Preferred Language
Articles
/
9hdcWZIBVTCNdQwC6azZ
Efficient Intrusion Detection Through the Fusion of AI Algorithms and Feature Selection Methods
...Show More Authors

With the proliferation of both Internet access and data traffic, recent breaches have brought into sharp focus the need for Network Intrusion Detection Systems (NIDS) to protect networks from more complex cyberattacks. To differentiate between normal network processes and possible attacks, Intrusion Detection Systems (IDS) often employ pattern recognition and data mining techniques. Network and host system intrusions, assaults, and policy violations can be automatically detected and classified by an Intrusion Detection System (IDS). Using Python Scikit-Learn the results of this study show that Machine Learning (ML) techniques like Decision Tree (DT), Naïve Bayes (NB), and K-Nearest Neighbor (KNN) can enhance the effectiveness of an Intrusion Detection System (IDS). Success is measured by a variety of metrics, including accuracy, precision, recall, F1-Score, and execution time. Applying feature selection approaches such as Analysis of Variance (ANOVA), Mutual Information (MI), and Chi-Square (Ch-2) reduced execution time, increased detection efficiency and accuracy, and boosted overall performance. All classifiers achieve the greatest performance with 99.99% accuracy and the shortest computation time of 0.0089 seconds while using ANOVA with 10% of features.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Jun 01 2022
Journal Name
Baghdad Science Journal
Variable Selection Using aModified Gibbs Sampler Algorithm with Application on Rock Strength Dataset
...Show More Authors

Variable selection is an essential and necessary task in the statistical modeling field. Several studies have triedto develop and standardize the process of variable selection, but it isdifficultto do so. The first question a researcher needs to ask himself/herself what are the most significant variables that should be used to describe a given dataset’s response. In thispaper, a new method for variable selection using Gibbs sampler techniqueshas beendeveloped.First, the model is defined, and the posterior distributions for all the parameters are derived.The new variable selection methodis tested usingfour simulation datasets. The new approachiscompared with some existingtechniques: Ordinary Least Squared (OLS), Least Absolute Shrinkage

... Show More
View Publication Preview PDF
Scopus (6)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Mon Sep 30 2019
Journal Name
College Of Islamic Sciences
Grammatical and rhetorical methods   In Surat Al - Iftar
...Show More Authors

I started writing the research because of the linguistic and rhetorical methods in the Holy Quran.
This Sura included in all its verses the plural form such as the word planets graves and seas except the word sky was singular as the name of a genus, and this Sura showed the horrors of the Day of Judgment at the world level Included another science is the science of the interview and also came in the repetition and deletion and other linguistic and rhetorical things and concluded this Sura that the goal of breaking the sky and scattering planets and scatter graves is the human himself.
The Koran is a miracle immortal and science is still drawn from him each according to his specialty.

View Publication Preview PDF
Publication Date
Wed Jan 01 2020
Journal Name
Dar Amjad For Publishing And Distribution, The Hashemite Kingdom Of Jordan
Statistical methods for calculating the validity and reliability of tests and measures using IBM SPSS Statistics Version24
...Show More Authors

لقد كان حرص المؤلف على إصدار هذا الكتاب نابعا ً من قناعة تامة بأن مجال التقويم والقياس بحاجة إلى كتاب علمي حديث يتناول عرض أدوات الاختبار والقياس والمتمثلة بالصدق والثبات ويتسم بالوضوح في التعبير عن المفاهيم والمصطلحات والأنواع لكل منها ليكون وسيلة مبسطة بأيدي الأساتذة والباحثين وطلبتي الدراسات العليا الماجستير والدكتوراه لإستخراج صدق وثبات الاختبارات والمقاييس بطرق إحصائية متقدمة من خلال إستخدام البرنا

... Show More
Publication Date
Sun Sep 01 2013
Journal Name
Journal Of Economics And Administrative Sciences
Compared Methods of Generating Both Gamma Distribution and Beta Distribution
...Show More Authors

Beta Distribution

Abstract

             Gamma and Beta Distributions has very important in practice in various areas of statistical and applications reliability and quality control of production. and There are a number of methods to generate data behave on according to these distribution. and These methods bassic primarily on the shape parameters of each distribution and the relationship between these distributions and their relationship with some other probability distributions.    &nb

