With the proliferation of both Internet access and data traffic, recent breaches have brought into sharp focus the need for Network Intrusion Detection Systems (NIDS) to protect networks from more complex cyberattacks. To differentiate between normal network processes and possible attacks, Intrusion Detection Systems (IDS) often employ pattern recognition and data mining techniques. Network and host system intrusions, assaults, and policy violations can be automatically detected and classified by an Intrusion Detection System (IDS). Using Python Scikit-Learn the results of this study show that Machine Learning (ML) techniques like Decision Tree (DT), Naïve Bayes (NB), and K-Nearest Neighbor (KNN) can enhance the effectiveness of an Intrusion Detection System (IDS). Success is measured by a variety of metrics, including accuracy, precision, recall, F1-Score, and execution time. Applying feature selection approaches such as Analysis of Variance (ANOVA), Mutual Information (MI), and Chi-Square (Ch-2) reduced execution time, increased detection efficiency and accuracy, and boosted overall performance. All classifiers achieve the greatest performance with 99.99% accuracy and the shortest computation time of 0.0089 seconds while using ANOVA with 10% of features.
Community detection is useful for better understanding the structure of complex networks. It aids in the extraction of the required information from such networks and has a vital role in different fields that range from healthcare to regional geography, economics, human interactions, and mobility. The method for detecting the structure of communities involves the partitioning of complex networks into groups of nodes, with extensive connections within community and sparse connections with other communities. In the literature, two main measures, namely the Modularity (Q) and Normalized Mutual Information (NMI) have been used for evaluating the validation and quality of the detected community structures. Althoug
... Show MoreFace recognition system is the most widely used application in the field of security and especially in border control. This system may be exposed to direct or indirect attacks through the use of face morphing attacks (FMAs). Face morphing attacks is the process of producing a passport photo resulting from a mixture of two images, one of which is for an ordinary person and the other is a judicially required. In this case, a face recognition system may allow travel of persons not permitted to travel through face morphing image in a Machine-Readable Electronic Travel Document (eMRTD) or electronic passport at Automatic Border Control (ABC) gates. In creating an electronic passport, most countries rely on applicant to submit ima
... Show MoreAn Auto Crop method is used for detection and extraction signature, logo and stamp from the document image. This method improves the performance of security system based on signature, logo and stamp images as well as it is extracted images from the original document image and keeping the content information of cropped images. An Auto Crop method reduces the time cost associated with document contents recognition. This method consists of preprocessing, feature extraction and classification. The HSL color space is used to extract color features from cropped image. The k-Nearest Neighbors (KNN) classifier is used for classification.
Entrepreneurial culture has emerged as a powerful means of development in many countries of the world and can be regarded as a source of innovation and as a key to sustainable unemployment.
The national economic outlook, which was established by the High Commission for Planning, predicts economic growth of only 2.6% in 2016, this growth will not provide sufficient employment.
Morocco seeks to foster the entrepreneurial spirit of young Moroccans in order to encourage the creation, development of enterprises and the remuneration of investment in the service of employment through various policies that promote the " innovation.
Students and university graduates (including students from Sidi Mohamed Ben Abdellah University in Fez) ar
We have presented the distribution of the exponentiated expanded power function (EEPF) with four parameters, where this distribution was created by the exponentiated expanded method created by the scientist Gupta to expand the exponential distribution by adding a new shape parameter to the cumulative function of the distribution, resulting in a new distribution, and this method is characterized by obtaining a distribution that belongs for the exponential family. We also obtained a function of survival rate and failure rate for this distribution, where some mathematical properties were derived, then we used the method of maximum likelihood (ML) and method least squares developed (LSD)
... Show MoreEye Detection is used in many applications like pattern recognition, biometric, surveillance system and many other systems. In this paper, a new method is presented to detect and extract the overall shape of one eye from image depending on two principles Helmholtz & Gestalt. According to the principle of perception by Helmholz, any observed geometric shape is perceptually "meaningful" if its repetition number is very small in image with random distribution. To achieve this goal, Gestalt Principle states that humans see things either through grouping its similar elements or recognize patterns. In general, according to Gestalt Principle, humans see things through genera
... Show MoreGarlic is rich in nutritional and medicinal value as it has been found that the water extract of garlic plant contains 31% carbohydrates and rich in elements calcium, phosphorus, magnesium, potassium, sodium, iron, zinc, manganese, vitamin C, thiamine, riboflavin, niacin and pyridoxine. The aim of this study was to investigate the effect of garlic extract (
The transfer function model the basic concepts in the time series. This model is used in the case of multivariate time series. As for the design of this model, it depends on the available data in the time series and other information in the series so when the representation of the transfer function model depends on the representation of the data In this research, the transfer function has been estimated using the style nonparametric represented in two method local linear regression and cubic smoothing spline method The method of semi-parametric represented use semiparametric single index model, With four proposals, , That the goal of this research is comparing the capabilities of the above mentioned m
... Show MoreAgriculture improvement is a national economic issue that extremely depends on productivity. The explanation of disease detection in plants plays a significant role in the agriculture field. Accurate prediction of the plant disease can help treat the leaf as early as possible, which controls the economic loss. This paper aims to use the Image processing techniques with Convolutional Neural Network (CNN). It is one of the deep learning techniques to classify and detect plant leaf diseases. A publicly available Plant village dataset was used, which consists of 15 classes, including 12 diseases classes and 3 healthy classes. The data augmentation techniques have been used. In addition to dropout and weight reg
... Show MoreBackground: Enterococcus faecalis is a causative agent for urinary tract infections (UTIs) in Iraq and worldwide, even though it is a commensal bacterium in human and animal intestines. It can cause different illnesses due to its ability to produce various virulence factors. A pore-forming toxin (cytolysin) is the most virulence factor in this bacterium. Objective: This study aims to molecularly investigate the frequency of cytolysin toxin among E. faecalis isolated from UTIs. Methods: A hundred and eighty urine specimens were collected from females diagnosed with UTIs. Traditional laboratory and molecular methods were used for bacterial identification and toxin detection using a modified DNA extraction method. Results: The findings reveal
... Show More