Preferred Language
Articles
/
bsj-6210
Performance Evaluation of Intrusion Detection System using Selected Features and Machine Learning Classifiers
...Show More Authors

Some of the main challenges in developing an effective network-based intrusion detection system (IDS) include analyzing large network traffic volumes and realizing the decision boundaries between normal and abnormal behaviors. Deploying feature selection together with efficient classifiers in the detection system can overcome these problems.  Feature selection finds the most relevant features, thus reduces the dimensionality and complexity to analyze the network traffic.  Moreover, using the most relevant features to build the predictive model, reduces the complexity of the developed model, thus reducing the building classifier model time and consequently improves the detection performance.  In this study, two different sets of selected features have been adopted to train four machine-learning based classifiers.  The two sets of selected features are based on Genetic Algorithm (GA) and Particle Swarm Optimization (PSO) approach respectively.  These evolutionary-based algorithms are known to be effective in solving optimization problems.  The classifiers used in this study are Naïve Bayes, k-Nearest Neighbor, Decision Tree and Support Vector Machine that have been trained and tested using the NSL-KDD dataset. The performance of the abovementioned classifiers using different features values was evaluated.  The experimental results indicate that the detection accuracy improves by approximately 1.55% when implemented using the PSO-based selected features than that of using GA-based selected features.  The Decision Tree classifier that was trained with PSO-based selected features outperformed other classifiers with accuracy, precision, recall, and f-score result of 99.38%, 99.36%, 99.32%, and 99.34% respectively.  The results show that using optimal features coupling with a good classifier in a detection system able to reduce the classifier model building time, reduce the computational burden to analyze data, and consequently attain high detection rate.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Feb 03 2019
Journal Name
Journal Of The College Of Education For Women
Detection of selected cells in multi choice sheets
...Show More Authors

0

View Publication Preview PDF
Publication Date
Sun Mar 12 2017
Journal Name
Al-academy
The reality of interior design of Sharjah mosques and the possibility of development - selected models
...Show More Authors

Observed mosques with the advent of Islam under the auspices of care being the houses of God Almighty, and I like parts of the ground to him, the center of radiation spiritual, intellectual and ideological in the lives of Muslims, was the most important cultural and architectural evidence built by Muslims voicing their deep faith and serenity Aqidthm.valmsadjad better reflecting the reality of communication between the person and his Lord, because he is the most important building of permanence and survival, making it imperative designed the best visual forms both externally and internally.Mosques have been characterized in the United Arab Emirates distinct characteristics in terms of building elements of construction in general, and the

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jun 01 2022
Journal Name
Journal Of The College Of Languages (jcl)
The Inner Wasteland in Selected Later Plays of Samuel Beckett
...Show More Authors

The inner wasteland can be observed in Samuel Beckett’s early and later plays. His characters suffer from loss of identity, emotions, and sense of time. They lead a life of failure, repetition, inaction, loneliness, doubt, suffering, and nothingness. The inner wasteland includes many aspects, such as the multi and split identity, the habitual repetitive element of life, the dark sorrowful life the characters lead, lack of communication and relations among them, their unfree, inactive condition, their foggy terrible recollections, loneliness, dryness of love, and uncertainty. The analysis and the illustration of each aspect will show how the inner wasteland is intensified in the selected later plays of Beckett.

 

View Publication Preview PDF
Crossref
Publication Date
Tue Jun 08 2021
Journal Name
مجلة العلوم و التكنولوجية للنشاطات البدنية و الرياضية
The effectiveness of using (7E’s) learning cycle in learning a movement chain on the uneven bars in the artistic gymnastics for women
...Show More Authors

Abstract The Object of the study aims to identify the effectiveness of using the 7E’s learning cycle to learn movement chains on uneven bars, for this purpose, we used the method SPSS. On a sample composed (20) students on collage of physical education at the university of Baghdad Chosen as two groups experimental and control group (10) student for each group, and for data collection, we used SPSS After collecting the results and having treated them statistically, we conclude the use 7E’s learning cycle has achieved remarkable positive progress, but it has diverged between to methods, On this basis, the study recommended the necessity of applying 7E’s learning cycle strategy in learning the movement chain on uneven bar

