With the proliferation of both Internet access and data traffic, recent breaches have brought into sharp focus the need for Network Intrusion Detection Systems (NIDS) to protect networks from more complex cyberattacks. To differentiate between normal network processes and possible attacks, Intrusion Detection Systems (IDS) often employ pattern recognition and data mining techniques. Network and host system intrusions, assaults, and policy violations can be automatically detected and classified by an Intrusion Detection System (IDS). Using Python Scikit-Learn the results of this study show that Machine Learning (ML) techniques like Decision Tree (DT), Naïve Bayes (NB), and K-Nearest Neighbor (KNN) can enhance the effectiveness of an Intrusion Detection System (IDS). Success is measured by a variety of metrics, including accuracy, precision, recall, F1-Score, and execution time. Applying feature selection approaches such as Analysis of Variance (ANOVA), Mutual Information (MI), and Chi-Square (Ch-2) reduced execution time, increased detection efficiency and accuracy, and boosted overall performance. All classifiers achieve the greatest performance with 99.99% accuracy and the shortest computation time of 0.0089 seconds while using ANOVA with 10% of features.
A study is made about the size and dynamic activity of sunspot using automatically detecting Matlab code ''mySS .m'' written for this purpose which mainly finds a good estimate about Sunspot diameter (in km). Theory of the Sunspot size has been described using equations, where the growth and decay phases and the area of Sunspot could be calculated. Two types of images, namely H-alpha and HMI magnetograms, have been implemented. The results are divided into four main parts. The first part is sunspot size automatic detection by the Matlab program. The second part is numerical calculations of Sunspot growth and decay phases. The third part is the calculation of Sunspot area. The final part is to explain the Sunspot activit
... Show MoreIn order to achieve overall balance in the economy to be achieved in different markets and at one time (market commodity, monetary and labor market and the balance of payments and public budget), did not provide yet a model from which to determine the overall balance in the economy and the difficulty of finding the inter-relationship between all these markets and put them applied in the form of allowing the identification of balance in all markets at once.
One of the best models that have dealt with this subject is a model
(LM-BP-IS), who teaches balance in the commodity market and money market and balance of payments and the importance of this issue This research tries to shed light on the reality
Attacking a transferred data over a network is frequently happened millions time a day. To address this problem, a secure scheme is proposed which is securing a transferred data over a network. The proposed scheme uses two techniques to guarantee a secure transferring for a message. The message is encrypted as a first step, and then it is hided in a video cover. The proposed encrypting technique is RC4 stream cipher algorithm in order to increase the message's confidentiality, as well as improving the least significant bit embedding algorithm (LSB) by adding an additional layer of security. The improvement of the LSB method comes by replacing the adopted sequential selection by a random selection manner of the frames and the pixels wit
... Show MoreThis study has been developed axes of the search, including: Search (deliberative) language and idiomatically, and Description Language (b social phenomenon), and the definition of the theory of (acts of speech), and discussed the problem of the conflict between tradition and innovation, as defined objectively have a target aimed at reviving the deliberative thought when Arab scholars , and the balance between the actual done Arab and Western rhetoric, but Meet in intellectual necessity, a sober reading that preserve the Arab language prestige, and its position in the light of the growing tongue Sciences, as long as we have inherited minds unique, and heritage huge able to consolidate the Arab theory lingual in linguistics.
This research concerns study the crack growth in the wall of pipes made of low carbon steel under the impact load and using the effect of hygrothermal (rate of moisture 50% and 50℃ temperature). The environmental conditions were controlled using high accuracy digital control with sensors. The pipe have a crack already. The test was performed and on two type of specimens, one have length of 100cm and other have length 50cm. The results were, when the humidity was applied to the pipe, the crack would enhance to growth (i.e. the number of cycles needed to growth the crack will reduce). In addition, when the temperature was increase the number of cycles needed to growth the crack are reduced because the effect of heat on the mechanical pro
... Show MoreThis search concerns study the crack growth in the wall of pipes made of low carbon steel under the impact load and using the effect of moisture (rate of moisture 50%). The environmental conditions were controlled using high accuracy digital control with sensors. The pipe has a crack already. The test was performed and on two type of specimens, one has a length of 100cm and other have length 50cm. The results were, when the humidity was applied to the pipe, the crack would enhance to grow (i.e. the number of cycles needed to grow the crack will reduce). In addition, when the test performed on the specimens of length 50cm the number of cycles needed to grow the crack is increased due to the effect of bending stress on the
... Show MoreChest X-rays have long been used to diagnose pneumothorax. In trauma patients, chest ultrasonography combined with chest CT may be a safer, faster, and more accurate approach. This could lead to better and quicker management of traumatic pneumothorax, as well as enhanced patient safety and clinical results.
The purpose of this study was to assess the efficacy and utility of bedside US chest in identifying traumatic pneumothorax and also its capacity to estimate the extent of the lesion in comparison to the gold standard modality chest computed tomography.
Bacterial vaginosis (BV) is one of the most common genital infections among women in the childbearing age. Many novel, fastidious and uncultivated bacterial species are related with BV. These are called bacterial vaginosis associated bacteria (BVAB), present in trace amount and have a significant role in the infection. A total of 80 vaginal swabs were obtained from 80 pregnant and non-pregnant women. Samples were collected from different hospitals in Baghdad city and Al-Kut city.
Clinically, 60 sample among 80 were gave positive results depending on Nugent score and Amsel criteria ,the Bacteriologicall test showed the percentages of gram negative bacteria (E.coli ,K.pneumoniae, P.mirabilis, Ps.aeruginosaand A. baumanniiwere) were (38.
By optimizing the efficiency of a modular simulation model of the PV module structure by genetic algorithm, under several weather conditions, as a portion of recognizing the ideal plan of a Near Zero Energy Household (NZEH), an ideal life cycle cost can be performed. The optimum design from combinations of NZEH-variable designs, are construction positioning, window-to-wall proportion, and glazing categories, which will help maximize the energy created by photovoltaic panels. Comprehensive simulation technique and modeling are utilized in the solar module I-V and for P-V output power. Both of them are constructed on the famous five-parameter model. In addition, the efficiency of the PV panel is established by the genetic algorithm
... Show More