Some of the main challenges in developing an effective network-based intrusion detection system (IDS) include analyzing large network traffic volumes and realizing the decision boundaries between normal and abnormal behaviors. Deploying feature selection together with efficient classifiers in the detection system can overcome these problems. Feature selection finds the most relevant features, thus reduces the dimensionality and complexity to analyze the network traffic. Moreover, using the most relevant features to build the predictive model, reduces the complexity of the developed model, thus reducing the building classifier model time and consequently improves the detection performance. In this study, two different sets of selected features have been adopted to train four machine-learning based classifiers. The two sets of selected features are based on Genetic Algorithm (GA) and Particle Swarm Optimization (PSO) approach respectively. These evolutionary-based algorithms are known to be effective in solving optimization problems. The classifiers used in this study are Naïve Bayes, k-Nearest Neighbor, Decision Tree and Support Vector Machine that have been trained and tested using the NSL-KDD dataset. The performance of the abovementioned classifiers using different features values was evaluated. The experimental results indicate that the detection accuracy improves by approximately 1.55% when implemented using the PSO-based selected features than that of using GA-based selected features. The Decision Tree classifier that was trained with PSO-based selected features outperformed other classifiers with accuracy, precision, recall, and f-score result of 99.38%, 99.36%, 99.32%, and 99.34% respectively. The results show that using optimal features coupling with a good classifier in a detection system able to reduce the classifier model building time, reduce the computational burden to analyze data, and consequently attain high detection rate.
The software-defined network (SDN) is a new technology that separates the control plane from data plane for the network devices. One of the most significant issues in the video surveillance system is the link failure. When the path failure occurs, the monitoring center cannot receive the video from the cameras. In this paper, two methods are proposed to solve this problem. The first method uses the Dijkstra algorithm to re-find the path at the source node switch. The second method uses the Dijkstra algorithm to re-find the path at the ingress node switch (or failed link).
... Show MoreAt the last two decades , The environment has witnessed tremendous changes in many fields with the huge competition , various technological development and customer satisfaction , that are reflected in economic units a doption for lean production system.
Lean accounting that has appeared as a response for change occurred of economic units adoption for changes occurred of economic units adoption for lean production instead of wide production system , has devised new performance measures suitable for economic units adoption for lean ideas: and helping in providing suitable information about evaluating economic unit performance , these measures are divided into three levels , cell level,value flow level , a
... Show MoreThis article studies a comprehensive methods of edge detection and algorithms in digital images which is reflected a basic process in the field of image processing and analysis. The purpose of edge detection technique is discovering the borders that distinct diverse areas of an image, which donates to refining the understanding of the image contents and extracting structural information. The article starts by clarifying the idea of an edge and its importance in image analysis and studying the most noticeable edge detection methods utilized in this field, (e.g. Sobel, Prewitt, and Canny filters), besides other schemes based on distinguishing unexpected modifications in light intensity and color gradation. The research as well discuss
... Show MoreIn this work a fragile watermarking scheme is presented. This scheme is applied to digital color images in spatial domain. The image is divided into blocks, and each block has its authentication mark embedded in it, we would be able to insure which parts of the image are authentic and which parts have been modified. This authentication carries out without need to exist the original image. The results show the quality of the watermarked image is remaining very good and the watermark survived some type of unintended modification such as familiar compression software like WINRAR and ZIP
Although text document images authentication is difficult due to the binary nature and clear separation between the background and foreground but it is getting higher demand for many applications. Most previous researches in this field depend on insertion watermark in the document, the drawback in these techniques lie in the fact that changing pixel values in a binary document could introduce irregularities that are very visually noticeable. In this paper, a new method is proposed for object-based text document authentication, in which I propose a different approach where a text document is signed by shifting individual words slightly left or right from their original positions to make the center of gravity for each line fall in with the m
... Show MoreHuman skin detection, which usually performed before image processing, is the method of discovering skin-colored pixels and regions that may be of human faces or limbs in videos or photos. Many computer vision approaches have been developed for skin detection. A skin detector usually transforms a given pixel into a suitable color space and then uses a skin classifier to mark the pixel as a skin or a non-skin pixel. A skin classifier explains the decision boundary of the class of a skin color in the color space based on skin-colored pixels. The purpose of this research is to build a skin detection system that will distinguish between skin and non-skin pixels in colored still pictures. This performed by introducing a metric that measu
... Show Moreان تحقيق التطوير المطلوب في التعليم الجامعي يستلزم القيام ببحوث علمية تساعد في الوصول الى معادلات سليمة لأحداثه، وتجنب سلبيات التغيير غير المدروس وغير المخطط علميا ، والبحث الحالي هو محاولة في هذا الأتجاه، ويهتم بوضع خطوط عريضة تتضمن مجموعة الآراء والأفكار والتوجهات ذات الاهمية لتطوير دور التعليم العالي في تنمية العلم والتكنولوجيا، والتنمية البشرية ، أيضا في توجيه
... Show MoreThe author addresses the issue of the linguoculturological component in the process of teaching Russian to Arabic students, focuses on the peculiarities of the national character of students. The author also refers to the long-standing ties of Russian and Arab cultures, thus emphasizing the relevance of this aspect for the current state and situation of the Russian language in Arab countries.
Автор статьи обращается к вопросу лингвокультурологической составляющей в процессе преподавания русского языка арабским студентам, останавливается на особенностях национального хара
... Show MoreMany Iraqi students are reluctant to actively participate in the English
language classroom. This reluctance is attributed to a number of factors, above which
is students' lack of thinking skills necessary to express their points of view. This
eventually results in passive learning, a real problem in English language learning in
Iraq.
A need for educational reforms and innovations seems essential. These involve
developing relevant teaching materials, adopting learner-centered approach,
promoting learner autonomy, and enhancing critical thinking.
This study is hoped to assist teachers of English to initiate change and foster
the expansion of thinking, and adopt various new strategies to increase classroom
par