The variability of Candaharia levanderi (Simroth, 1902)(Gastropoda, Stylommatophora, Parmacellidae) in two biotopes (southern and northern slopes, the Kampirtepa gorges, the Kugitang Tau ridge) has been investigated using polymerase chain reaction (PCR) with the implementation of primers, the 18S DNA of the region is amplified, the variability (sharply differing in color) of two populations of C. levanderi is studied .
The first population is in the suburbs of Namangan, (Namangan Region); the second population is in Kampirtepa gorges, Kugitang Tau ridge (Surkhandarya Region). It is established that, most often, the variability of morphological signs is observed on the coloration of mollusks. The development of body coloration is an adaptive feature that reflects the adaptability to certain biotopes on the one hand, and landscape and climatic conditions on the other .
The security of message information has drawn more attention nowadays, so; cryptography has been used extensively. This research aims to generate secured cipher keys from retina information to increase the level of security. The proposed technique utilizes cryptography based on retina information. The main contribution is the original procedure used to generate three types of keys in one system from the retina vessel's end position and improve the technique of three systems, each with one key. The distances between the center of the diagonals of the retina image and the retina vessel's end (diagonal center-end (DCE)) represent the first key. The distances between the center of the radius of the retina and the retina vessel's end (ra
... Show MoreThe rapid development of Internet of Things (IoT) devices and their increasing numbers have caused a tremendous increase in network traffic and a wider range of cyber-attacks. This growing trend has complicated the detection process for traditional intrusion detection systems and heightened the challenges faced by these devices, such as imbalanced and large training data. This study presents a cohesive methodology of a series of intelligent techniques to prepare clean and balanced data for training the first (core) layer of a robust hierarchical intrusion detection system. The methodology was built by cleaning and compressing the data using an Autoencoder and preparing a strong latent space for balancing using a hybrid method that combines
... Show More