With the proliferation of both Internet access and data traffic, recent breaches have brought into sharp focus the need for Network Intrusion Detection Systems (NIDS) to protect networks from more complex cyberattacks. To differentiate between normal network processes and possible attacks, Intrusion Detection Systems (IDS) often employ pattern recognition and data mining techniques. Network and host system intrusions, assaults, and policy violations can be automatically detected and classified by an Intrusion Detection System (IDS). Using Python Scikit-Learn the results of this study show that Machine Learning (ML) techniques like Decision Tree (DT), Naïve Bayes (NB), and K-Nearest Neighbor (KNN) can enhance the effectiveness of an Intrusion Detection System (IDS). Success is measured by a variety of metrics, including accuracy, precision, recall, F1-Score, and execution time. Applying feature selection approaches such as Analysis of Variance (ANOVA), Mutual Information (MI), and Chi-Square (Ch-2) reduced execution time, increased detection efficiency and accuracy, and boosted overall performance. All classifiers achieve the greatest performance with 99.99% accuracy and the shortest computation time of 0.0089 seconds while using ANOVA with 10% of features.
Abstract  
... Show MoreIn the image processing’s field and computer vision it’s important to represent the image by its information. Image information comes from the image’s features that extracted from it using feature detection/extraction techniques and features description. Features in computer vision define informative data. For human eye its perfect to extract information from raw image, but computer cannot recognize image information. This is why various feature extraction techniques have been presented and progressed rapidly. This paper presents a general overview of the feature extraction categories for image.
Centric study on the interest of the Directorate General of Training and Development / Ministry of Electricity to consolidate the concept of process and enhancement of knowledge in the areas of organizational change، it reached a sample of the study (44) people who are highly heads of departments، technicians and administrators in different sections of the Directorate and by using the correlation coefficient (Spearman) & coefficient of simple regression been tested correlations between variables and the impact of the study، as has been reached to integrate the role of cognitive processes with the areas of organizational change and relationships that were significant at the level of overall dimensions and subsidiary organs.
... Show MoreThe aim of the current research is to identify the effect of the active thinking model in the achievement of students of the fifth grade applied science of physics, and their pivotal thinking by verifying the two zero hypotheses, where there is no significant difference at the level of significance (0.05) between the average scores of the experimental group who studied physics using the active thinking model and the average scores of the control group students who studied the same material in the usual way in the achievement test, as well as in the pivotal thinking test. The research sample consisted of (77) students of the applied fifth grade students in two divisions (a) and (b), randomly selected (a) to be the experimental group, and (b)
... Show MoreAttention increased to the topic of academic accreditation by the university as a modern philosophy by which to improve its performance and provide high-quality education. Universities and colleges in general and Iraqi universities and colleges in particular have begun interest in accreditation and desire to get it. So starting from the pursuit of the Administration and Economics College / Baghdad University in obtaining accreditation of Association to Advance Collegiate Schools of Business (AACSB) The research is present which aims to determine the level of application (AACSB) International standards at the College of Administration and Economics / Baghdad University in preparation to get its accreditation in the future. Researc
... Show MoreAbstract
This research aims to define the roles of auditors by clarifying the concept and risks of cyber security in protecting information and financial data in economic units. Najaf, Babylon and Karbala, then the results were analyzed and the results were presented and analyzed to show that adopting cyber security improves the quality of reports Finance through what it achieves in displaying information with credibility and transparency, in a way that suits the needs of users, and cyber security has a role in managing economic resources more effectively to obtain benefits that would have been lost in the event of an
... Show MoreAcute myeloid leukemia (AML) represents the most prevalent type of acute leukemia in adults and is responsible for approximately 80% of all cases. The tumor suppressor gene (TP53) is a gene that has been frequently studied in cancer, and mutations in this gene account for about 50% of human cancers. This study aims to evaluate the correlation between two single nucleotide polymorphisms (SNPs) in the gene: rs1042522 and rs1642785, and a group of Iraqi patients suffering from pre-diagnostic acute myeloid leukemia (AML). Blood samples were collected from sixty patients (26 males and 34 females) and sixty controls (26 males and 34 females); these subjects were matched in gender, age, and ethnicity. Genomic DNA has been extracted fro
... Show MoreThe study aims at knowing students’ academic assistance at the Department of Kindergarten. It further aims to know the difference of academic assistance among these students with respects to variables like (college of education for women, Baghdad, Thi-Qar). It also aims to know about the difference according to the academic level variable, in addition to its relation to some other variables. To achieve the objectives of the study, a number of university female students were selected from both Baghdad an Thi-Qar Universities in the academic year 2019-2020. The sample of the participants consisted of (400) students from the (second, third, and fourth) levels. To measure the study variable represented by the concept of academic assistance
... Show MoreSovereign wealth funds have attracted the attention of the governments of the oil and non-oil countries alike, with a variation of the size of those funds to those states, based on the size of the financial surpluses resulting from Alriadat oil or foreign reserves, or state revenues for other sovereign assets. Raj use these funds remarkably during the financial crises the world has seen, including the crisis of 2008-2007., And Iraq is a oil-producing countries, which has the third largest reserves of crude oil (Crude Oil) at the level of the Arab world and of 140 300)) million barrels after Saudi Saudi Arabia and the Islamic Republic of Iran, and the fourth reserves of crude oil in the world after issued Venezuela to the reserve
... Show More