Regarding to the computer system security, the intrusion detection systems are fundamental components for discriminating attacks at the early stage. They monitor and analyze network traffics, looking for abnormal behaviors or attack signatures to detect intrusions in early time. However, many challenges arise while developing flexible and efficient network intrusion detection system (NIDS) for unforeseen attacks with high detection rate. In this paper, deep neural network (DNN) approach was proposed for anomaly detection NIDS. Dropout is the regularized technique used with DNN model to reduce the overfitting. The experimental results applied on NSL_KDD dataset. SoftMax output layer has been used with cross entropy loss function to enforce the proposed model in multiple classification, including five labels, one is normal and four others are attacks (Dos, R2L, U2L and Probe). Accuracy metric was used to evaluate the model performance. The proposed model accuracy achieved to 99.45%. Commonly the recognition time is reduced in the NIDS by using feature selection technique. The proposed DNN classifier implemented with feature selection algorithm, and obtained on accuracy reached to 99.27%.
بعد الانحرافات التي شابت تنفيذ المسؤولية عن الحماية في ليبيا عام 2011، دعت البرازيل الى اتباع التسلسل في تنفيذ الركائز الثلاث للمسؤولية عن الحماية عند معالجة الازمات الانسانية ذات الصلة بجرائم الحرب والجرائم ضد الانسانية وجريمة الابادة الجماعية وجريمة التطهير العرقي، في حين دعا الامين العام للامم المتحدة في العديد من تقاريره السنوية بشأن المسؤولية عن الحماية بانه لاينبغي التقيد بالتسلسل واعتبر ان الركائز ا
... Show MoreIn this paper, the topic of forecasting the changes in the value of Iraqi crude oil exports for the period from 2019 to 2025, using the Markov transitional series based on the data of the time series for the period from January 2011 to November 2018, is real data obtained from the published data of the Central Agency Of the Iraqi statistics and the Iraqi Ministry of Oil that the results reached indicate stability in the value of crude oil exports according to the data analyzed and listed in the annex to the research.
Keywords: Using Markov chains
يتناول البحث مسؤولية منتسبي قوى الامن الداخلي عن اعمالهم الشخصية
Thanks and gratefulness be to Allah , the most merciful , and prayers be on his messenger and our prophet mohammed and his descendants.The voices have great influence on the diversity of methods of complaints and implication in the Qur'anic expression through
their inspiration , forms and notes. They also have influence on performing semantic and psychological condition of the emitter . that is because of the connection between the complaints and human behavior and emotions , since it is considered as the outlet by which the human expresses his repressed desired and instincts . he resorted to it " when he is helpless physically and mentally i.e. he cannot reach his goals or satisfy his needs." Complaints come from deprivation , social
Glorify and Praise be to God, and prayers and peace be upon the Messenger of God, his family, companions, and those who are loyal to him.
The subject derives its significance from two important sources , the first one lies in the Sunnah of the Prophet, while the other is the family source , which enrich this subject with great importance.
As for the objective of the topic, it shows to the reader the prophetic bases that mitigate and ease the burden of the husband in a way that secures the marital happiness, so that the Muslim woman takes it as a path for her in life and a slogan that illuminates the darkness of the path and makes her to overcom
... Show Moreلمحة عن حالة حقوق الانسان في كوردستان العراق
واقع العلاقات التركية الالمانية والبحث عن نموذج للاستقرار
In the reverse engineering approach, a massive amount of point data is gathered together during data acquisition and this leads to larger file sizes and longer information data handling time. In addition, fitting of surfaces of these data point is time-consuming and demands particular skills. In the present work a method for getting the control points of any profile has been presented. Where, many process for an image modification was explained using Solid Work program, and a parametric equation of the profile that proposed has been derived using Bezier technique with the control points that adopted. Finally, the proposed profile was machined using 3-aixs CNC milling machine and a compression in dimensions process has been occurred betwe
... Show MoreRepresents light a sovereign and importance in cinematography element of what possessed the physical characteristics make it a sharp image detail or opaque, or any other form as he wants the director, Valdu away from the main function, which emerged with the beginnings of cinema, any access to endanger the proper and good, the Alachtgalat dramatic and psychological are deepened performance lighting and functioned in adjacent with the shadows, all the two complement each other, which affects the image details or even the ability to express their personal depths or the social and psychological same place, and this prompted the researcher to determine the search in the following address: (employing lighting to express their personal duplica
... Show More