With the proliferation of both Internet access and data traffic, recent breaches have brought into sharp focus the need for Network Intrusion Detection Systems (NIDS) to protect networks from more complex cyberattacks. To differentiate between normal network processes and possible attacks, Intrusion Detection Systems (IDS) often employ pattern recognition and data mining techniques. Network and host system intrusions, assaults, and policy violations can be automatically detected and classified by an Intrusion Detection System (IDS). Using Python Scikit-Learn the results of this study show that Machine Learning (ML) techniques like Decision Tree (DT), Naïve Bayes (NB), and K-Nearest Neighbor (KNN) can enhance the effectiveness of an Intrusion Detection System (IDS). Success is measured by a variety of metrics, including accuracy, precision, recall, F1-Score, and execution time. Applying feature selection approaches such as Analysis of Variance (ANOVA), Mutual Information (MI), and Chi-Square (Ch-2) reduced execution time, increased detection efficiency and accuracy, and boosted overall performance. All classifiers achieve the greatest performance with 99.99% accuracy and the shortest computation time of 0.0089 seconds while using ANOVA with 10% of features.
In this study, the researcher aimed to define and measure the relevance and effect of the governmental organizations in complying with Iraqi Ministry of Transportation's requirements towards achieving the social responsibility, embodied in the ten commandments of the United Nations Findings displayed the availability of realization regarding organization managers towards social responsibility with their various capabilities and tendencies in relation with the representing entries of those Ten Commandments.The study showed the relation between the effectiveness of those organizations and dimensions of the ten commandments of social responsibility, with the existence of a significant effect for the said effectiveness on achiev
... Show MoreA standard theoretical neutron energy flux distribution is achieved for the triton-triton nuclear fusion reaction in the range of triton energy about ≤10 MeV. This distribution give raises an evidence to provide the global calculations including the characteristics fusion parameters governing the T-T fusion reaction.
This study was aimed to isolate and identify Saccharomyces boulardii from Mangosteen fruits (Garcinia mangostana L.) by traditional and molecular identification methods To get safe and healthy foods probiotics for use, The isolates and two commercial strains were subjected to cultural, morphological and biochemical tests, The colonies of the isolates were spherical, smooth, mucoidal, dull and white to cream colour on SD agar media .The shape of cells was globose to ovoid and sometimes with budding, in a single form or clustered like a beehive. The isolates and two commercial strains were unable to metabolized galactose and lactose , Results shows that all isolates were unable to utilize potassium nitrate and not grow in the presence of (
... Show MoreABSTRACT Purpose: The determination of standard scores and levels for some mental skills by researchers is of great importance, especially if it matches the target research sample, Method: as the researchers used the descriptive approach in the survey method, and the researchers chose the sample of youth players for clubs for the season (2022-2021), numbering (127) players, and the researchers identified the scale and procedures and applied it to the research sample, Results: obtained the results that were processed, extracted grades and standard levels, and then interpreted them and obtained conclusions, Conclusion: the most important of which are: The standard levels of mental skills reached the results of the sample studied within the
... Show MoreIn this paper, new method have been investigated using evolving algorithms (EA's) to cryptanalysis one of the nonlinear stream cipher cryptosystems which depends on the Linear Feedback Shift Register (LFSR) unit by using cipher text-only attack. Genetic Algorithm (GA) and Ant Colony Optimization (ACO) which are used for attacking one of the nonlinear cryptosystems called "shrinking generator" using different lengths of cipher text and different lengths of combined LFSRs. GA and ACO proved their good performance in finding the initial values of the combined LFSRs. This work can be considered as a warning for a stream cipher designer to avoid the weak points, which may be f
... Show MoreKE Sharquie, AF Hameed, AA Noaimi, Indian Journal of Pathology and Microbiology, 2016 - Cited by 12