Botnet is a malicious activity that tries to disrupt traffic of service in a server or network and causes great harm to the network. In modern years, Botnets became one of the threads that constantly evolving. IDS (intrusion detection system) is one type of solutions used to detect anomalies of networks and played an increasing role in the computer security and information systems. It follows different events in computer to decide to occur an intrusion or not, and it used to build a strategic decision for security purposes. The current paper
The present study attempts to find out the effect of some fish preservatives in the laboratory, such as alcohol and dilute formalin, on some biological characteristics related to the body measurements of those fish preserved in these materials. The fish used in this study were the local Planiliza abu. The processes of expansion and contraction of the bodies of fish preserved in diluted formalin solution at a concentration of 10% and diluted ethyl alcohol solution at a concentration of 70%. As that the standard length of the specimens of this study, which are separately preserved in formalin 10% and alcohol 70%, in a completely isolated are fluctuating in change. Constant shrinkage in head length in both diluted formalin and alcohol.
... Show MoreIn this paper, one of the Machine Scheduling Problems is studied, which is the problem of scheduling a number of products (n-jobs) on one (single) machine with the multi-criteria objective function. These functions are (completion time, the tardiness, the earliness, and the late work) which formulated as . The branch and bound (BAB) method are used as the main method for solving the problem, where four upper bounds and one lower bound are proposed and a number of dominance rules are considered to reduce the number of branches in the search tree. The genetic algorithm (GA) and the particle swarm optimization (PSO) are used to obtain two of the upper bounds. The computational results are calculated by coding (progr
... Show MoreSecure data communication across networks is always threatened with intrusion and abuse. Network Intrusion Detection System (IDS) is a valuable tool for in-depth defense of computer networks. Most research and applications in the field of intrusion detection systems was built based on analysing the several datasets that contain the attacks types using the classification of batch learning machine. The present study presents the intrusion detection system based on Data Stream Classification. Several data stream algorithms were applied on CICIDS2017 datasets which contain several new types of attacks. The results were evaluated to choose the best algorithm that satisfies high accuracy and low computation time.
Digital images are open to several manipulations and dropped cost of compact cameras and mobile phones due to the robust image editing tools. Image credibility is therefore become doubtful, particularly where photos have power, for instance, news reports and insurance claims in a criminal court. Images forensic methods therefore measure the integrity of image by apply different highly technical methods established in literatures. The present work deals with copy move forgery images of Media Integration and Communication Center Forgery (MICC-F2000) dataset for detecting and revealing the areas that have been tampered portion in the image, the image is sectioned into non overlapping blocks using Simple
... Show MoreBackground/Objectives: The purpose of current research aims to a modified image representation framework for Content-Based Image Retrieval (CBIR) through gray scale input image, Zernike Moments (ZMs) properties, Local Binary Pattern (LBP), Y Color Space, Slantlet Transform (SLT), and Discrete Wavelet Transform (DWT). Methods/Statistical analysis: This study surveyed and analysed three standard datasets WANG V1.0, WANG V2.0, and Caltech 101. The features an image of objects in this sets that belong to 101 classes-with approximately 40-800 images for every category. The suggested infrastructure within the study seeks to present a description and operationalization of the CBIR system through automated attribute extraction system premised on CN
... Show MoreImproved Merging Multi Convolutional Neural Networks Framework of Image Indexing and Retrieval
In this study, active knife and fixed knife of single-row disc silage machine has three different clearance C1, C2 and C3 (1, 3 and 5 mm) and it is tried in three different working speed V1, V2 and V3 (1.8, 2.5 and 3.7 km / h) and PTO speed (540 min-1) and machine's fuel consumption (l/h), average power consumption (kW), field energy consumption (kW/da), product energy consumption (kW/t), field working capacity (da/h), product working capacity (t/h) and Chopping size distribution characteristics of the fragmented material were determined. It has been found that knife-counter knife clearances smaller than 3 mm (1 mm) and larger (5 mm) have a negative effect on machine performance in general. In terms of fuel and power consumptions, the m
... Show MoreIn this study, the harvest of maize silage with the cross double row sowing method were tested with a single row disc silage machine in two different PTO applications (540 and 540E min-1) and at two different working speeds v1, v2 (1.8 and 2.5 km h-1). The possibilities of harvesting with a single row machine were revealed, and performance characteristics such as hourly fuel consumption, field-product fuel consumption and PTO power consumption were determined in the trials. The best results in terms of hourly fuel consumption and PTO power consumption were determined in the 540E PTO application and V1 working speed. When the fuel consumption of the field-product is evaluated, it is obtained with V2 working speed and 540E PTO application. As
... Show MoreIn the image processing’s field and computer vision it’s important to represent the image by its information. Image information comes from the image’s features that extracted from it using feature detection/extraction techniques and features description. Features in computer vision define informative data. For human eye its perfect to extract information from raw image, but computer cannot recognize image information. This is why various feature extraction techniques have been presented and progressed rapidly. This paper presents a general overview of the feature extraction categories for image.