With the proliferation of both Internet access and data traffic, recent breaches have brought into sharp focus the need for Network Intrusion Detection Systems (NIDS) to protect networks from more complex cyberattacks. To differentiate between normal network processes and possible attacks, Intrusion Detection Systems (IDS) often employ pattern recognition and data mining techniques. Network and host system intrusions, assaults, and policy violations can be automatically detected and classified by an Intrusion Detection System (IDS). Using Python Scikit-Learn the results of this study show that Machine Learning (ML) techniques like Decision Tree (DT), Naïve Bayes (NB), and K-Nearest Neighbor (KNN) can enhance the effectiveness of an Intrusion Detection System (IDS). Success is measured by a variety of metrics, including accuracy, precision, recall, F1-Score, and execution time. Applying feature selection approaches such as Analysis of Variance (ANOVA), Mutual Information (MI), and Chi-Square (Ch-2) reduced execution time, increased detection efficiency and accuracy, and boosted overall performance. All classifiers achieve the greatest performance with 99.99% accuracy and the shortest computation time of 0.0089 seconds while using ANOVA with 10% of features.
Big data analysis is essential for modern applications in areas such as healthcare, assistive technology, intelligent transportation, environment and climate monitoring. Traditional algorithms in data mining and machine learning do not scale well with data size. Mining and learning from big data need time and memory efficient techniques, albeit the cost of possible loss in accuracy. We have developed a data aggregation structure to summarize data with large number of instances and data generated from multiple data sources. Data are aggregated at multiple resolutions and resolution provides a trade-off between efficiency and accuracy. The structure is built once, updated incrementally, and serves as a common data input for multiple mining an
... Show MoreSegmentation is the process of partition digital images into different parts depending on texture, color, or intensity, and can be used in different fields in order to segment and isolate the area to be partitioned. In this work images of the Moon obtained through observations in Astronomy and space dep. College of science university of Baghdad by ( Toward space telescopes and widespread used of a CCD camera) . Different segmentation methods were used to segment lunar craters. Different celestial objects cause craters when they crash into the surface of the Moon like asteroids and meteorites. Thousands of craters appears on the Moon's surface with ranges in size from meter to many kilometers, it provide insights into the age and ge
... Show MoreSegmentation is the process of partition digital images into different parts depending on texture, color, or intensity, and can be used in different fields in order to segment and isolate the area to be partitioned. In this work images of the Moon obtained through observations in Astronomy and space dep. College of science university of Baghdad by ( Toward space telescopes and widespread used of a CCD camera) . Different segmentation methods were used to segment lunar craters. Different celestial objects cause craters when they crash into the surface of the Moon like asteroids and meteorites. Thousands of craters appears on the Moon's surface with ranges in size from meter to many kilometers, it provide insights into the age and geology
... Show MoreBackground: The bond strength of the root canal sealers to dentin is very important property for maintaining the integrity and the seal of root canal filling. The aim of this study was to evaluate and compare the push-out bond strength of root filled with total fill Bioceramic, AH Plus and Gutta-flow®2 sealers using GuttaFusion®obturation system versus single cone obturation technique. Materials and method: sixty of mandibular premolars teeth with straight roots were used in this study, these roots were instrumented using Reciproc system, instrumentation were done with copious irrigation of 3 mL 5.25% sodium hypochlorite solution (NaOCl) during all the steps of preparation, and smear layer will be removed with 1 ml of 17% EDTA kept in
... Show MoreBackground: The bond strength of the root canal sealers to dentin is very important property for maintaining the integrity and the seal of root canal filling. The aim of this study was to evaluate and compare the push-out bond strength of root filled with total fill Bioceramic, AH Plus and Gutta-flow®2 sealers using GuttaFusion®obturation system versus single cone obturation technique. Materials and method: sixty of mandibular premolars teeth with straight roots were used in this study, these roots were instrumented using Reciproc system, instrumentation were done with copious irrigation of 3 mL 5.25% sodium hypochlorite solution (NaOCl) during all the steps of preparation, and smear layer will be removed with 1 ml of 17% EDTA kept in
... Show MoreThis paper shows an approach for Electromyography (ECG) signal processing based on linear and nonlinear adaptive filtering using Recursive Least Square (RLS) algorithm to remove two kinds of noise that affected the ECG signal. These are the High Frequency Noise (HFN) and Low Frequency Noise (LFN). Simulation is performed in Matlab. The ECG, HFN and LFN signals used in this study were downloaded from ftp://ftp.ieee.org/uploads/press/rangayyan/, and then the filtering process was obtained by using adaptive finite impulse response (FIR) that illustrated better results than infinite impulse response (IIR) filters did.
Described the Arabic language being of genius sets by top models of eloquence , rhetoric and clarity of sounds and developments Moreover , it is an important element of our existence and our identity and our survival . That my methods and best in teaching Arabic language what has pursued the easiest ways to learning and teaching and helped learners to be aware of the function linguistic information , and they need it and its impact on their lives , and contributed to unleashing the potential of activism and led them to make the effort to apply them in the form of examples and uses of new life , as well as fits are the capabilities and tendencies of different learners , so the goal of current research into the importance of the curriculum
... Show MoreJurisprudential rulings were not once restricted to anyone. Even if some prominent imams were famous in one science, this does not mean that some of them were not very knowledgeable and well versed in another science, but he did not know much about it, given his fame in the first science in which he emerged. It prevailed over him until he became known only through him, and there are a large number of these people, and among them is our imam, the great critic Yahya bin Ma’in, may God be pleased with him. Many people, and even scholars, know about him except that he is the only imam in jarh and ta’deel, and on his words and the words of his strike are relied upon. In terms of the authenticity and weakness of the hadith, he is in this f
... Show MoreDisease diagnosis with computer-aided methods has been extensively studied and applied in diagnosing and monitoring of several chronic diseases. Early detection and risk assessment of breast diseases based on clinical data is helpful for doctors to make early diagnosis and monitor the disease progression. The purpose of this study is to exploit the Convolutional Neural Network (CNN) in discriminating breast MRI scans into pathological and healthy. In this study, a fully automated and efficient deep features extraction algorithm that exploits the spatial information obtained from both T2W-TSE and STIR MRI sequences to discriminate between pathological and healthy breast MRI scans. The breast MRI scans are preprocessed prior to the feature
... Show More