... Show More
View Publication Preview PDF
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (2)
Scopus Crossref
Publication Date
Thu Aug 31 2023
Journal Name
Journal Européen Des Systèmes Automatisés​
Deep Learning Approach for Oil Pipeline Leakage Detection Using Image-Based Edge Detection Techniques
...Show More Authors

Natural gas and oil are one of the mainstays of the global economy. However, many issues surround the pipelines that transport these resources, including aging infrastructure, environmental impacts, and vulnerability to sabotage operations. Such issues can result in leakages in these pipelines, requiring significant effort to detect and pinpoint their locations. The objective of this project is to develop and implement a method for detecting oil spills caused by leaking oil pipelines using aerial images captured by a drone equipped with a Raspberry Pi 4. Using the message queuing telemetry transport Internet of Things (MQTT IoT) protocol, the acquired images and the global positioning system (GPS) coordinates of the images' acquisition are

... Show More
View Publication
Scopus (12)
Crossref (4)
Scopus Crossref
Publication Date
Wed Jun 01 2022
Journal Name
Baghdad Science Journal
Design and Performance Investigation of a Solar- Powered Biological Greywater Treatment System in the Iraqi Climate
...Show More Authors

            The increase in population resulted in an increase in the consumption of water. The present work investigates the performance of a recycling solar- powered greywater treatment system for the purposes of irrigation, used to reduce the amount of waste grey water and reduce electricity consumption and reduce the costs of constructing large scale water treatment plants. The system consumes about 3814W per hour and provides water treatment about 1.4 m3 per day. The proposed system is designed to    residential, office and governmental buildings application. Tests are conducted in an office building at the Ministry of Science and Technology site in Baghdad. Laboratorial water samples testing analyses are co

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Clarivate Crossref
Publication Date
Sun Mar 19 2023
Journal Name
Journal Of Educational And Psychological Researches
Cognitive Absorption and E-learning Readiness in Learning Digitization among Preparatory Stage in Qatar
...Show More Authors

Abstract

The study aims to examine the relationships between cognitive absorption and E-Learning readiness in the preparatory stage. The study sample consisted of (190) students who were chosen randomly. The Researcher has developed the cognitive absorption and E-Learning readiness scales. A correlational descriptive approach was adopted. The research revealed that there is a positive statistical relationship between cognitive absorption and eLearning readiness.

View Publication Preview PDF
Publication Date
Sat Mar 01 2014
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Strategic Performance Evaluation Using Benchmarking Technique: Applied Research In The Sample Of Offices Of Inspectors General
...Show More Authors

In light of the rapid changes in the business environment and the entry of administrative leaders in the challenges of the atheist and twenty- increasing competition between sectors and the desire to acquire the skills, the traditional methods are no longer viable, which requires doing evaluates performance according to a more holistic, rather than limiting the performance evaluation on the financial hub that has not longer enough alone, as well as benchmarking method that has proven successful in developed countries as a way to develop and improve products and services.

I've touched your search to the development of indicators evaluating the performance and preparation of a mechanism for making comparisons of reference between o

... Show More
View Publication Preview PDF
Publication Date
Wed Sep 28 2022
Journal Name
Journal Of The College Of Education For Women
A Cognitive Linguistic Study of Battered Woman in Selected Iraqi Caricatures
...Show More Authors

The present paper is a qualitative descriptive study. It aims to examine the macro-cultural schemata addressing the concept of violence against women in Iraq from a cognitive linguistic point of view. To meet this objective, a number of Iraqi social caricatures have been selected from two popular and active Iraqi caricaturists, Odeh Al-Fahdawi and Nasser Ibrahim. The selection and the analysis of data have been achieved following the validity and reliability procedures and the ethical considerations. To meet this objective, Sharifian’s Model (2011) of Cultural Schemata has been adopted in data analysis. The study has concluded that the macro-cultural schemata regarding the concept of violence in the selected panels reveals that violenc

... Show More
View Publication Preview PDF
Crossref