Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreEach project management system aims to complete the project within its identified objectives: budget, time, and quality. It is achieving the project within the defined deadline that required careful scheduling, that be attained early. Due to the nature of unique repetitive construction projects, time contingency and project uncertainty are necessary for accurate scheduling. It should be integrated and flexible to accommodate the changes without adversely affecting the construction project’s total completion time. Repetitive planning and scheduling methods are more effective and essential. However, they need continuous development because of the evolution of execution methods, essent
Incremental sheet metal forming is a modern technique of sheet metal forming in which a uniform sheet is locally deformed during the progressive action of a forming tool. The tool movement is governed by a CNC milling machine. The tool locally deforms by this way the sheet with pure deformation stretching. In SPIF process, the research is concentrate on the development of predict models for estimate the product quality. Using simulated annealing algorithm (SAA), Surface quality in SPIF has been modeled. In the development of this predictive model, spindle speed, feed rate and step depth have been considered as model parameters. Maximum peak height (Rz) and Arithmetic mean surface roughness (Ra) are used as response parameter to assess th
... Show MoreIn this work, effects of using different evaporative cooling pads (ECPs) on the energetic and exergetic efficiency of a direct evaporative air cooler (DEAC) have been theoretically and experimentally investigated. Three types of ECPs were used, i.e., honeycomb cellulose cooler pad (HCCP), shading-cloth cooler pad (SCCP), and aspen wood wool cooler pad (AWWCP). For SCCP and AWWCP, a 3-cm pad thickness was used, while for the HCCP, three different values of pad thickness were used, i.e., 3, 5, and 7 cm. Tests were carried out using air velocities of 8, 14, and 19 m/s, measured at the DEAC outlet. Engineering equation solver (EES) used for performing the required calculations of the various parameters affecting the thermal performance of the D
... Show MoreNowadays, internet security is a critical concern; the One of the most difficult study issues in network security is "intrusion detection". Fight against external threats. Intrusion detection is a novel method of securing computers and data networks that are already in use. To boost the efficacy of intrusion detection systems, machine learning and deep learning are widely deployed. While work on intrusion detection systems is already underway, based on data mining and machine learning is effective, it requires to detect intrusions by training static batch classifiers regardless considering the time-varying features of a regular data stream. Real-world problems, on the other hand, rarely fit into models that have such constraints. Furthermor
... Show MorePhase change materials (PCMs) such as paraffin wax can be used to store or release large amount of energy at certain temperature at which their solid-liquid phase changes occurs. Paraffin wax that used in latent heat thermal energy storage (LHTES) has low thermal conductivity. In this study, the thermal conductivity of paraffin wax has been enhanced by adding different mass concentration (1wt.%, 3wt.%, 5wt.%) of (TiO2) nano-particles with about (10nm) diameter. It is found that the phase change temperature varies with adding (TiO2) nanoparticles in to the paraffin wax. The thermal conductivity of the composites is found to decrease with increasing temperature. The increase in thermal conductivity ha
... Show More