With the proliferation of both Internet access and data traffic, recent breaches have brought into sharp focus the need for Network Intrusion Detection Systems (NIDS) to protect networks from more complex cyberattacks. To differentiate between normal network processes and possible attacks, Intrusion Detection Systems (IDS) often employ pattern recognition and data mining techniques. Network and host system intrusions, assaults, and policy violations can be automatically detected and classified by an Intrusion Detection System (IDS). Using Python Scikit-Learn the results of this study show that Machine Learning (ML) techniques like Decision Tree (DT), Naïve Bayes (NB), and K-Nearest Neighbor (KNN) can enhance the effectiveness of an Intrusion Detection System (IDS). Success is measured by a variety of metrics, including accuracy, precision, recall, F1-Score, and execution time. Applying feature selection approaches such as Analysis of Variance (ANOVA), Mutual Information (MI), and Chi-Square (Ch-2) reduced execution time, increased detection efficiency and accuracy, and boosted overall performance. All classifiers achieve the greatest performance with 99.99% accuracy and the shortest computation time of 0.0089 seconds while using ANOVA with 10% of features.
Reconstruction of female identity is one of the important issues in modern times. The majority of the females who descent from the countries of the third world confront lots of problems because of their race and gender. Black females or colored skin females because of the oppression of the white society upon them, try hard to cope with society in order to get some relief and feel that they are part of this cruel white society. One of the solutions for these black females is to reconstruct their identity by mimicry to the English beauty standards. Zadie Smith is a postcolonial author. She deals with third- world women and how they are treated in a minority and in a racist way. She strives to empower the subaltern black females who ha
... Show More
This research dealt with highlighting the images of marriage through the modern means of communication and the legal ruling for it. Dowry even be knotted on them; because they are then one of the parties to the contract and contracted in one contract, and this is prohibited by law and law and common sense.
It turns out that it is permissible to advertise marriage through the Internet in accordance with the rules and standards that preserve values and morals and safeguard dignity and chastity. The acts in Islamic law are vested with intentions. If intentions are true, then the act is true, and Internet marriage is what falls under this order.<
... Show MoreThis work revealed the spherical aromaticity of some inorganic E4 cages and their protonated E4H+ ions (E=N, P, As, Sb, and Bi). For this purpose, we employed several evaluations like (0D-1D) nucleus independent chemical shift (NICS), multidimensional (2D-3D) off-nucleus isotropic shielding σiso(r), and natural bond orbital (NBO) analysis. The magnetic calculations involved gauge-including atomic orbitals (GIAO) with two density functionals B3LYP and WB97XD, and basis sets of Jorge-ATZP, 6-311+G(d,p), and Lanl2DZp. The Jorge-ATZP basis set showed the best consistency. Our findings disclosed non-classical aromatic characters in the above molecules, which decreased from N to Bi cages. Also, the results showed more aromaticity in E4 than E4H+
... Show MoreThe detection for Single Escherichia Coli Bacteria has attracted great interest and in biology and physics applications. A nanostructured porous silicon (PS) is designed for rapid capture and detection of Escherichia coli bacteria inside the micropore. PS has attracted more attention due to its unique properties. Several works are concerning the properties of nanostructured porous silicon. In this study PS is fabricated by an electrochemical anodization process. The surface morphology of PS films has been studied by scanning electron microscope (SEM) and atomic force microscope (AFM). The structure of porous silicon was studied by energy-dispersive X-ray spectroscopy (EDX). Details of experimental methods and results are given and discussed
... Show MoreWireless sensor applications are susceptible to energy constraints. Most of the energy is consumed in communication between wireless nodes. Clustering and data aggregation are the two widely used strategies for reducing energy usage and increasing the lifetime of wireless sensor networks. In target tracking applications, large amount of redundant data is produced regularly. Hence, deployment of effective data aggregation schemes is vital to eliminate data redundancy. This work aims to conduct a comparative study of various research approaches that employ clustering techniques for efficiently aggregating data in target tracking applications as selection of an appropriate clustering algorithm may reflect positive results in the data aggregati
... Show MoreFlexible job-shop scheduling problem (FJSP) is one of the instances in flexible manufacturing systems. It is considered as a very complex to control. Hence generating a control system for this problem domain is difficult. FJSP inherits the job-shop scheduling problem characteristics. It has an additional decision level to the sequencing one which allows the operations to be processed on any machine among a set of available machines at a facility. In this article, we present Artificial Fish Swarm Algorithm with Harmony Search for solving the flexible job shop scheduling problem. It is based on the new harmony improvised from results obtained by artificial fish swarm algorithm. This improvised solution is sent to comparison to an overall best
... Show Morebstract This study was performed to isolate and identify the Burkholderia cepacia from rhizosphers of different plants and study their ability to produce Siderophore, the study was also aimed to assess the antifungal activity of the bacterial filtrate and extracts of the isolates against some pathogenic fungi. The isolate which showed higher inhibitory effects was selected for extraction of some active metabolites produced by it, and evaluate the activity in vitro, via inhibition of the growth of the fungi using different concentrations of extract (50, 100, 200 )µL/ml , The results showed that out of (250) samples of soil , (8) isolates (3.2%) gave positive
... Show MoreThis investigation aims to explore the potential of waterworks sludge (WS), low-cost byproduct of water treatment processes, as a sorbent for removing Congo Red (CR) dyes. This will be achieved by precipitating nano-sized (MgAl-LDH)-layered double hydroxide onto the surface of the sludge. The efficiency of utilizing MgAl-LDH to modify waterworks sludge (MWS) for use in permeable reactive barrier technology was confirmed through analysis with Fourier transform infrared and X-ray diffraction. The isotherm model was employed to elucidate the adsorption mechanisms involved in the process. Furthermore, the COMSOL model was utilized to establish a continuous testing model for the analysis of contaminant transport under diverse conditions.
... Show MoreThis investigation aims to explore the potential of waterworks sludge (WS), low-cost byproduct of water treatment processes, as a sorbent for removing Congo Red (CR) dyes. This will be achieved by precipitating nano-sized (MgAl-LDH)-layered double hydroxide onto the surface of the sludge. The efficiency of utilizing MgAl-LDH to modify waterworks sludge (MWS) for use in permeable reactive barrier technology was confirmed through analysis with Fourier transform infrared and X-ray diffraction. The isotherm model was employed to elucidate the adsorption mechanisms involved in the process. Furthermore, the COMSOL model was utilized to establish a continuous testing model for the analysis of contaminant transport under diverse conditions. A st
... Show More