In this research, the multi-period probabilistic inventory model will be applied to the stores of raw materials used in the leather industry at the General Company for Leather Industries. The raw materials are:Natural leather includes cowhide, whether imported or local, buffalo leather, lamb leather, goat skin, chamois (raw materials made from natural leather), polished leather (raw materials made from natural leather), artificial leather (skai), supplements which include: (cuffs - Clocks - hands - pockets), and threads.This model was built after testing and determining the distribution of demand during the supply period (waiting period) for each material and completely independently from the rest of the materials, as none of the above mate
... Show MoreUntil recently, researchers have utilized and applied various techniques for intrusion detection system (IDS), including DNA encoding and clustering that are widely used for this purpose. In addition to the other two major techniques for detection are anomaly and misuse detection, where anomaly detection is done based on user behavior, while misuse detection is done based on known attacks signatures. However, both techniques have some drawbacks, such as a high false alarm rate. Therefore, hybrid IDS takes advantage of combining the strength of both techniques to overcome their limitations. In this paper, a hybrid IDS is proposed based on the DNA encoding and clustering method. The proposed DNA encoding is done based on the UNSW-NB15
... Show MoreIn this paper, RBF-based multistage auto-encoders are used to detect IDS attacks. RBF has numerous applications in various actual life settings. The planned technique involves a two-part multistage auto-encoder and RBF. The multistage auto-encoder is applied to select top and sensitive features from input data. The selected features from the multistage auto-encoder is wired as input to the RBF and the RBF is trained to categorize the input data into two labels: attack or no attack. The experiment was realized using MATLAB2018 on a dataset comprising 175,341 case, each of which involves 42 features and is authenticated using 82,332 case. The developed approach here has been applied for the first time, to the knowledge of the authors, to dete
... Show MoreAmong many problems that reduced the performance of the network, especially Wide Area Network, congestion is one of these, which is caused when traffic request reaches or exceeds the available capacity of a route, resulting in blocking and less throughput per unit time. Congestion management attributes try to manage such cases. The work presented in this paper deals with an important issue that is the Quality of Service (QoS) techniques. QoS is the combination effect on service level, which locates the user's degree of contentment of the service. In this paper, packet schedulers (FIFO, WFQ, CQ and PQ) were implemented and evaluated under different applications with different priorities. The results show that WFQ scheduler gives acceptable r
... Show MoreThe present study was Conducted to evaluate the effect of amixture of three species of arbuscular mycorrhizal fungi ( Glomus etunicatum , G. leptotichum and Rhizophagus intraradices ) in Influence on the percentage of the components of NPK and protein of tomato leaves and roots infected with Fusarium oxysporum f.sp. Lycopersici wich cause Fusarial wilt disease , planted for 8 weeks in the presence of the organic matter ( peatmose) , using pot cultures in aplastic green house , Results indicated significant increase in the percentage of the elements of NK and protein of tomato leaves and roots In the control treatment (C), While the percentage of the element P was after infection with the pathogen 4 weaks after mycorrhizal colonization in al
... Show MoreAbstract The present study was Conducted to evaluate the effect of amixture of three species of arbuscular mycorrhizal fungi ( Glomus etunicatum , G. leptotichum and Rhizophagus intraradices ) in Influence on the percentage of the components of NPK and protein of tomato leaves and roots infected with Fusarium oxysporum f.sp. Lycopersici wich cause Fusarial wilt disease , planted for 8 weeks in the presence of the organic matter ( peatmose) , using pot cultures in aplastic green house , Results indicated significant increase in the percentage of the elements of NK and protein of tomato leaves and roots In the control treatment (C), While the percentage of the element P was after infection with the pathogen 4 weaks after mycorrhiza
... Show MoreObjective: Detection the presumptive prevalence of silent celiac disease in patients with type 1 diabetes mellitus with determination of which gender more likely to be affected.
Methods: One hundred twenty asymptomatic patients [75 male , 45 female] with type 1 diabetes mellitus with mean age ± SD of 11.25 ± 2.85 year where included in the study . All subjects were serologically screened for the presence of anti-tissue transglutaminase IgA antibodies (anti-tTG antibodies) by Enzyme-Linked Immunosorbent Assay (ELISA) & total IgA was also measured for all using radial immunodiffusion plate . Anti-tissue transglutaminase IgG was selectively done for patients who were expressing negative anti-tissue transglutaminase IgA with low tot
Objective: Detection the presumptive prevalence of
silent celiac disease in patients with type 1 diabetes
mellitus with determination of which gender more
likely to be affected.
Methods: One hundred twenty asymptomatic patients
[75 male , 45 female] with type 1 diabetes mellitus
with mean age ± SD of 11.25 ± 2.85 year where
included in the study . All subjects were serologically
screened for the presence of anti-tissue transglutaminase
IgA antibodies (anti-tTG antibodies) by Enzyme-
Linked Immunosorbent Assay (ELISA) & total IgA
was also measured for all using radial
immunodiffusion plate . Anti-tissue transglutaminase
IgG was selectively done for patients who were
expressing negative anti-
<span>Distributed denial-of-service (DDoS) attack is bluster to network security that purpose at exhausted the networks with malicious traffic. Although several techniques have been designed for DDoS attack detection, intrusion detection system (IDS) It has a great role in protecting the network system and has the ability to collect and analyze data from various network sources to discover any unauthorized access. The goal of IDS is to detect malicious traffic and defend the system against any fraudulent activity or illegal traffic. Therefore, IDS monitors outgoing and incoming network traffic. This paper contains a based intrusion detection system for DDoS attack, and has the ability to detect the attack intelligently, dynami
... Show MoreThis paper presents a modified training method for Recurrent Neural Networks. This method depends on the Non linear Auto Regressive (NARX) model with Modified Wavelet Function as activation function (MSLOG) in the hidden layer. The modified model is known as Modified Recurrent Neural (MRN). It is used for identification Forward dynamics of four Degrees of Freedom (4-DOF) Selective Compliance Assembly Robot Arm (SCARA) manipulator robot. This model is also used in the design of Direct Inverse Control (DIC). This method is compared with Recurrent Neural Networks that used Sigmoid activation function (RS) in the hidden layer and Recurrent Neural Networks with Wavelet activation function (RW). Simulation results shows that the MRN model is bett
... Show More