With the proliferation of both Internet access and data traffic, recent breaches have brought into sharp focus the need for Network Intrusion Detection Systems (NIDS) to protect networks from more complex cyberattacks. To differentiate between normal network processes and possible attacks, Intrusion Detection Systems (IDS) often employ pattern recognition and data mining techniques. Network and host system intrusions, assaults, and policy violations can be automatically detected and classified by an Intrusion Detection System (IDS). Using Python Scikit-Learn the results of this study show that Machine Learning (ML) techniques like Decision Tree (DT), Naïve Bayes (NB), and K-Nearest Neighbor (KNN) can enhance the effectiveness of an Intrusion Detection System (IDS). Success is measured by a variety of metrics, including accuracy, precision, recall, F1-Score, and execution time. Applying feature selection approaches such as Analysis of Variance (ANOVA), Mutual Information (MI), and Chi-Square (Ch-2) reduced execution time, increased detection efficiency and accuracy, and boosted overall performance. All classifiers achieve the greatest performance with 99.99% accuracy and the shortest computation time of 0.0089 seconds while using ANOVA with 10% of features.
The map of permeability distribution in the reservoirs is considered one of the most essential steps of the geologic model building due to its governing the fluid flow through the reservoir which makes it the most influential parameter on the history matching than other parameters. For that, it is the most petrophysical properties that are tuned during the history matching. Unfortunately, the prediction of the relationship between static petrophysics (porosity) and dynamic petrophysics (permeability) from conventional wells logs has a sophisticated problem to solve by conventional statistical methods for heterogeneous formations. For that, this paper examines the ability and performance of the artificial intelligence method in perme
... Show MoreThis study deals with knowing the types of research in public relations studies at the Faculty of Mass Communication for the period from 1989 to 2007 and knowing the methods that researchers used in their studies, as well as knowing the methods and tools of scientific research that were used, and whether one method or tool is used more than others, and knowing Samples used in the analysis. As well as the contents and types of this research The institutions that were subjected to the study, and the preparation of the respondents This research aims to answer the following questions:. A- What are the types of research and methods that were used in university theses that dealt with the topic? Public Relations at the Faculty of Media from 1989
... Show MoreGood governance of service quality through the adoption of sustainable energy the study of A1- Karkh historic center of in Baghdad city
The objective of present study was to compare of several methods for estimating the degree of heritability and calculating the number of genes using generation mean analysis of maize (
The aim of the research is to estimate the hidden population. Here، the number of drug users in Baghdad was calculated for the male age group (15-60) years old ، based on the Bayesian models. These models are used to treat some of the bias in the Killworth method Accredited in many countries of the world.
Four models were used: random degree، Barrier effects، Transmission bias، the first model being random، an extension of the Killworth model، adding random effects such as variance and uncertainty Through the size of the personal network، and when expanded by adding the fact that the respondents have different tendencies، the mixture of non-random variables with random to produce
... Show MoreBackground Bilateral cleft lip deformity is much more difficult to correct than unilateral cleft lip deformity. The complexity of the deformity and the sensitive relationships between the arrangement of the muscles and the characteristics of the external lip necessitate a comprehensive preoperative plan for management. The purpose of this study was to evaluate the repair of bilateral cleft lip using the Byrd modification of the traditional Millard and Manchester methods. A key component of this repair technique is focused on reconstruction of the central tubercle.
Methods Fourteen patients with mean age of 5.7 months presented with bilateral cleft lip deformity and were operated on using a mod
... Show MorePlagiarism is becoming more of a problem in academics. It’s made worse by the ease with which a wide range of resources can be found on the internet, as well as the ease with which they can be copied and pasted. It is academic theft since the perpetrator has ”taken” and presented the work of others as his or her own. Manual detection of plagiarism by a human being is difficult, imprecise, and time-consuming because it is difficult for anyone to compare their work to current data. Plagiarism is a big problem in higher education, and it can happen on any topic. Plagiarism detection has been studied in many scientific articles, and methods for recognition have been created utilizing the Plagiarism analysis, Authorship identification, and
... Show More
