Botnet is a malicious activity that tries to disrupt traffic of service in a server or network and causes great harm to the network. In modern years, Botnets became one of the threads that constantly evolving. IDS (intrusion detection system) is one type of solutions used to detect anomalies of networks and played an increasing role in the computer security and information systems. It follows different events in computer to decide to occur an intrusion or not, and it used to build a strategic decision for security purposes. The current paper
Polarization is an important property of light, which refers to the direction of electric field oscillations. Polarization modulation plays an essential role for polarization encoding quantum key distribution (QKD). Polarization is used to encode photons in the QKD systems. In this work, visible-range polarizers with optimal dimensions based on resonance grating waveguides have been numerically designed and investigated using the COMSOL Multiphysics Software. Two structures have been designed, namely a singlelayer metasurface grating (SLMG) polarizer and an interlayer metasurface grating (ILMG) polarizer. Both structures have demonstrated high extinction ratios, ~1.8·103 and 8.68·104 , and the bandwidths equal to 45 and 55 nm for th
... Show MoreBackground: obesity is a major global health problem with more than 200 million obese men and almost 300 million obese women. Melatonin is a well-known molecule for its involvement in circadian rhythm regulation and has multiple pathological actions including control of appetite, sleep wake cycle and metabolic syndrome.
Aim: to estimate the effect of melatonin supplements on obese patients on a calorie restricted diet in comparison to patients on lifestyle measures only in the form of weight loss, waist circumference and sleep quality.
Subjects and Method: one hundred patients with body mass index > 24 were collected, fifty patients were starte
... Show MoreWaveform flow of non-Newtonian fluid through a porous medium of the non-symmetric sloping canal under the effect of rotation and magnetic force, which has applied by the inclined way, have studied analytically and computed numerically. Slip boundary conditions on velocity distribution and stream function are used. We have taken the influence of heat and mass transfer in the consideration in our study. We carried out the mathematical model by using the presumption of low Reynolds number and small wave number. The resulting equations of motion, which are representing by the velocity profile and stream function distribution, solved by using the method of a domain decomposition analysis a
The research dealt with the study of choice between a range of different words between the repetitive texts in the verses of the Koran and explain the reason behind this choice, and how the context has the greatest impact in this choice, and that each word in the Koran was placed in the most appropriate place, which can not be replaced by equivalent words, whatever The degree of similarity between them in the indication of the other because it remains at the end that each of those vocabulary synonyms are indicative, the first of them especially that makes the possibility of replacing them with the equivalent vocabulary impossible, and the second general significance and this connotation makes them share with their peers In one aspect of
... Show MoreBackground: The present study aimed to assess the distribution, prevalence, severity of malocclusion in Baghdad governorate in relation to gender and residency Materials and Methods: A multi-stage stratified sampling technique was used in this investigation to make the sample a representative of target population. The sample consisted of 2700 (1349 males and 1351 females) intermediate school students aged 13 years representing 3% of the total target population. A questionnaire was used to determine the perception of occlusion and orthodontic treatment demand of the students and the assessment procedures for occlusal features by direct intraoral measurement using veriner and an instrument to measure the rotated and displaced teeth. Results a
... Show MoreThis paper proposes improving the structure of the neural controller based on the identification model for nonlinear systems. The goal of this work is to employ the structure of the Modified Elman Neural Network (MENN) model into the NARMA-L2 structure instead of Multi-Layer Perceptron (MLP) model in order to construct a new hybrid neural structure that can be used as an identifier model and a nonlinear controller for the SISO linear or nonlinear systems. Two learning algorithms are used to adjust the parameters weight of the hybrid neural structure with its serial-parallel configuration; the first one is supervised learning algorithm based Back Propagation Algorithm (BPA) and the second one is an intelligent algorithm n
... Show MoreA new modified differential evolution algorithm DE-BEA, is proposed to improve the reliability of the standard DE/current-to-rand/1/bin by implementing a new mutation scheme inspired by the bacterial evolutionary algorithm (BEA). The crossover and the selection schemes of the DE method are also modified to fit the new DE-BEA mechanism. The new scheme diversifies the population by applying to all the individuals a segment based scheme that generates multiple copies (clones) from each individual one-by-one and applies the BEA segment-wise mechanism. These new steps are embedded in the DE/current-to-rand/bin scheme. The performance of the new algorithm has been compared with several DE variants over eighteen benchmark functions including sever
... Show MoreImage compression is a serious issue in computer storage and transmission, that simply makes efficient use of redundancy embedded within an image itself; in addition, it may exploit human vision or perception limitations to reduce the imperceivable information Polynomial coding is a modern image compression technique based on modelling concept to remove the spatial redundancy embedded within the image effectively that composed of two parts, the mathematical model and the residual. In this paper, two stages proposed technqies adopted, that starts by utilizing the lossy predictor model along with multiresolution base and thresholding techniques corresponding to first stage. Latter by incorporating the near lossless com
... Show More