Secure data communication across networks is always threatened with intrusion and abuse. Network Intrusion Detection System (IDS) is a valuable tool for in-depth defense of computer networks. Most research and applications in the field of intrusion detection systems was built based on analysing the several datasets that contain the attacks types using the classification of batch learning machine. The present study presents the intrusion detection system based on Data Stream Classification. Several data stream algorithms were applied on CICIDS2017 datasets which contain several new types of attacks. The results were evaluated to choose the best algorithm that satisfies high accuracy and low computation time.
One of the most important features of the Amazon Web Services (AWS) cloud is that the program can be run and accessed from any location. You can access and monitor the result of the program from any location, saving many images and allowing for faster computation. This work proposes a face detection classification model based on AWS cloud aiming to classify the faces into two classes: a non-permission class, and a permission class, by training the real data set collected from our cameras. The proposed Convolutional Neural Network (CNN) cloud-based system was used to share computational resources for Artificial Neural Networks (ANN) to reduce redundant computation. The test system uses Internet of Things (IoT) services through our ca
... Show MoreIn this work laser detection and tracking system (LDTS) is designed and implemented using a fuzzy logic controller (FLC). A 5 mW He-Ne laser system and an array of nine PN photodiodes are used in the detection system. The FLC is simulated using MATLAB package and the result is stored in a lock up table to use it in the real time operation of the system. The results give a good system response in the target detection and tracking in the real time operation.
In recent years, there has been expanding development in the vehicular part and the number of vehicles moving on the roads in all the sections of the country. Arabic vehicle number plate identification based on image processing is a dynamic area of this work; this technique is used for security purposes such as tracking of stolen cars and access control to restricted areas. The License Plate Recognition System (LPRS) exploits a digital camera to capture vehicle plate numbers is used as input to the proposed recognition system. Basically, the proposed system consists of three phases, vehicle license plate localization, character segmentation, and character recognition, the License Plate (LP) detection is presented using canny edge detection
... Show MoreIn recent years, there has been expanding development in the vehicular part and the number of vehicles moving on the roads in all the sections of the country. Arabic vehicle number plate identification based on image processing is a dynamic area of this work; this technique is used for security purposes such as tracking of stolen cars and access control to restricted areas. The License Plate Recognition System (LPRS) exploits a digital camera to capture vehicle plate numbers is used as input to the proposed recognition system. Basically, the proposed system consists of three phases, vehicle license plate localization, character segmentation, and character recognition, the
... Show MoreAbstract
The study seeks to use one of the techniques (Data mining) a (Logic regression) on the inherited risk through the use of style financial ratios technical analysis and then apply for financial fraud indicators,Since higher scandals exposed companies and the failure of the audit process has shocked the community and affected the integrity of the auditor and the reason is financial fraud practiced by the companies and not to the discovery of the fraud by the auditor, and this fraud involves intentional act aimed to achieve personal and harm the interests of to others, and doing (administration, staff) we can say that all frauds carried out through the presence of the motives and factors that help th
... Show MoreA water resources management for earthen canal/stream is introduced through creating a combination procedure between a field study and the scientific analytical concepts that distinguish the hydraulic problems on this type of stream with using the facilities that are available in HECRAS software; aiming to point the solutions of these problems. Al Mahawil stream is an earthen canal which is subjected to periodic changes in cross sections due to scour, deposition, and incorrect periodic dredging processes due to growth of the Ceratophyllum plants and weeds on the bed and banks of the stream; which affect the characteristics of the flow. This research aims to present a strategy of water resources management through a field study that conducte
... Show MoreThis paper proposes two hybrid feature subset selection approaches based on the combination (union or intersection) of both supervised and unsupervised filter approaches before using a wrapper, aiming to obtain low-dimensional features with high accuracy and interpretability and low time consumption. Experiments with the proposed hybrid approaches have been conducted on seven high-dimensional feature datasets. The classifiers adopted are support vector machine (SVM), linear discriminant analysis (LDA), and K-nearest neighbour (KNN). Experimental results have demonstrated the advantages and usefulness of the proposed methods in feature subset selection in high-dimensional space in terms of the number of selected features and time spe
... Show MorePorosity and pore structure are important characteristics of pharmaceutical tablets, since they influence the physical properties, such as mechanical strength, density and disintegration time. This paper is an attempt to investigate the pore structure of four different paracetamol tablets based on mercury porosimetry. The intrusion volumes of mercury were used to calculate the pore diameter, pore volume and pore size distribution. The result obtained indicate that the variation of the pore volume in the tablets followed the sequence:- S.D.I. Iraq? Pharmacare,Dubai-U.A.E.? Bron and Burk(UK) London?Lark Laboratories(India), while the variation of surface area followed the sequence:- S.D.I. Iraq? Lark Laboratories(India)? Pharmacare,Dubai-U.A
... Show MorePortable devices such as smartphones, tablet PCs, and PDAs are a useful combination of hardware and software turned toward the mobile workers. While they present the ability to review documents, communicate via electronic mail, appointments management, meetings, etc. They usually lack a variety of essential security features. To address the security concerns of sensitive data, many individuals and organizations, knowing the associated threats mitigate them through improving authentication of users, encryption of content, protection from malware, firewalls, intrusion prevention, etc. However, no standards have been developed yet to determine whether such mobile data management systems adequately provide the fu
... Show MoreIn this work Laser wireless video communication system using intensity modualtion direct
detection IM/DD over a 1 km range between transmitter and receiver is experimentally investigated and
demonstrated. Beam expander and beam collimeter were implemented to collimete laser beam at the
transmitter and focus this beam at the receiver respectively. The results show that IM/DD communication
sysatem using laser diode is quite attractive for transmitting video signal. In this work signal to noise
ratio (S/N) higher than 20 dB is achieved in this work.