Preferred Language
Articles
/
9hdcWZIBVTCNdQwC6azZ
Efficient Intrusion Detection Through the Fusion of AI Algorithms and Feature Selection Methods
...Show More Authors

With the proliferation of both Internet access and data traffic, recent breaches have brought into sharp focus the need for Network Intrusion Detection Systems (NIDS) to protect networks from more complex cyberattacks. To differentiate between normal network processes and possible attacks, Intrusion Detection Systems (IDS) often employ pattern recognition and data mining techniques. Network and host system intrusions, assaults, and policy violations can be automatically detected and classified by an Intrusion Detection System (IDS). Using Python Scikit-Learn the results of this study show that Machine Learning (ML) techniques like Decision Tree (DT), Naïve Bayes (NB), and K-Nearest Neighbor (KNN) can enhance the effectiveness of an Intrusion Detection System (IDS). Success is measured by a variety of metrics, including accuracy, precision, recall, F1-Score, and execution time. Applying feature selection approaches such as Analysis of Variance (ANOVA), Mutual Information (MI), and Chi-Square (Ch-2) reduced execution time, increased detection efficiency and accuracy, and boosted overall performance. All classifiers achieve the greatest performance with 99.99% accuracy and the shortest computation time of 0.0089 seconds while using ANOVA with 10% of features.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Jun 19 2019
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Efficient of Government Organization to attain the Ten Recommendation of social Responsibility
...Show More Authors

   In this study, the researcher aimed to define and measure the relevance and effect of the governmental organizations in complying with Iraqi Ministry of Transportation's requirements towards achieving the social responsibility, embodied in the ten commandments of the United Nations Findings displayed the availability of realization regarding organization managers towards social responsibility with their various capabilities and tendencies in relation with the representing entries of those Ten Commandments.The study showed the relation between the effectiveness of those organizations and dimensions of the ten commandments of social responsibility, with the existence of a significant effect for the said effectiveness on achiev

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Jan 01 2011
Journal Name
International Journal Of Data Analysis Techniques And Strategies
A class of efficient and modified testimators for the mean of normal distribution using complete data
...Show More Authors

View Publication
Scopus (9)
Crossref (2)
Scopus Crossref
Publication Date
Wed Jul 01 2020
Journal Name
2020 42nd Annual International Conference Of The Ieee Engineering In Medicine & Biology Society (embc)
Recurrent Fusion of Time-Domain Descriptors Improves EMG-based Hand Movement Recognition
...Show More Authors

View Publication
Scopus (1)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Fri Jan 01 2016
Journal Name
Results In Physics
An efficient iterative method for solving the Fokker–Planck equation
...Show More Authors

View Publication
Crossref (8)
Crossref
Publication Date
Sun Jan 01 2017
Journal Name
International Journal Of Advanced Computer Science And Applications
Fast Hybrid String Matching Algorithm based on the Quick-Skip and Tuned Boyer-Moore Algorithms
...Show More Authors

View Publication
Crossref
Publication Date
Tue Jan 01 2019
Journal Name
Technologies And Materials For Renewable Energy, Environment And Sustainability: Tmrees19gr
Theoretical calculations involving a standard neutron yield distribution for the T-T nuclear fusion reaction
...Show More Authors

A standard theoretical neutron energy flux distribution is achieved for the triton-triton nuclear fusion reaction in the range of triton energy about ≤10 MeV. This distribution give raises an evidence to provide the global calculations including the characteristics fusion parameters governing the T-T fusion reaction.

View Publication Preview PDF
Scopus Clarivate Crossref
Publication Date
Sun Mar 13 2016
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
Isolation and Identification of food Probiotic Saccharomyces boulardii by using traditional methods, Vitek 2 system and molecular identification methods.: Isolation and Identification of food Probiotic Saccharomyces boulardii by using traditional methods, Vitek 2 system and molecular identification methods.
...Show More Authors

This study was aimed to isolate and identify Saccharomyces boulardii from Mangosteen fruits (Garcinia mangostana L.) by traditional and molecular identification methods To get safe and healthy foods probiotics for use, The isolates and two commercial strains were subjected to cultural, morphological and biochemical tests, The colonies of the isolates were spherical, smooth, mucoidal, dull and white to cream colour on SD agar media .The shape of cells was globose to ovoid and sometimes with budding, in a single form or clustered like a beehive. The isolates and two commercial strains were unable to metabolized galactose and lactose , Results shows that all isolates were unable to utilize potassium nitrate and not grow in the presence of (

... Show More
View Publication Preview PDF
Publication Date
Mon Aug 21 2023
Journal Name
Sport Tk-revista Euroamericana De Ciencias Del Deporte
Determining the grades and standard levels of some mental skills as an indicator for the selection of young volleyball players
...Show More Authors

ABSTRACT Purpose: The determination of standard scores and levels for some mental skills by researchers is of great importance, especially if it matches the target research sample, Method: as the researchers used the descriptive approach in the survey method, and the researchers chose the sample of youth players for clubs for the season (2022-2021), numbering (127) players, and the researchers identified the scale and procedures and applied it to the research sample, Results: obtained the results that were processed, extracted grades and standard levels, and then interpreted them and obtained conclusions, Conclusion: the most important of which are: The standard levels of mental skills reached the results of the sample studied within the

... Show More
View Publication
Publication Date
Mon Jun 22 2020
Journal Name
Baghdad Science Journal
Using Evolving Algorithms to Cryptanalysis Nonlinear Cryptosystems
...Show More Authors

            In this paper, new method have been investigated using evolving algorithms (EA's) to cryptanalysis one of the nonlinear stream cipher cryptosystems which depends on the Linear Feedback Shift Register (LFSR) unit by using cipher text-only attack. Genetic Algorithm (GA) and Ant Colony Optimization (ACO) which are used for attacking one of the nonlinear cryptosystems called "shrinking generator" using different lengths of cipher text and different lengths of combined LFSRs. GA and ACO proved their good performance in finding the initial values of the combined LFSRs. This work can be considered as a warning for a stream cipher designer to avoid the weak points, which may be f

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Tue Nov 01 2016
Journal Name
Indian Journal Of Pathology And Microbiology
Panniculitis is a common unrecognized histopathological feature of cutaneous leishmaniasis
...Show More Authors

KE Sharquie, AF Hameed, AA Noaimi, Indian Journal of Pathology and Microbiology, 2016 - Cited by 12

View Publication
Scopus (7)
Scopus