Intrusion detection systems (IDS) are useful tools that help security administrators in the developing task to secure the network and alert in any possible harmful event. IDS can be classified either as misuse or anomaly, depending on the detection methodology. Where Misuse IDS can recognize the known attack based on their signatures, the main disadvantage of these systems is that they cannot detect new attacks. At the same time, the anomaly IDS depends on normal behaviour, where the main advantage of this system is its ability to discover new attacks. On the other hand, the main drawback of anomaly IDS is high false alarm rate results. Therefore, a hybrid IDS is a combination of misuse and anomaly and acts as a solution to overcome the disadvantages of these two methods. In this paper, a new hybrid IDS is proposed based on the RNA encoding idea and applying the K-means clustering algorithm. Firstly, choosing random records for both training and testing. Secondly, propose RNA encoding by calculating all possible record values within dataset and generating RNA characters for each value, then dividing it into blocks. The third step is done by searching and extracting normal keys based on the most repeated blocks, and the same procedure is applied to extract the attack keys. Finally, the Kmeans clustering method is used to classify the testing records based on extracted keys. The proposed method is evaluated by calculating the detection rate (DR), false alarm rate (FAR), and accuracy, where the achieved DR, FAR, and accuracy are equal to 91.13%, 0.46%, and 92.02% respectively. Based on the achieved results, it can be said that the proposed hybrid IDS has high DR and accuracy results, can detect new attacks, and can solve the problem of anomaly IDS by getting a low false alarm rate result.
In this paper, simulation studies and applications of the New Weibull-Inverse Lomax (NWIL) distribution were presented. In the simulation studies, different sample sizes ranging from 30, 50, 100, 200, 300, to 500 were considered. Also, 1,000 replications were considered for the experiment. NWIL is a fat tail distribution. Higher moments are not easily derived except with some approximations. However, the estimates have higher precisions with low variances. Finally, the usefulness of the NWIL distribution was illustrated by fitting two data sets
Binary mixtures of three heavy oil-stocks had been subjected to density measurments. The data had been aquired on the volumetric behaviour of these systems. The heavy oil-stocks used were of good varity, namely 40 stock , 60 stock, and 150 stock, 40 stock is the lightest one with the API gravity 33.7 while 60 stock is middle type and 150 stock is heavy one, with API gravity 27.7 and 23.8 respectively. Stocks with Kerosene or Xylene for non-ideal mixtures for which excess volume can be positive or negative. Mixture of heavy-oil stocks with paraffinic spike (Kerosene) show negative excess volume. While, aromatic rings results a lower positive excess volume, as shown in Xylene when blending with 40 stock and 60 stock but a negati
... Show MoreBackground: Calcaneus is a spongy cancellous bone with rich blood supply , its fracture heals more rapidly providing no occurrence of infection and soft tissue injury around ,no gross malposition of fragments. The associated pain leads to a major impairment in life quality. The aim of treatment for calcaneal fractures is the decrease of pain and rebuilding of walking ability for patients with normal foot shape and the ability to wear normal foot wear. To reduce complications, a minimally invasive technique for the treatment of displaced intra-articular fractures of the calcaneus was preferred to use.
The purpose of this study was to determine whether the closed reduction and percutaneous K. wire fixation of displ
... Show MoreBackground: Calcaneus is a spongy cancellous bone with rich blood supply , its fracture heals more rapidly providing no occurrence of infection and soft tissue injury around ,no gross malposition of fragments. The associated pain leads to a major impairment in life quality. The aim of treatment for calcaneal fractures is the decrease of pain and rebuilding of walking ability for patients with normal foot shape and the ability to wear normal foot wear. To reduce complications, a minimally invasive technique for the treatment of displaced intra-articular fractures of the calcaneus was preferred to use. The purpose of this study was to determine whether the closed reduction and percutaneous K. wire fixation of displaced intra-art
... Show MoreThroughout this paper, a generic iteration algorithm for a finite family of total asymptotically quasi-nonexpansive maps in uniformly convex Banach space is suggested. As well as weak / strong convergence theorems of this algorithm to a common fixed point are established. Finally, illustrative numerical example by using Matlab is presented.
Future wireless networks will require advance physical-layer techniques to meet the requirements of Internet of Everything (IoE) applications and massive communication systems. To this end, a massive MIMO (m-MIMO) system is to date considered one of the key technologies for future wireless networks. This is due to the capability of m-MIMO to bring a significant improvement in the spectral efficiency and energy efficiency. However, designing an efficient downlink (DL) training sequence for fast channel state information (CSI) estimation, i.e., with limited coherence time, in a frequency division duplex (FDD) m-MIMO system when users exhibit different correlation patterns, i.e., span distinct channel covariance matrices, is to date ve
... Show MoreThis study examines the vibrations produced by hydropower operations to improve embankment dam safety. This study consists of two parts: In the first part, ANSYS-CFX was used to generate a three-dimensional (3-D) finite volume (FV) model to simulate a vertical Francis turbine unit in the Mosul hydropower plant. The pressure pattern result of the turbine model was transformed into the dam body to show how the turbine unit's operation affects the dam's stability. The upstream reservoir conditions, various flow rates, and fully open inlet gates were considered. In the second part of this study, a 3-D FE Mosul dam model was simulated using an ANSYS program. The operational turbine model's water pressure pattern is conveyed t
... Show MoreThe goal of this work is to check the presence of PNS (photon number splitting) attack in quantum cryptography system based on BB84 protocol, and to get a maximum secure key length as possible. This was achieved by randomly interleaving decoy states with mean photon numbers of 5.38, 1.588 and 0.48 between the signal states with mean photon numbers of 2.69, 0.794 and 0.24. The average length for a secure key obtained from our system discarding the cases with Eavesdropping was equal to 125 with 20 % decoy states and 82 with 50% decoy states for mean photon number of 0.794 for signal states and 1.588 for decoy states.