (ccl) before enhancement.
Bulk polycrystalline samples have been prepared by the two-step solid state reaction process. It has been observed that as grown Tl2-xHgxSr2Ca2Cu3O10+δ (with x = 0, 0.1, 0.2, 0.3, 0.4, 0.5, 0.6, 0.8, 1) corresponds to the 2223 phase. It has been found that Tc varies with Hg content .The optimum Tc is about 120K for the composition Tl1.6Hg0.4Sr2Ca2Cu3O10+δ.The microstructure for Tl1.6Hg0.4Sr2Ca2Cu3O10+δ observed to be most dense and this phase exhibits the highest stability.
Maintenance of machine tools can be improved significantly by analyzing the operating of manufacturing process with the real-time monitoring system for 3-D single point deformation measurements. Therefore, the process of manufacturing could be optimized with less cost. Recently, wireless technology and internet of things (IOT) applied on intelligent machine has witnessed a significant advance with augmented virtuality, the analysis and the process certainly would contribute to enhance the intelligence of that machine. This paper presents a group of the wireless sensors and 3D animation technologies for data monitoring and analyzing. Three degree of freedom robotic hand structure has been selected as a prototype to be form the process of the
... Show MoreUniversities are among spaces where it's important to ensure thermal comfort in indoor spaces, improving the occupants' well-being and productivity. The problem of the research was to study appropriate glazing systems for the spaces of the University of Baghdad because glazing systems are one of the most important elements of the indoor environments, and it has a major impact on the thermal performance of buildings. Glass is one of the most seasoned materials that are most utilized in the design. Since it is a diaphanous material, it allows sunlight to enter the building, increasing the space's temperature, cooling loads, and energy consumption in summer. The research followed the experimental method by studying and
... Show MoreIn recent years, the rapid development in the field of wireless technologies led to the appearance of a new topic, known as the Internet of things (IoT). The IoT applications can be found in various fields of our life, such as smart home, health care, smart building, and etc. In all these applications, the data collected from the real world are transmitted through the Internet; therefore, these data have become a target of many attacks and hackers. Hence, a secure communication must be provided to protect the transmitted data from unauthorized access. This paper focuses on designing a secure IoT system to protect the sensing data. In this system, the security is provided by the use of Lightweight AES encryption algorithm to encrypt the d
... Show More