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Dec 20 2025
Journal Name
Al–bahith Al–a'alami
Methods and Means of public relation in dealing with Bureaucracy
...Show More Authors

The importance of Public Relations activity has increased during the last half of the last century as a specialized and modern administrative function in most institutions. It has, moreover, become an integral part of activities of those institutions of various types, due to its pivotal role in building its reputation and drawing a good mental image among its audiences, as well as its influential and basic role in maintaining communication and the communication between its members at its various levels and their job tasks to ensure the greatest amount of understanding and to enhance trust between them. This is why public relations activity has become indispensable in all institutions, and without it, it is difficult to achieve any coordi

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Dec 16 2018
Journal Name
Al-academy
Guernica Semiotics… methods of Expression between Aesthetic and Semantic Composition
...Show More Authors

This semiotic analytical study has shown that there is a wide diversity in the aesthetic systems and the ranges of reception for the rhetoric and the discourse. The fertility of this semiotic conceptual system monitored this new mature, innovative and advanced level of this new critical analytical method with its different technical and theoretical foundations. Thus, it opened the door wide to new discoveries in the laws, which motivate different artistic texts. Finally, the research is just a start. Can the linguistic methods read the artistic works outside the linguistic authorities? Is it possible to capture the structural transformation in Picasso drawings? Semiotically another researcher in another method (such as deconstruction) ca

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Mar 31 2023
Journal Name
Wasit Journal Of Computer And Mathematics Science
Security In Wireless Sensor Networks Based On Lightweight Algorithms : An Effective Survey
...Show More Authors

At the level of both individuals and companies, Wireless Sensor Networks (WSNs) get a wide range of applications and uses. Sensors are used in a wide range of industries, including agriculture, transportation, health, and many more. Many technologies, such as wireless communication protocols, the Internet of Things, cloud computing, mobile computing, and other emerging technologies, are connected to the usage of sensors. In many circumstances, this contact necessitates the transmission of crucial data, necessitating the need to protect that data from potential threats. However, as the WSN components often have constrained computation and power capabilities, protecting the communication in WSNs comes at a significant performance pena

... Show More
View Publication
Crossref
Publication Date
Mon Feb 21 2022
Journal Name
Iraqi Journal For Computer Science And Mathematics
Fuzzy C means Based Evaluation Algorithms For Cancer Gene Expression Data Clustering
...Show More Authors

The influx of data in bioinformatics is primarily in the form of DNA, RNA, and protein sequences. This condition places a significant burden on scientists and computers. Some genomics studies depend on clustering techniques to group similarly expressed genes into one cluster. Clustering is a type of unsupervised learning that can be used to divide unknown cluster data into clusters. The k-means and fuzzy c-means (FCM) algorithms are examples of algorithms that can be used for clustering. Consequently, clustering is a common approach that divides an input space into several homogeneous zones; it can be achieved using a variety of algorithms. This study used three models to cluster a brain tumor dataset. The first model uses FCM, whic

... Show More
View Publication
Crossref (1)
Crossref
Publication Date
Tue Jan 01 2019
Journal Name
International Journal Of Agricultural And Statistical Sciences,
The comparison of several methods for calculating the degree of heritability and calculating the number of genes II. Yield components
...Show More Authors

Scopus (4)
Scopus
Publication Date
Sun Feb 28 2021
Journal Name
Journal Of Economics And Administrative Sciences
Identifying the leading sector in the Iraqi economy through the interrelationships between sectors - applied research
...Show More Authors

 

   Analyzing the size of the interrelationships between the main economic sectors in the Iraqi economy is an important necessity to know the impact of each sector on other economic sectors on the basis of the interrelationships and reciprocity between them, and what these relationships have achieved in terms of enhancing development and increasing the gross domestic product. To achieve the objectives of the study, we relied on mathematical (quantitative) analysis using user-product tables. Issued by the Ministry of Planning / Central Bureau of Statistics and Research (Directorate of National Accounts) for the economic sectors that make up the Iraqi economy. The study conc

... Show More
View Publication Preview PDF
Crossref