Regarding to the computer system security, the intrusion detection systems are fundamental components for discriminating attacks at the early stage. They monitor and analyze network traffics, looking for abnormal behaviors or attack signatures to detect intrusions in early time. However, many challenges arise while developing flexible and efficient network intrusion detection system (NIDS) for unforeseen attacks with high detection rate. In this paper, deep neural network (DNN) approach was proposed for anomaly detection NIDS. Dropout is the regularized technique used with DNN model to reduce the overfitting. The experimental results applied on NSL_KDD dataset. SoftMax output layer has been used with cross entropy loss function to enforce the proposed model in multiple classification, including five labels, one is normal and four others are attacks (Dos, R2L, U2L and Probe). Accuracy metric was used to evaluate the model performance. The proposed model accuracy achieved to 99.45%. Commonly the recognition time is reduced in the NIDS by using feature selection technique. The proposed DNN classifier implemented with feature selection algorithm, and obtained on accuracy reached to 99.27%.
The objective of the present study is to determine the effect of Kaolin as a fuel oil additive to minimize the fireside corrosion of superheater boiler tubes of ASTM designation (A213-T22) by increasing the melting point of the formed slag on the outside tubes surface, through the formation of new compounds with protective properties to the metal surface. The study included measuring corrosion rates at different temperatures with and without additive use with various periods of time, through crucible test method and weight loss technique.
A mathematical model represents the relation between corrosion rate and the studied variables, is obtained using statistical regression analysis. Using this model,
... Show MoreObjective: Determination the effectiveness of educational program on female students’ practices toward premenstrual.
Methodology: A quasi-experimental design study was conducted involving (140) student purposely in four secondary schools at Al-sadder city (70) student for study group and (70) for control group. The prevalence of PMS selected through American College of Obstetricians and Gynecologists (ACOG) (2015) criteria to select PMS students before program. The education program were set in four steps, the first step (pre-test) is to assess the practices, before the implementation of the program, the second step is implementing the program, following two steps post-test I and II betwe
... Show MoreThe aim of the research is to identify the extent of the ability to ensure the integrated reports by the auditor in verifying the credibility of these reports, and their implications for the benefit of all parties dealing with the economic unit, as well as measuring the impact of the assurance procedures followed by the auditors and their role in confirming these reports.
The research methodology was designed after studying the previous literature related to the research variables, and then the relationship between these variables was tested, through the use of a questionnaire list. A questionnaire targeting the community of auditors in the local environment, and the results of the study wer
... Show MoreThe indirect monetary policy tools led to financial stability for the period being studied through the use of indicators of financial stability (aggregate) to show the effect of the foreign reserves of the Central Bank of Iraq and its indirect instruments in achieving financial and economic stability, especially after the significant decline in oil prices and dependence of the Iraqi economy on Oil (rent) and lower reserves of the Central Bank of Iraq after 2014 and now compared to previous years, the goal of this research is to achieve financial stability according to selected indicators and achieve an optimal monetary policy to achieve the development goals of The economic policy in the country. Standard models were used to test
... Show MoreThe dependable and efficient identification of Qin seal script characters is pivotal in the discovery, preservation, and inheritance of the distinctive cultural values embodied by these artifacts. This paper uses image histograms of oriented gradients (HOG) features and an SVM model to discuss a character recognition model for identifying partial and blurred Qin seal script characters. The model achieves accurate recognition on a small, imbalanced dataset. Firstly, a dataset of Qin seal script image samples is established, and Gaussian filtering is employed to remove image noise. Subsequently, the gamma transformation algorithm adjusts the image brightness and enhances the contrast between font structures and image backgrounds. After a s
... Show MoreThe research aims to identify the correlation between self-reliance and human relationship of kindergartens’ teachers. Total of (120) kindergarten teachers at Baghdad city. To collect needed data, two scales were administered to the research sample consisted of (25) items of each scale with (five) alternatives. The results revealed that teachers have good level of self-reliance and human relationship. There is a positive correlation between self-reliance and human relationship.
Some responses to ancient grammarians
And contemporary researchers
In monograms
In this paper, we introduce the concepts of Large-lifting and Large-supplemented modules as a generalization of lifting and supplemented modules. We also give some results and properties of this new kind of modules.
The research talks about the interest and its impact on polygamy as a legitimate social psychological issue, where she talked about the concept of polygamy, and evidence of the legitimacy of polygamy, and clarify the conditions, and then touched on the great interests for which the law allowed polygamy, and mentioned some practical models in polygamy, including What is in the interest of men in pluralism, including in the interest of women in pluralism, including in the interests of both sexes in pluralism .
In this paper we show that if ? Xi is monotonically T2-space then each Xi is monotonically T2-space, too. Moreover, we show that if ? Xi is monotonically normal space then each Xi is monotonically normal space, too. Among these results we give a new proof to show that the monotonically T2-space property and monotonically normal space property are hereditary property and topologically property and give an example of T2-space but not monotonically T2-space.