Until recently, researchers have utilized and applied various techniques for intrusion detection system (IDS), including DNA encoding and clustering that are widely used for this purpose. In addition to the other two major techniques for detection are anomaly and misuse detection, where anomaly detection is done based on user behavior, while misuse detection is done based on known attacks signatures. However, both techniques have some drawbacks, such as a high false alarm rate. Therefore, hybrid IDS takes advantage of combining the strength of both techniques to overcome their limitations. In this paper, a hybrid IDS is proposed based on the DNA encoding and clustering method. The proposed DNA encoding is done based on the UNSW-NB15 database by dividing the record's attributes into four groups, including State, Protocol, Service, and the rest of the features is Digits. Four DNA characters were used to represent each protocol attribute values. While two DNA characters are used to represent State, Service and Digits attributes values. Then, the clustering method is applied to classify the records into two clusters, either attack or normal. The current experiment results showed that the proposed system has achieved a good detection rate and accuracy results equal to 81.22% and 82.05% respectively. Also, the system achieved fast encoding and clustering time that equal 0.385 seconds and 0.00325 seconds respectively for each record.
Accurate predictive tools for VLE calculation are always needed. A new method is introduced for VLE calculation which is very simple to apply with very good results compared with previously used methods. It does not need any physical property except each binary system need tow constants only. Also, this method can be applied to calculate VLE data for any binary system at any polarity or from any group family. But the system binary should not confirm an azeotrope. This new method is expanding in application to cover a range of temperature. This expansion does not need anything except the application of the new proposed form with the system of two constants. This method with its development is applied to 56 binary mixtures with 1120 equili
... Show MoreIn this paper flotation method experiments were performed to investigate the removal of lead and zinc. Various parameters such as pH, air flow rate, collector concentrations, collector type and initial metal concentrations were tested in a bubble column of 6 cm inside diameter. High recoveries of the two metals have been obtained by applying the foam flotation process, and at relatively short time 45 minutes . The results show that the best removal of lead about 95% was achieved at pH value of 8 and the best removal of zinc about 93% was achieved
at pH value of 10 by using 100 mg/l of Sodium dodecylsulfate (SDS) as a collector and 1% ethanol as a frother. The results show that the removal efficiency increased with increasing initial m
A simple, cheap, fast, accurate, Safety and sensitive spectrophotometric method for the determination of sulfamethaxazole (SFMx), in pure form and pharmaceutical dosage forms. has been described The Method is based on the diazotization of the drug by sodium nitrite in acidic medium at 5Cº followed by coupling with salbutamol sulphate (SBS) drug to form orange color the product was stabilized and measured at 452 nm Beer’s law is obeyed in the concentration range of 2.5-87.5 ?g ml-1 with molar absorptivity of 2.5x104 L mole-1 cm-1. All variables including the reagent concentration, reaction time, color stability period, and sulfamethaxazole /salbutamol ratio were studied in order to optimize the reaction conditions. No interferences were
... Show MoreThrough the last decade, Integrated Project Delivery (IPD) methodology considers one of the new contractual relations that are also on the way to further integrate the process of combining design and instruction. On the other hand, Building Information Modeling (BIM) made significant advancements in coordinating the planning and construction processes. It is being used more often in conjunction with traditional delivery methods. In this paper, the researcher will present the achievement of IPD methodology by using BIM through applying on the design of the financial commission building in Mayssan Oil Company in Iraq. The building has not been constructed yet and it was designed by usin
Electrochemical method was used to prepare carbon quantum dots (CQDs). Size of matter was nature when evaluate via X-ray diffraction (XRD). A distinct peak at 2θ equal to 31.6° and three other small peaks at 38.28°, 56.41° and 66.12° were observed. The measures of Fourier Transform Infrared Spectroscopy (FTIR) showed the bonds in the transmittance spectrum are manufactured with carbon nanostructures in view. The first peaks are the O–H stretching vibration bands at (3417 and 2922) cm−1, (C–O–H at 1400, and 1317) cm−1, (C–H), (C=C), (C–O–H), (C=O), and (C–O) bonds at 2850, 1668, 1101, and 1026 cm−1 sequentially. The transmission electron microscopy (TEM) results presented that the spherical CQDs are in shape and on a
... Show MoreThe purpose of this work is to concurrently estimate the UVvisible spectra of binary combinations of piroxicam and mefenamic acid using the chemometric approach. To create the model, spectral data from 73 samples (with wavelengths between 200 and 400 nm) were employed. A two-layer artificial neural network model was created, with two neurons in the output layer and fourteen neurons in the hidden layer. The model was trained to simulate the concentrations and spectra of piroxicam and mefenamic acid. For piroxicam and mefenamic acid, respectively, the Levenberg-Marquardt algorithm with feed-forward back-propagation learning produced root mean square errors of prediction of 0.1679 μg/mL and 0.1154 μg/mL, with coefficients of determination of
... Show MoreInformation security in data storage and transmission is increasingly important. On the other hand, images are used in many procedures. Therefore, preventing unauthorized access to image data is crucial by encrypting images to protect sensitive data or privacy. The methods and algorithms for masking or encoding images vary from simple spatial-domain methods to frequency-domain methods, which are the most complex and reliable. In this paper, a new cryptographic system based on the random key generator hybridization methodology by taking advantage of the properties of Discrete Cosine Transform (DCT) to generate an indefinite set of random keys and taking advantage of the low-frequency region coefficients after the DCT stage to pass them to
... Show MoreIn this research, the focus was on estimating the parameters on (min- Gumbel distribution), using the maximum likelihood method and the Bayes method. The genetic algorithmmethod was employed in estimating the parameters of the maximum likelihood method as well as the Bayes method. The comparison was made using the mean error squares (MSE), where the best estimator is the one who has the least mean squared error. It was noted that the best estimator was (BLG_GE).
In IRAQ, the air conditioners are the principal cause of high electrical demand. In summer, the outer temperature sometimes exceeds 500C which significantly effects on the A/C system performance and power consumed. In the present work, the improvement in mechanical and electrical performance of split A/C system is investigated experimentally and analytically. In this paper, performance and energy saving enhancement of a split-A/C system was experimentally investigated to be efficiently compatible with elevated temperature weathers. This improvement is accomplished via Smart Control System integrate with Proportional-Integral- Differential PID algorithm. The PIC16F877A micro-controller has been programmed with the PID and PWM c
... Show More