Nowadays, internet security is a critical concern; the One of the most difficult study issues in network security is "intrusion detection". Fight against external threats. Intrusion detection is a novel method of securing computers and data networks that are already in use. To boost the efficacy of intrusion detection systems, machine learning and deep learning are widely deployed. While work on intrusion detection systems is already underway, based on data mining and machine learning is effective, it requires to detect intrusions by training static batch classifiers regardless considering the time-varying features of a regular data stream. Real-world problems, on the other hand, rarely fit into models that have such constraints. Furthermore, various uses in the real world, Data distributions in intrusion detection systems, for example, are non-stationary, which produce concept drift over time or non-stationary learning. The word "concept drift" is used to describe the process of changing one's mind about something in an online-supervised learning scenario, the connection between the input data and the target variable changes over time. We define adaptive learning, classify existing concept drift strategies, evaluate the most typical, distinct, and widely used approaches and algorithms, describe adaptive algorithm assessment methodology, and show a collection of examples, all of this is based on the assumption that you have a basic understanding of supervised learning. The survey examines the various aspects of concept drift in a comprehensive manner in order to think about the current fragmented "state-of-the-art". As a result, which intends to give scholars, industry analysts, and practitioners a comprehensive introduction to idea drift adaptability.
RM Abbas, AA Abdulhameed, AI Salahaldin, International Conference on Geotechnical Engineering, 2010
In this work Laser wireless video communication system using intensity modualtion direct
detection IM/DD over a 1 km range between transmitter and receiver is experimentally investigated and
demonstrated. Beam expander and beam collimeter were implemented to collimete laser beam at the
transmitter and focus this beam at the receiver respectively. The results show that IM/DD communication
sysatem using laser diode is quite attractive for transmitting video signal. In this work signal to noise
ratio (S/N) higher than 20 dB is achieved in this work.
The goal of this work is to check the presence of PNS (photon number splitting) attack in quantum cryptography system based on BB84 protocol, and to get a maximum secure key length as possible. This was achieved by randomly interleaving decoy states with mean photon numbers of 5.38, 1.588 and 0.48 between the signal states with mean photon numbers of 2.69, 0.794 and 0.24. The average length for a secure key obtained from our system discarding the cases with Eavesdropping was equal to 125 with 20 % decoy states and 82 with 50% decoy states for mean photon number of 0.794 for signal states and 1.588 for decoy states.
One of the most important challenges facing the development of laser weapons is represented by the attenuation of the laser beam as it passed through the layers of atmosphere.This paper presents a theoretical study to simulate the effect of turbulence attenuation and calculates the decrease of laser power in Iraq. The refractive index structure C_n^2 is very important parameter to measure the strength of the atmospheric turbulence, which is affected by microclimate conditions, propagation path, season and time in the day. The results of measurements and predictions are based on the Kolmogorov turbulence theory. It was demonstrated by simulations that the laser weapons in Iraq were severely affected due to the large change in temperatures,
... Show MoreThe investigation of the effect of tempering on thermal analysis of
Al-Ti-Si alloy and its composites with MgO and SiC particles was
performed. Thermal analysis was performed before and after
tempering by DSC scan. Optical microscopy was used to identify the
phases and precipitations that may be formed in base alloy and
composites. X-ray diffraction test indicated that the Al3Ti is the main
phase in Al-Ti-Si alloy in addition to form Al5Ti7Si12 phase. Some
chemical reactions can be occurred between reinforcements and
matrix such as MgO.Al2O3 in Al-Ti/MgO, and Al4C3 and Al(OH)3 in
Al-Ti/SiC composite. X-ray florescence technique is used to
investigate the chemical composition of the fabricated specimens.
H
Face Identification system is an active research area in these years. However, the accuracy and its dependency in real life systems are still questionable. Earlier research in face identification systems demonstrated that LBP based face recognition systems are preferred than others and give adequate accuracy. It is robust against illumination changes and considered as a high-speed algorithm. Performance metrics for such systems are calculated from time delay and accuracy. This paper introduces an improved face recognition system that is build using C++ programming language with the help of OpenCV library. Accuracy can be increased if a filter or combinations of filters are applied to the images. The accuracy increases from 95.5% (without ap
... Show More