Botnet is a malicious activity that tries to disrupt traffic of service in a server or network and causes great harm to the network. In modern years, Botnets became one of the threads that constantly evolving. IDS (intrusion detection system) is one type of solutions used to detect anomalies of networks and played an increasing role in the computer security and information systems. It follows different events in computer to decide to occur an intrusion or not, and it used to build a strategic decision for security purposes. The current paper
This paper is focused on orthogonal function approximation technique FAT-based adaptive backstepping control of a geared DC motor coupled with a rotational mechanical component. It is assumed that all parameters of the actuator are unknown including the torque-current constant (i.e., unknown input coefficient) and hence a control system with three motor control modes is proposed: 1) motor torque control mode, 2) motor current control mode, and 3) motor voltage control mode. The proposed control algorithm is a powerful tool to control a dynamic system with an unknown input coefficient. Each uncertain parameter/term is represented by a linear combination of weighting and orthogonal basis function vectors. Chebyshev polynomial is used
... Show MoreThe present study attempts to determine the effect of freezing for different periods on preserved bodies of fish in the laboratory to keep for the research and diagnosis of taxonomic studies and not for consumption. It also endeavors to identify the effect of freezing on some morphometric features of the preserved bodies of fishes. Planiliza abu fish were used to conduct the present study. Fish were frozen by regular freezing in the home refrigerator freezer with temperatures reaching four degrees centigrade below zero. Freezing time is distributed over four months; biometric measurements of frozen fish have been taken in these periods represented by body total length, Standard length, and Head length in centimeters using a ruler ve
... Show MoreData mining is a data analysis process using software to find certain patterns or rules in a large amount of data, which is expected to provide knowledge to support decisions. However, missing value in data mining often leads to a loss of information. The purpose of this study is to improve the performance of data classification with missing values, precisely and accurately. The test method is carried out using the Car Evaluation dataset from the UCI Machine Learning Repository. RStudio and RapidMiner tools were used for testing the algorithm. This study will result in a data analysis of the tested parameters to measure the performance of the algorithm. Using test variations: performance at C5.0, C4.5, and k-NN at 0% missi
... Show MoreDiabetic retinopathy (DR) is a diabetes- caused disease that is associated with leakage of fluid from the blood vessels into the retina, leading to its damage. It is one of the most common diseases that can lead to weak vision and even blindness. Exudates is a clear indication of diabetic retinopathy, which is the main cause of blindness in people with diabetes. Therefore, early detection of exudates is a crucial and essential step to prevent blindness and vision loss is in the analysis of digital diabetic retinopathy systems. This paper presents an improved approach for detection of exudates in retina image using supervised-unsupervised Minimum Distance (MD) segmentation method. The suggested system includes three stages; First, a
... Show MoreMH Hamzah, AF Abbas, International Journal of Early Childhood Special Education, 2022
Tin oxide was deposited by using vacuum thermal method on silicon wafer engraved by Computer Numerical Controlled (CNC) Machine. The inscription was engraved by diamond-made brine. Deep 0.05 mm in the form of concentric squares. Electrical results in the dark were shown high value of forward current and the high value of the detection factor from 6.42 before engraving to 10.41 after engraving. (I-V) characters in illumination with powers (50, 100, 150, 200, 250) mW/cm2 show Improved properties of the detector, Especially at power (150, 200, 250) mW/cm2. Response improved in rise time from 2.4 μs to 0.72 μs and time of inactivity improved 515.2 μs to 44.2 μs. Sensitivity angle increased at zone from 40o to 65o.
DeepFake is a concern for celebrities and everyone because it is simple to create. DeepFake images, especially high-quality ones, are difficult to detect using people, local descriptors, and current approaches. On the other hand, video manipulation detection is more accessible than an image, which many state-of-the-art systems offer. Moreover, the detection of video manipulation depends entirely on its detection through images. Many worked on DeepFake detection in images, but they had complex mathematical calculations in preprocessing steps, and many limitations, including that the face must be in front, the eyes have to be open, and the mouth should be open with the appearance of teeth, etc. Also, the accuracy of their counterfeit detectio
... Show MoreThe paper tackles two topics. The first is about the term "Ремейк" which is very common in contemporary Russian literature; it has counterparts such as " Обработка" and " Переделка", where these two may indicate any of the following meanings (remake, reformulate, rewrite, treatment, modification, change). It has been shown that this term does not have a stable definition. Also, the role of this term in literary studies has been mentioned along with how it has come to its peak of use in post-modern literature.
The second is that I have taken a sample of well-known works in Russian literature " On the Eve, On the Eve " by the contemporary Russian writer YevgueniBobov, and shown the effort of the writer
... Show More