Most intrusion detection systems are signature based that work similar to anti-virus but they are unable to detect the zero-day attacks. The importance of the anomaly based IDS has raised because of its ability to deal with the unknown attacks. However smart attacks are appeared to compromise the detection ability of the anomaly based IDS. By considering these weak points the proposed
system is developed to overcome them. The proposed system is a development to the well-known payload anomaly detector (PAYL). By
combining two stages with the PAYL detector, it gives good detection ability and acceptable ratio of false positive. The proposed system improve the models recognition ability in the PAYL detector, for a filtered unencrypted HTTP subset traffic of DARPA 1999 data set, from 55.234% in the PAYL system alone to 99.94% in the proposed system; due to the existence of the neural network self-organizing map (SOM). In addition SOM decreases the ratio of false positive from 44.676% in the PAYL system alone to 5.176% in the proposed system. The proposed system provides 80% detection ability of smart worms that are meant to invade the PAYL detector in the PAYL system alone, due to the existence of the randomization stage in the proposed system.
In this work, we carried out an experimental study of thedusty
plasma by taking the dust material Fe3O4 with radius of the any grain
0.1μm - 0.5μm. In experiment we use air in the vacuum chamber
system under different low pressure (0.1-1) Torr. The results
illustrated that the present of dust particles in the air plasma did not
effect on Paschen minimum which is 0.5 without dust and with Fe3O4
dusty grains.
The effect of Fe3O4 dust particles on plasma parameters can be
notice in direct current system in glow discharge region. The plasma
parameters which were studied in this work represent plasma
potential, floating potential,electron saturation current, temperatu
In this paper a comparison of the experimental of evacuated tube solar water heater systems with and without mirror flat reflector. The aim of using the reflector to improve thermal efficiency, and the data gathered which are (temperature, solar irradiation and time) for three days were compared. the results from compared data the temperature lower increase in evacuated tube solar water heater system without reflector than the temperature increase in evacuated tube solar water heater system with reflector .The results show (53, 39, 35) % for three days respectively that the evacuated tube solar water heater system with reflector has higher thermal efficiencies than the results (47, 28, 30) % for three days respectively thermal efficiencies
... Show MoreThis work describes the enhancement of phenol red decolorization through immobilizing of laccase in chitosan and enzyme recycling. Commercial laccase from white rot fungus, Trametesversicolor (Tvlac), was immobilizedin to freshly prepared chitosan beads by using glutaraldehyde as a cross linker. Characterization of prepared chitosan was confirmed by FTIR and scanning electron microscope (SEM). Tvlac (46.2 U/mL) immobilized into chitosan beads at 0.8 % glutaraldehyde (v/v) within 24 hrs. Synthetic (HBT) and natural (vanillin) mediators were used to enhance dye decolorizoation. It was found that 89 % of phenol red was decolorized by chitosan beads within 180 min. in the absence of enzyme and mediator, while decolorization percenta
... Show MoreThis paper describes the problem of online autonomous mobile robot path planning, which is consisted of finding optimal paths or trajectories for an autonomous mobile robot from a starting point to a destination across a flat map of a terrain, represented by a 2-D workspace. An enhanced algorithm for solving the problem of path planning using Bacterial Foraging Optimization algorithm is presented. This nature-inspired metaheuristic algorithm, which imitates the foraging behavior of E-coli bacteria, was used to find the optimal path from a starting point to a target point. The proposed algorithm was demonstrated by simulations in both static and dynamic different environments. A comparative study was evaluated between the developed algori
... Show MorePolycystic ovary syndrome(PCOS) is a heterogeneous disorder of uncertain etiology , it is the most common endocrinopathy in women and most common cause of anovulatery infertility ,characterized by chronic anovulation and hyperandrogenemia .The present study was designed to investigate the effect of silymarin which is known to have antioxidant and insulin sensitivity effects on the levels of glucose, insulin ,testosterone ,leutinizing hormone(LH) and progesterone .Ovulation rate and Homeostasis Model Assessment of insulin Resistance (HOMA) ratio were determined .A 3-months of treatment were conducted in 60 PCOS patients in three well-matched groups .The first one (n=20),received silymarin(750mg/day) .The second group received
... Show MoreIn this research velocity of moving airplane from its recorded digital sound is introduced. The data of sound file is sliced into several frames using overlapping partitions. Then the array of each frame is transformed from time domain to frequency domain using Fourier Transform (FT). To determine the characteristic frequency of the sound, a moving window mechanics is used, the size of that window is made linearly proportional with the value of the tracked frequency. This proportionality is due to the existing linear relationship between the frequency and its Doppler shift. An algorithm was introduced to select the characteristic frequencies, this algorithm allocates the frequencies which satisfy the Doppler relation, beside that the tra
... Show MoreRecently, the internet has made the users able to transmit the digital media in the easiest manner. In spite of this facility of the internet, this may lead to several threats that are concerned with confidentiality of transferred media contents such as media authentication and integrity verification. For these reasons, data hiding methods and cryptography are used to protect the contents of digital media. In this paper, an enhanced method of image steganography combined with visual cryptography has been proposed. A secret logo (binary image) of size (128x128) is encrypted by applying (2 out 2 share) visual cryptography on it to generate two secret share. During the embedding process, a cover red, green, and blue (RGB) image of size (512
... Show MoreLaser assisted skin wound closure offers many distinct advantages over conventional closure
techniques. The objective of this in vitro experimental study, carried out at the Institute of Laser for
Postgraduate Studies/Baghdad University, was to determine the effectiveness of 980 nm diode laser in
welding of human skin wounds. Multiple 3-4 cm long full thickness incisions in a specimen of human
skin obtained from the discarded panniculus of an Abdominoplasty operation were tried to be laser
welded using a 4 mm spot diameter laser beam from a 980 nm diode laser at different laser parameters
and modes of action. The tensile strength at the weld site was analyzed experimentally. Although laser
assisted wound welding did