With the proliferation of both Internet access and data traffic, recent breaches have brought into sharp focus the need for Network Intrusion Detection Systems (NIDS) to protect networks from more complex cyberattacks. To differentiate between normal network processes and possible attacks, Intrusion Detection Systems (IDS) often employ pattern recognition and data mining techniques. Network and host system intrusions, assaults, and policy violations can be automatically detected and classified by an Intrusion Detection System (IDS). Using Python Scikit-Learn the results of this study show that Machine Learning (ML) techniques like Decision Tree (DT), Naïve Bayes (NB), and K-Nearest Neighbor (KNN) can enhance the effectiveness of an Intrusion Detection System (IDS). Success is measured by a variety of metrics, including accuracy, precision, recall, F1-Score, and execution time. Applying feature selection approaches such as Analysis of Variance (ANOVA), Mutual Information (MI), and Chi-Square (Ch-2) reduced execution time, increased detection efficiency and accuracy, and boosted overall performance. All classifiers achieve the greatest performance with 99.99% accuracy and the shortest computation time of 0.0089 seconds while using ANOVA with 10% of features.
Digital Elevation Model (DEM) is one of the developed techniques for relief representation. The definition of a DEM construction is the modeling technique of earth surface from existing data. DEM plays a role as one of the fundamental information requirement that has been generally utilized in GIS data structures. The main aim of this research is to present a methodology for assessing DEMs generation methods. The DEMs data will be extracted from open source data e.g. Google Earth. The tested data will be compared with data produced from formal institutions such as General Directorate of Surveying. The study area has been chosen in south of Iraq (Al-Gharraf / Dhi Qar governorate. The methods of DEMs creation are kriging, IDW (inver
... Show MoreThe conjugate coefficient optimal is the very establishment of a variety of conjugate gradient methods. This paper proposes a new class coefficient of conjugate gradient (CG) methods for impulse noise removal, which is based on the quadratic model. Our proposed method ensures descent independent of the accuracy of the line search and it is globally convergent under some conditions, Numerical experiments are also presented for the impulse noise removal in images.
The vegetable cover plays an important role in the environment and Earth resource sciences. In south Iraq, the region is classified as arid or semiarid area due to the low precipitations and high temperature among the year. In this paper, the Landat-8 satellite imagery will be used to study and estimate the vegetable area in south Iraq. For this purpose many vegetation indices will be examined to estimate and extract the area of vegetation contain in and image. Also, the weathering parameters must be investigated to find the relationship between these parameters and the arability of vegetation cover crowing in the specific area. The remote sensing packages and Matlab written subroutines may be use to evaluate the results.
In this paper, we derived an estimator of reliability function for Laplace distribution with two parameters using Bayes method with square error loss function, Jeffery’s formula and conditional probability random variable of observation. The main objective of this study is to find the efficiency of the derived Bayesian estimator compared to the maximum likelihood of this function and moment method using simulation technique by Monte Carlo method under different Laplace distribution parameters and sample sizes. The consequences have shown that Bayes estimator has been more efficient than the maximum likelihood estimator and moment estimator in all samples sizes
In this study different methodological approaches are used and described by many features (indicators) of complex socio-economic process. Outcome of analysis has the most reliable and acceptable representation of the studied process specific to chosen case. In order to solve problems in this area (depending on the situation, case under consideration), methods from two groups are most often used: multidimensional comparative analysis and multi-criteria decision analysis. The first of these cases concern problems at the macro level (socio-economic development, demographic situation, population's living standards, etc.), in which the decisionmaker's participation is relatively small (eg the selection of diagnostic variables or expert assess
... Show MoreAn evaluation was achieved by designing a matlab program to solve Kepler’s equation of an elliptical orbit for methods (Newton-Raphson, Danby, Halley and Mikkola). This involves calculating the Eccentric anomaly (E) from mean anomaly (M=0°-360°) for each step and for different values of eccentricities (e=0.1, 0.3, 0.5, 0.7 and 0.9). The results of E were demonstrated that Newton’s- Raphson Danby’s, Halley’s can be used for e between (0-1). Mikkola’s method can be used for e between (0-0.6).The term that added to Danby’s method to obtain the solution of Kepler’s equation is not influence too much on the value of E. The most appropriate initial Gauss value was also determined to
... Show MoreCompression of speech signal is an essential field in signal processing. Speech compression is very important in today’s world, due to the limited bandwidth transmission and storage capacity. This paper explores a Contourlet transformation based methodology for the compression of the speech signal. In this methodology, the speech signal is analysed using Contourlet transformation coefficients with statistic methods as threshold values, such as Interquartile Filter (IQR), Average Absolute Deviation (AAD), Median Absolute Deviation (MAD) and standard deviation (STD), followed by the application of (Run length encoding) They are exploited for recording speech in different times (5, 30, and 120 seconds). A comparative study of performance
... Show MoreChromium oxide nanoparticles were synthesized using cauliflower extract by two methods: simple chemical method and the sol-gel method. These technologies are new, environmentally friendly and cheap. Cauliflower contains plant materials and biomolecules (chromium, phenols, alkalis, vitamins, amino acids, quinones, etc. (that convert chromium chloride hexahydrate (CrCl3.6H2O) into chromium nanoparticles. The plant extracts also act as diluents, stabilizers and anti-caking agents. X-ray diffraction (XRD) analysis showed that the size of the crystals decreased from (36.1 to 57.8) nm using the simple chemical method to (13.31 to 20.68) nm of Cr2O3 using sol-gel.
... Show MoreThis paper is concerned with studying the numerical solution for the discrete classical optimal control problem (NSDCOCP) governed by a variable coefficients nonlinear hyperbolic boundary value problem (VCNLHBVP). The DSCOCP is solved by using the Galerkin finite element method (GFEM) for the space variable and implicit finite difference scheme (GFEM-IFDS) for the time variable to get the NS for the discrete weak form (DWF) and for the discrete adjoint weak form (DSAWF) While, the gradient projection method (GRPM), also called the gradient method (GRM), or the Frank Wolfe method (FRM) are used to minimize the discrete cost function (DCF) to find the DSCOC. Within these three methods, the Armijo step option (ARMSO) or the optimal step opt
... Show MoreHerein, we report designing a new Δ (delta‐shaped) proton sponge base of 4,12‐dihydrogen‐4,8,12‐triazatriangulene (compound