With the proliferation of both Internet access and data traffic, recent breaches have brought into sharp focus the need for Network Intrusion Detection Systems (NIDS) to protect networks from more complex cyberattacks. To differentiate between normal network processes and possible attacks, Intrusion Detection Systems (IDS) often employ pattern recognition and data mining techniques. Network and host system intrusions, assaults, and policy violations can be automatically detected and classified by an Intrusion Detection System (IDS). Using Python Scikit-Learn the results of this study show that Machine Learning (ML) techniques like Decision Tree (DT), Naïve Bayes (NB), and K-Nearest Neighbor (KNN) can enhance the effectiveness of an Intrusion Detection System (IDS). Success is measured by a variety of metrics, including accuracy, precision, recall, F1-Score, and execution time. Applying feature selection approaches such as Analysis of Variance (ANOVA), Mutual Information (MI), and Chi-Square (Ch-2) reduced execution time, increased detection efficiency and accuracy, and boosted overall performance. All classifiers achieve the greatest performance with 99.99% accuracy and the shortest computation time of 0.0089 seconds while using ANOVA with 10% of features.
The distribution of the intensity of the comet Ison C/2013 is studied by taking its histogram. This distribution reveals four distinct regions that related to the background, tail, coma and nucleus. One dimensional temperature distribution fitting is achieved by using two mathematical equations that related to the coordinate of the center of the comet. The quiver plot of the gradient of the comet shows very clearly that arrows headed towards the maximum intensity of the comet.
There is no doubt that development is a human necessity and an urgent technical imperative that science imposes on all aspects of societal life. Especially in the field of graphic design, as logos are among the most prominent graphic achievements of an interactive nature with the requirements of the technical and functional era to serve the recipient and the continuity of interaction with him through a visual message sent to him constantly to remind him of what he interacted with in advance, which is known as visual identity, and during the process of developing logos especially And by providing designs that suit the contemporary technical and functional development, we often see the logo lose its visual identity. Therefore, the research
... Show MoreBackground: Excessive crying in early
infancy is a common condition that causes a
great deal of concern to the parents and
physician.
Objective: The aim of this study is to find
the underlying etiology of excessive crying in
infancy and to determine how the history,
physical examination, and laboratory
investigations contribute to the final diagnosis.
Method: A prospective study done on 150
afebrile infants less than 4 months of age
visited Al-Elwia hospital for children
complaining of excessive crying of more than
two hours.
The study done over a one year period from
the first of January 2009 to the end of
December 2009.
All febrile infants and those with acute illness
preceding the
China and India are considered both rising countries, and both are among the world's most populous and fastest growing economies. The long-term growth of both China and India has reinforced the importance of their bilateral relationship. The relations between China and India are complex, as relations between them have undergone great changes during the past seven decades, ranging from friendship to hostility. This study proceeds from the hypothesis that the nature and path of Sino-Indian relations after 2013 are affected by several factors and variables, some of which represent opportunities, others represent challenges and obstacles. Several opportunities have contributed to the reformulation of bilateral relations in terms of mutual ga
... Show MoreMaher Harbi's drawings have taken an aesthetic and artistic dimension that leads to creating an approach between what is religious and mundane, between religious and mundane, with the techniques of plastic art, and this is what led the researcher to address this topic and stand on the realistic controversy based on the religious and the secular. Accordingly, the researcher divided the subject of the research into four chapters. The first chapter (the methodological framework) dealt with the research problem, which is summarized in the following question: (What is the dialectic of the reality of Maher Harbi’s drawings between the religious and the secular?) Then the importance of the research manifested in shedding light on the deep str
... Show MoreBrowse Iraqi academic journals and research papers
Cadmium Oxide and Bi doped Cadmium Oxide thin films are prepared by using the chemical spray pyrolysis technique a glass substrate at a temperature of (400?C) with volumetric concentration (2,4)%. The thickness of all prepared films is about (400±20) nm. Transmittance and Absorbance spectra are recorded in the wave length ranged (400-800) nm. The nature of electronic transitions is determined, it is found out that these films have directly allowed transition with an optical energy gap of (2.37( eV for CdO and ) 2.59, 2.62) eV for (2% ,4%) Bi doped CdO respectively. The optical constants have been evaluated before and after doping.
This study deals with the orthographic processing ability of homophones
which can account for variance in word recognition and production skills due to
phonological processing. The study aims at: A)Investigating whether the students
can recognize correct usage and spelling comprehension of different homophones
by using appropriate word that overlapped in both phonology and orthography.
B)Assessing spelling production word association to the written form of the
homophone in the sentence comprehension task. To achieve these aims, two tests
have been conducted and distributed on 50 students at first stage at the College of
Education(Ibn-Rushd) for the academic year 2010-2011. The two tests are exposed
to a jury of