Pattern matching algorithms are usually used as detecting process in intrusion detection system. The efficiency of these algorithms is affected by the performance of the intrusion detection system which reflects the requirement of a new investigation in this field. Four matching algorithms and a combined of two algorithms, for intrusion detection system based on new DNA encoding, are applied for evaluation of their achievements. These algorithms are Brute-force algorithm, Boyer-Moore algorithm, Horspool algorithm, Knuth-Morris-Pratt algorithm, and the combined of Boyer-Moore algorithm and Knuth–Morris– Pratt algorithm. The performance of the proposed approach is calculated based on the executed time, where these algorithms are applied o
... Show MoreMoment invariants have wide applications in image recognition since they were proposed.
The Colour is one of important aspect of human activity, especially in General arts and press, and also is one of the essential elements to achieve and build the idea of design technology in the appropriate places, according to the space of designs work.
In a view of the colour and its relationship with the Semiotics, we can find that the objectives goals at the point of visual formats that’s «oral or written”. In last years, the intellectual concerns of Semiotics through eye contact methods, that’s meaning contact methods for get messages of sense of sight.
The semiotics term Can be defined into: (the sequential feature or network system has relations according agreed language rules, in a particular environment, also is a g
The shift that caused the fading art schools and the brightness of the other, which dictate the work of art based surface and defect lasting regeneration led the researcher to stop at the color of his study, as an element of fixed and mobile at the same time, hard as a lieutenant of the painting plastic and brick construction that supports a painting, The variable that follows the doctrine of the artist and the philosophy of the community, because of the extrapolation of his biography, especially in modern art and beyond is clear that compose a variety of ways and so as to ensure continuity vital to the process of drawing, color in all modes is responsible for editing shapes on the surface imaging is, without a line, shape and dimensions
... Show MoreSimulation of direct current (DC) discharge plasma using
COMSOL Multiphysics software were used to study the uniformity
of deposition on anode from DC discharge sputtering using ring and
disc cathodes, then applied it experimentally to make comparison
between film thickness distribution with simulation results. Both
simulation and experimental results shows that the deposition using
copper ring cathode is more uniformity than disc cathode
This paper describes theoretical modeling of electrostatic mirror based on two cylindrical electrodes, A computational investigation has been carried out on the design and properties of the electrostatic mirror. we suggest a mathematical expression to represent the axial potential of an electrostatic mirror. The beam path by using the Bimurzaev technique have been investigated as a mirror trajectory with the aid of Runge – Kutta method. the electrode shape of mirror two electrode has been determined by using package SIMION computer program . The spherical and chromatic aberrations coefficients of mirror has been computed and normalized in terms of the focal length. The choice of the mirror depends on the op
... Show MoreIn this work a fragile watermarking scheme is presented. This scheme is applied to digital color images in spatial domain. The image is divided into blocks, and each block has its authentication mark embedded in it, we would be able to insure which parts of the image are authentic and which parts have been modified. This authentication carries out without need to exist the original image. The results show the quality of the watermarked image is remaining very good and the watermark survived some type of unintended modification such as familiar compression software like WINRAR and ZIP
Delays occur commonly in construction projects. Assessing the impact of delay is sometimes a contentious
issue. Several delay analysis methods are available but no one method can be universally used over another in
all situations. The selection of the proper analysis method depends upon a variety of factors including
information available, time of analysis, capabilities of the methodology, and time, funds and effort allocated to the analysis. This paper presents computerized schedule analysis programmed that use daily windows analysis method as it recognized one of the most credible methods, and it is one of the few techniques much more likely to be accepted by courts than any other method. A simple case study has been implement