With the proliferation of both Internet access and data traffic, recent breaches have brought into sharp focus the need for Network Intrusion Detection Systems (NIDS) to protect networks from more complex cyberattacks. To differentiate between normal network processes and possible attacks, Intrusion Detection Systems (IDS) often employ pattern recognition and data mining techniques. Network and host system intrusions, assaults, and policy violations can be automatically detected and classified by an Intrusion Detection System (IDS). Using Python Scikit-Learn the results of this study show that Machine Learning (ML) techniques like Decision Tree (DT), Naïve Bayes (NB), and K-Nearest Neighbor (KNN) can enhance the effectiveness of an Intrusion Detection System (IDS). Success is measured by a variety of metrics, including accuracy, precision, recall, F1-Score, and execution time. Applying feature selection approaches such as Analysis of Variance (ANOVA), Mutual Information (MI), and Chi-Square (Ch-2) reduced execution time, increased detection efficiency and accuracy, and boosted overall performance. All classifiers achieve the greatest performance with 99.99% accuracy and the shortest computation time of 0.0089 seconds while using ANOVA with 10% of features.
This paper deals with the thirteenth order differential equations linear and nonlinear in boundary value problems by using the Modified Adomian Decomposition Method (MADM), the analytical results of the equations have been obtained in terms of convergent series with easily computable components. Two numerical examples results show that this method is a promising and powerful tool for solving this problems.
Abstract:
This research aims to know the reflection of selection of employees strategy dimensions ( selection of employees strategy standards, procedures selection of employees strategy , efficiency based on a selection of employees strategy) on human capital (knowledge, skills, abilities) in a sample of Lecturers consists of (Deans and assistants and heads of departments) in ( Baghdad University) included nine colleges and university president as total sample size (54), which represent almost 50% of the total research community of 116, was used in the light of the objectives of the research descriptive and analytical approach, has been a resolution main tool for data collection as well as the interview p
... Show MoreText categorization refers to the process of grouping text or documents into classes or categories according to their content. Text categorization process consists of three phases which are: preprocessing, feature extraction and classification. In comparison to the English language, just few studies have been done to categorize and classify the Arabic language. For a variety of applications, such as text classification and clustering, Arabic text representation is a difficult task because Arabic language is noted for its richness, diversity, and complicated morphology. This paper presents a comprehensive analysis and a comparison for researchers in the last five years based on the dataset, year, algorithms and the accuracy th
... Show MoreScientists were interested in the statement of the concept of companions and the definition of the companion in terms of his status or his novel or inherent to the Prophet of Allah (peace be upon him) and was for those who did not walk in the translations and the abundant share in this work, and among these scientists Hafiz Shams al-Din al-Dhahabi, which was translated to the companions His books, indicating their status and effort, and who had a novel of them - what we will see in the folds of the research, God willing -
The research was titled: Approval of the Imam of the Nuclear of Iraqis through the curriculum of the students.
The research revolves around the study of the weight of the imam nuclear jurisprudence in which the views of the Iraqi jurists of the Imam Shafi'i agreed through the book of students' approach to the nuclear imam, the research included a brief translation of the nuclear imam, and the definition of his place in the Shafi'i school, and then the definition of Iraqi jurists and then study the jurisprudence The course of research is only three issues, and compared with the views of imams, and the statement of the most correct opinion, and God and the conciliator.
researcher
A flight simulation programme has been developed on a personal computer using Microsoft
FORTRAN to simulate flight trajectories of a light aircraft by using Six-Degree-of-Freedom
equation of motion. The simulation has been made realistic through pre-programmed the input to
the control surfaces, atmospheric gust during the flight mode. The programme plays an important
role in the evaluation and validation of the aircraft design process. A light aircraft (Cessna 182T)
has been tested through free flight, gliding flight, flight with gust. The results show good trend and
show that the programme could be dependent as a realistic flight test programme.
Segmentation is the process of partition digital images into different parts depending on texture, color, or intensity, and can be used in different fields in order to segment and isolate the area to be partitioned. In this work images of the Moon obtained through observations in Astronomy and space dep. College of science university of Baghdad by ( Toward space telescopes and widespread used of a CCD camera) . Different segmentation methods were used to segment lunar craters. Different celestial objects cause craters when they crash into the surface of the Moon like asteroids and meteorites. Thousands of craters appears on the Moon's surface with ranges in size from meter to many kilometers, it provide insights into the age and geology
... Show More