The increasing complexity of assaults necessitates the use of innovative intrusion detection systems (IDS) to safeguard critical assets and data. There is a higher risk of cyberattacks like data breaches and unauthorised access since cloud services have been used more frequently. The project's goal is to find out how Artificial Intelligence (AI) could enhance the IDS's ability to identify and classify network traffic and identify anomalous activities. Online dangers could be identified with IDS. An intrusion detection system, or IDS, is required to keep networks secure. We must create efficient IDS for the cloud platform as well, since it is constantly growing and permeating more aspects of our daily life. However, using standard intrusion detection systems in the cloud may provide challenges. The pre-established IDS design may overburden a cloud segment due to the additional detection overhead. Within the framework of an adaptively designed networked system. We demonstrate how to fully use available resources without placing undue load on any one cloud server using an intrusion detection system (IDS) based on neural networks. To even more successfully detect new threats, the suggested IDS make use of neural network machine learning (ML).
This work was conducted to study the extraction of eucalyptus oil from natural plants (Eucalyptus camadulensis leaves) by organic solvents. the effects of the main operating parameters were studied; type of solvent (n-hexane and ethanol), time to reach equilibrium, the temperature (45°C to 65°C) for n-hexane and (45°C to 75°C) for ethanol, solvent to solid ratio (5:1 to 8:1 (v/w)), agitation speed (0 to 900 rpm) and the particle size (0.5 to 2.5 cm) of fresh leaves to find the best processing conditions for the achieving maximum oil yield. The concentration of eucalyptus oil in solvent was measured by using UV-spectrophotometer. The results (for n-hexane) showed that the agitation speed of 900 rpm, temperature 65°C with solvent to soli
... Show MoreAsbestos is a hazard pollutant to human health, exposure to asbestos cause serious health effects and wide range of asbestos-related diseases such as asbestosis, lung cancer and malignant mesothelioma and it has been classified as carcinogen by the World Health Organization WHO which cause a carcinogenic effects. Fibers of asbestos are mainly released from friction product in brakes and clutch linings and from reinforce agent in the asbestos cement industry. The aim of this was to evaluate the levels of asbestos fibers in surroundings air of some dense traffic points in Baghdad, through winter 2020. Materials and Methods: Samples of airs was carried out by directing air flow to a mixed cellulose ester membrane filter mounted on an open face
... Show MoreTraffic loading and environmental factors are among the most serious variables that cause the spoilage of flexible pavements and lead to a decrease in their design life. The objective of this study is to investigate the influence of axle load raise and the change in resilient modulus on the flexible pavement design life. Locally, Highway geometric design code for Iraqi building code has assign certain admissible maximum load limits per every axle truck type that should not be overrun. In this paper nine different axle truck loads (8, 9, 10, 11, 12, 13, 14, 15, and 16) tons, single axle with dual tire and, and two different resilient moduli of asphalt pavement were chosen. The evaluation was carried out assuming high temperature to represent
... Show MoreThe financial fraud considers part of large concept to management and financial corruption, the financial fraud is appeared especially after corporate, that is Emerge agency theory, that is because recognize relationship between the management company and stakeholder, that is through group from constriction in order to block the management to fraud practice, that on the basis was choose another party in order fraud this practice and give opinion on financial statement, that consider basis decision making from stakeholder to basis the report auditor about creditability this is statement that reflect real activity for the company.The Auditor in order to lead work him Full professionalism to must using group from control Techniques, that is
... Show MoreThe most popular medium that being used by people on the internet nowadays is video streaming. Nevertheless, streaming a video consumes much of the internet traffics. The massive quantity of internet usage goes for video streaming that disburses nearly 70% of the internet. Some constraints of interactive media might be detached; such as augmented bandwidth usage and lateness. The need for real-time transmission of video streaming while live leads to employing of Fog computing technologies which is an intermediary layer between the cloud and end user. The latter technology has been introduced to alleviate those problems by providing high real-time response and computational resources near to the
... Show MoreThis study focused on spectral clustering (SC) and three-constraint affinity matrix spectral clustering (3CAM-SC) to determine the number of clusters and the membership of the clusters of the COST 2100 channel model (C2CM) multipath dataset simultaneously. Various multipath clustering approaches solve only the number of clusters without taking into consideration the membership of clusters. The problem of giving only the number of clusters is that there is no assurance that the membership of the multipath clusters is accurate even though the number of clusters is correct. SC and 3CAM-SC aimed to solve this problem by determining the membership of the clusters. The cluster and the cluster count were then computed through the cluster-wise J
... Show MoreIn this paper, the goal of proposed method is to protect data against different types of attacks by unauthorized parties. The basic idea of proposed method is generating a private key from a specific features of digital color image such as color (Red, Green and Blue); the generating process of private key from colors of digital color image performed via the computing process of color frequencies for blue color of an image then computing the maximum frequency of blue color, multiplying it by its number and adding process will performed to produce a generated key. After that the private key is generated, must be converting it into the binary representation form. The generated key is extracted from blue color of keyed image then we selects a c
... Show MoreThe research seeks to examine the image of women in Iraqi films produced after 2003 over the answer to questions such as “ level of the representation of women and appearing in films and features that are attributable to them and their relationships with men and their interests and tendencies , activities and ways and methods pursued to achieve their goals , or what appeared to be trying to achieve and whether made movies vivid and varied models for women, or confined to a rigid model and duplicate Is films raised issues concerning women? The research seeks to examine the image of women in Iraqi films produced after 2003 over the answer to questions such as “ level of the representation of women and appearing in films and features th
... Show MoreGeneral Directorate of Surveying is considered one of the most important sources of maps in Iraq. It produced digital maps for whole Iraq in the last six years. These maps are produced from different data sources with unknown accuracy; therefore, the quality of these maps needs to be assessed. The main aim of this study is to evaluate the positional accuracy of digital maps that produced from General Directorate of Surveying. Two different study areas were selected: AL-Rusafa and AL-Karkh in Baghdad / Iraq with an area of 172.826 and 135.106 square kilometers, respectively. Different statistical analyses were conducted to calculate the elements of positional accuracy assessment (mean µ, root mean square error RMSE, mini
... Show MoreBackground: This study was conducted to evaluate the surface roughness and dimensional accuracy of commercially obtainable alginate impression material in terms of imbibition after immersion in two different media. Materials and method: Two disinfecting agents, ethanol 70% and povidone-iodine 4%, were used to access the dimensional accuracy and surface roughness of alginate impression material. Weights of specimen discs of alginate impressions were measured before and immediately after immersion to gain a measure of imbibition. For surface roughness, disinfected specimens rectangle was examined before and after disinfection. Results: Minimal changes in weight were observed after disinfection, but a statistically non-significant differenc
... Show More