With the proliferation of both Internet access and data traffic, recent breaches have brought into sharp focus the need for Network Intrusion Detection Systems (NIDS) to protect networks from more complex cyberattacks. To differentiate between normal network processes and possible attacks, Intrusion Detection Systems (IDS) often employ pattern recognition and data mining techniques. Network and host system intrusions, assaults, and policy violations can be automatically detected and classified by an Intrusion Detection System (IDS). Using Python Scikit-Learn the results of this study show that Machine Learning (ML) techniques like Decision Tree (DT), Naïve Bayes (NB), and K-Nearest Neighbor (KNN) can enhance the effectiveness of an Intrusion Detection System (IDS). Success is measured by a variety of metrics, including accuracy, precision, recall, F1-Score, and execution time. Applying feature selection approaches such as Analysis of Variance (ANOVA), Mutual Information (MI), and Chi-Square (Ch-2) reduced execution time, increased detection efficiency and accuracy, and boosted overall performance. All classifiers achieve the greatest performance with 99.99% accuracy and the shortest computation time of 0.0089 seconds while using ANOVA with 10% of features.
AA Abbass, HL Hussein, WA Shukur, J Kaabi, R Tornai, Webology, 2022 Individual’s eye recognition is an important issue in applications such as security systems, credit card control and guilty identification. Using video images cause to destroy the limitation of fixed images and to be able to receive users’ image under any condition as well as doing the eye recognition. There are some challenges in these systems; changes of individual gestures, changes of light, face coverage, low quality of video images and changes of personal characteristics in each frame. There is a need for two phases in order to do the eye recognition using images; revelation and eye recognition which will use in the security systems to identify the persons. The mai
... Show MoreImage databases are increasing exponentially because of rapid developments in social networking and digital technologies. To search these databases, an efficient search technique is required. CBIR is considered one of these techniques. This paper presents a multistage CBIR to address the computational cost issues while reasonably preserving accuracy. In the presented work, the first stage acts as a filter that passes images to the next stage based on SKTP, which is the first time used in the CBIR domain. While in the second stage, LBP and Canny edge detectors are employed for extracting texture and shape features from the query image and images in the newly constructed database. The p
Digital change detection is the process that helps in determining the changes associated with land use and land cover properties with reference to geo-registered multi temporal remote sensing data. In this research change detection techniques have been employed to detect the changes in marshes in south of Iraq for two period the first one from 1973 to 1984 and the other from 1973 to 2014 three satellite images had been captured by land sat in different period. Preprocessing such as geo-registered, rectification and mosaic process have been done to prepare the satellite images for monitoring process. supervised classification techniques such maximum likelihood classification has been used to classify the studied area, change detection aft
... Show MoreIslamic law has relied on a number of sources in order to denote the rulings issued by them, including what is original and what is sub, and it is known to all scholars, that the Prophet's Sunnah is the second major source after the Koran, which separated the overall and devoted its year and restricted absolute. God Almighty obeyed the owner and his followers, and that his obedience of obedience to God Almighty said: (Who obeys the messenger has obeyed God) (women: 80), and then between the peasant who believes in him and his victory and follow him, he said: (and he said: And the one who was revealed with them were the successful ones (al-A'raf: 157).
It is known that the Sunnah commanded to follow is the
This article discusses the change of values in urban family, because of various communication media and modern technologies as one of the most important factors affecting the changing family values in urban areas, this means becoming part of urban life. And focuses on the family in urban areas, for the privacy of the social, economic, demographic and cultural help to this effect, and because cities are the most friction and interaction with modern technologies.
The problem of the current paper is embodied in the weakness of the female students
of the department of the Quran sciences in the college of Education for Women in the
University of Baghdad in the subject of reciting and memorizing the Holy Quran. This is what
the professors and the scientific and educational supervisors stress equally through their visits
to the students applicants during the period of their practical application of teaching in the
schools; especially that the subject is thought for four years during their study in the college.
That weakness is so explicit with a quite large number of the students-applicants, who are
supposed to be the future teachers in the subject of the Holy Quran and Islamic Ed
Because of the experience of the mixture problem of high correlation and the existence of linear MultiCollinearity between the explanatory variables, because of the constraint of the unit and the interactions between them in the model, which increases the existence of links between the explanatory variables and this is illustrated by the variance inflation vector (VIF), L-Pseudo component to reduce the bond between the components of the mixture.
To estimate the parameters of the mixture model, we used in our research the use of methods that increase bias and reduce variance, such as the Ridge Regression Method and the Least Absolute Shrinkage and Selection Operator (LASSO) method a
... Show MoreSoftware Defined Network (SDN) is a new technology that separate the control plane from the data plane. SDN provides a choice in automation and programmability faster than traditional network. It supports the Quality of Service (QoS) for video surveillance application. One of most significant issues in video surveillance is how to find the best path for routing the packets between the source (IP cameras) and destination (monitoring center). The video surveillance system requires fast transmission and reliable delivery and high QoS. To improve the QoS and to achieve the optimal path, the SDN architecture is used in this paper. In addition, different routing algorithms are used with different steps. First, we eva
... Show More
