Until recently, researchers have utilized and applied various techniques for intrusion detection system (IDS), including DNA encoding and clustering that are widely used for this purpose. In addition to the other two major techniques for detection are anomaly and misuse detection, where anomaly detection is done based on user behavior, while misuse detection is done based on known attacks signatures. However, both techniques have some drawbacks, such as a high false alarm rate. Therefore, hybrid IDS takes advantage of combining the strength of both techniques to overcome their limitations. In this paper, a hybrid IDS is proposed based on the DNA encoding and clustering method. The proposed DNA encoding is done based on the UNSW-NB15 database by dividing the record's attributes into four groups, including State, Protocol, Service, and the rest of the features is Digits. Four DNA characters were used to represent each protocol attribute values. While two DNA characters are used to represent State, Service and Digits attributes values. Then, the clustering method is applied to classify the records into two clusters, either attack or normal. The current experiment results showed that the proposed system has achieved a good detection rate and accuracy results equal to 81.22% and 82.05% respectively. Also, the system achieved fast encoding and clustering time that equal 0.385 seconds and 0.00325 seconds respectively for each record.
Knowledge represents the foundation stone for the work of all organizations, are working who leads the thinking of individuals is the ability that leads to behavior based on rationality, it is the work that creates value to the organization and thus gain access to performance winning where that knowledge is a new type of capital based on the thought and experience and is the so-called intellectual capital, which is renewable and is constantly evolving. The study sought to explain the role of the climax knowledge in achieving the highest levels of performance Organizational and then access to the performance winning in educational organizations the study sample, was found to be a co
... Show MoreThe research aims to enhance the level of evaluation of the performance of banking transactions control policies and procedures. The research is based on the following hypothesis: efficient transactions control policies and procedures contribute enhancing financial reporting, by assessing non-application gap of those policies and procedures in a manner that helps to prevent, discover, and correct material misstatements. The researchers designed an examination list that includes the control policies and procedures related to the transactions, as a guide to the bank audit program prepared by the Federal Financial Supervision Bureau. The research methodology is
... Show MoreThe study aims to provide a Suggested model for the application of Virtual Private Network is a tool that used to protect the transmitted data through the Web-based information system, and the research included using case study methodology in order to collect the data about the research area ( Al-Rasheed Bank) by using Visio to design and draw the diagrams of the suggested models and adopting the data that have been collected by the interviews with the bank's employees, and the research used the modulation of data in order to find solutions for the research's problem.
The importance of the study Lies in dealing with one of the vital topics at the moment, namely, how to make the information transmitted via
... Show MoreFinding the shortest route in wireless mesh networks is an important aspect. Many techniques are used to solve this problem like dynamic programming, evolutionary algorithms, weighted-sum techniques, and others. In this paper, we use dynamic programming techniques to find the shortest path in wireless mesh networks due to their generality, reduction of complexity and facilitation of numerical computation, simplicity in incorporating constraints, and their onformity to the stochastic nature of some problems. The routing problem is a multi-objective optimization problem with some constraints such as path capacity and end-to-end delay. Single-constraint routing problems and solutions using Dijkstra, Bellman-Ford, and Floyd-Warshall algorith
... Show MoreThis research aimed to evaluate the level of readiness to teach science in the light of the information, media, and technology skills among undergraduate students at the Faculty of Edu-cation, King Khalid University. To achieve this goal, a descriptive and analytical approach was used. A list of readiness to teach science was prepared in the light of Information, media, and technology skills, and in the light of this list, a cognitive test, observation sheet, and attitude scale were prepared to assess readiness to teach science in its three aspects, cognitive, behavioral, and emotional. The sample of the research consisted of (42) students enrolled in field training courses at the sixth, seventh and eighth levels. Research tools were app
... Show MoreEvaluation is one of the most important elements of teaching process. The recent trends in evaluation and educational reform movements have called for using alternative evaluation, which focuses on performance evaluation. Authentic assessment is usually described as formative, in which students participate in their acquisition, in addition to the fact that students are productive and active, which is reflected in the students' achievement and skill level. The study aims to reveal the degree of knowledge and use of alternative assessment tools by primary school teachers in Gaza -Palestine. To meet the objective of the study, the researchers used the descriptive-analytical method and the questioner as a study tool. The study sample c
... Show MoreThe relationship between pollution levels in river sediment and fluctuating asymmetry of resident silurid fish species,
Athletics are different from other games as a competition between individuals to show their competence and physical ability to achieve new record numbers in the various activities and various between the boards, jumping and throwing and each type of these activities in particular performance so found the researcher to find the method of training resistors in the development of special power and achievement In the effectiveness of javelin, where the researchers chose the sample of the athletes from the specialized school of athletics to effectively throw the spear at the ages of 15-17 years and carried out the tests of the research, which includes the strength of the speed of the arms and explosive power and The various resistance exercise
... Show MoreAutorías: Imad Kadhim Khlaif, Israa Gameel Hussein, Talib Faissal Shnawa. Localización: Revista iberoamericana de psicología del ejercicio y el deporte. Nº. 5, 2022. Artículo de Revista en Dialnet.
Deposits with the Industrial Bank, together with loans received from others, are non-financial financial resources, which are sources of supply to the Industrial Bank of funds that allow the Bank to expand the granting of loans. The increases in this resource indicates that the bank is practicing comprehensive banking, which is consistent with the nature of the transformation of the banking system towards multiple businesses. Therefore, the research comes to highlight the causality of the trend between total deposits and total loans. And if the causality is found, is it one-way or two-way? How long is the impact?