Regarding to the computer system security, the intrusion detection systems are fundamental components for discriminating attacks at the early stage. They monitor and analyze network traffics, looking for abnormal behaviors or attack signatures to detect intrusions in early time. However, many challenges arise while developing flexible and efficient network intrusion detection system (NIDS) for unforeseen attacks with high detection rate. In this paper, deep neural network (DNN) approach was proposed for anomaly detection NIDS. Dropout is the regularized technique used with DNN model to reduce the overfitting. The experimental results applied on NSL_KDD dataset. SoftMax output layer has been used with cross entropy loss function to enforce the proposed model in multiple classification, including five labels, one is normal and four others are attacks (Dos, R2L, U2L and Probe). Accuracy metric was used to evaluate the model performance. The proposed model accuracy achieved to 99.45%. Commonly the recognition time is reduced in the NIDS by using feature selection technique. The proposed DNN classifier implemented with feature selection algorithm, and obtained on accuracy reached to 99.27%.
؛ ١٨his study male and female albino mice werdministr^d doses of alkaloid and phenolic extracts of Allium cepa at doses of( 25 ,50,100, 200) mg / kg of( body weight). males and females were divided into four groups and each croup comprised mice were injected intra^ritonially daily for one week and orally ٢٠٢ one month . After which animals were killed and the serum was separated for biochemical analysis (total blood suger, total protein , otal cholesterol). Results showed significant decrease ( p< 0,05) in the total blood suger and total cholesterol on the serum of both males and females and significant increase( p< 0,05) in the total serum protein of both males and females of the two types of injection and oral administr
... Show MoreWith the vast usage of network services, Security became an important issue for all network types. Various techniques emerged to grant network security; among them is Network Intrusion Detection System (NIDS). Many extant NIDSs actively work against various intrusions, but there are still a number of performance issues including high false alarm rates, and numerous undetected attacks. To keep up with these attacks, some of the academic researchers turned towards machine learning (ML) techniques to create software that automatically predict intrusive and abnormal traffic, another approach is to utilize ML algorithms in enhancing Traditional NIDSs which is a more feasible solution since they are widely spread. To upgrade t
... Show MoreSweet pepper (Capsicum annuum L.) is an economically important vegetable crop. Wilt disease caused by Fusarium oxysporum f. sp. capsici is a specific pathogen that affects the pepper. Four isolates of F. oxysporum f. sp. capsici Fo3, Fo6, Fo7 and Fo8 were obtained from diseased pepper plants that were collected from different pepper fields in Baghdad. Fo6 isolate that has high pathogenicity to pepper seeds, Trichoderma harzianum (Th) was tested in vitro against F. oxysporum f. sp. capsici showed a high inhibition rate for the isolate Fo6, the concentration of chelated iron Fe-EDDHA 0.5% reduced the radial growth of Fo6 whi
... Show MoreA field experiment was conducted at the experimental field of botanical garden, faculty of science, university of Baghdad, in order to study the effect of plant density on growth and yield of two local cultivars of sunflower (Sin Althieb and Shumose). The densities used were 4.4 and 8.8 plant/m2. The results showed difference between cultivars in their agronomic traits and their yields. There was a significant increase in plant height and leaf area index by increasing the plant density, while head diameter, number of seeds and leaf area decreased. But the most significant effect was the increasing in yield and biological yield by increasing the plant density. There was an increase by 72% and 58% in the yield and 79% an
... Show MoreMS Elias, RGM AL-helfy, Plant Archives, 2019
،يريغت وأ ةلكشم وأ ةثداح ةجيتن ،ةعمالجا وأ درفلا هذختي فقوم هرهوج في ماعلا يأرلا دعي ةيوبرت تماكارتو ،ةيرثك تانوكم لىع هسسأ في موقي وهف اذل ،ةشاعلما ةايلحا تاقايس في لصيح فيو ،عمتمج يلأ يعماتجلاا لعفلا ةيصوصخ تاقايس بسحب يرسي ايرطف نوكي ام اهنم ،ةيفاقثو يعولا ةلاح تيبثت ديرت تاهج نم ةلعتفمو ةعنطصم تايطعمب اهيريست وأ اهذحش متي ىرخأ نايحأ ليكشت ةيلمع تنترقا ذل ،ةثدالحا كلت مهف ةأطو ليلقت وأ يريغت وأ فرح وأ ي
... Show MoreThe research aims at identify the role of the electronic trading system used in the Iraq stock exchange to promote trading activity for the stocks of listed companies in this market.
To prove the hypothesis of research, it was selected the main trading indicators for the market to be a main field in test the research hypothesis.it was selected as the period of time for (9)years span between the years (2005-2013) because they represent the first two articles of equal time periods represent aperiod that preceded the introduction of electronic trading system while the second represents the period of time that followed
The research found a number of conclusions but the mo
... Show MoreIn this article, the lattice Boltzmann method with two relaxation time (TRT) for the D2Q9 model is used to investigate numerical results for 2D flow. The problem is performed to show the dissipation of the kinetic energy rate and its relationship with the enstrophy growth for 2D dipole wall collision. The investigation is carried out for normal collision and oblique incidents at an angle of . We prove the accuracy of moment -based boundary conditions with slip and Navier-Maxwell slip conditions to simulate this flow. These conditions are under the effect of Burnett-order stress conditions that are consistent with the discrete Boltzmann equation. Stable results are found by using this kind of boundary condition where d
... Show MoreIn this work , an effective procedure of Box-Behnken based-ANN (Artificial Neural Network) and GA (Genetic Algorithm) has been utilized for finding the optimum conditions of wt.% of doping elements (Ce,Y, and Ge) doped-aluminizing-chromizing of Incoloy 800H . ANN and Box-Behnken design method have been implanted for minimizing hot corrosion rate kp (10-12g2.cm-4.s-1) in Incoloy 800H at 900oC . ANN was used for estimating the predicted values of hot corrosion rate kp (10-12g2.cm-4.s-1) . The optimal wt.% of doping elements combination to obtain minimum hot corrosion rate was calculated using genetic alg
... Show Moreيتمثل الهدف الأساسي من الرقابة علىٰ تركز الشركات في منع آثارها المحتملة غير التنافسية الضارة بالهيكل التنافسي للسوق المعنية، وذلك لحماية حرية المنافسة فيها. وفي إطار ذلك لا بد من التحقق من أن تلك العمليات ليس من شأنها إعاقة المنافسة الفعّالة أو الحد منها بشكل كبير علىٰ نحو يترتب عليه التأثير علىٰ السوق المعنية بجعلها أقل قدرة علىٰ المنافسة مما كانت عليه، أي ضرورة التنبوء بكافة الآثار المحتملة التي ستترتب عل
... Show More