Some of the main challenges in developing an effective network-based intrusion detection system (IDS) include analyzing large network traffic volumes and realizing the decision boundaries between normal and abnormal behaviors. Deploying feature selection together with efficient classifiers in the detection system can overcome these problems. Feature selection finds the most relevant features, thus reduces the dimensionality and complexity to analyze the network traffic. Moreover, using the most relevant features to build the predictive model, reduces the complexity of the developed model, thus reducing the building classifier model time and consequently improves the detection performance. In this study, two different sets of selected features have been adopted to train four machine-learning based classifiers. The two sets of selected features are based on Genetic Algorithm (GA) and Particle Swarm Optimization (PSO) approach respectively. These evolutionary-based algorithms are known to be effective in solving optimization problems. The classifiers used in this study are Naïve Bayes, k-Nearest Neighbor, Decision Tree and Support Vector Machine that have been trained and tested using the NSL-KDD dataset. The performance of the abovementioned classifiers using different features values was evaluated. The experimental results indicate that the detection accuracy improves by approximately 1.55% when implemented using the PSO-based selected features than that of using GA-based selected features. The Decision Tree classifier that was trained with PSO-based selected features outperformed other classifiers with accuracy, precision, recall, and f-score result of 99.38%, 99.36%, 99.32%, and 99.34% respectively. The results show that using optimal features coupling with a good classifier in a detection system able to reduce the classifier model building time, reduce the computational burden to analyze data, and consequently attain high detection rate.
The importance of vibrations in rotating rotors in engineering applications has been examined, as has the best approach to interpreting vibration data. The most extensively used analytical approaches for rotating shaft vibration analysis have been investigated. In this research, a detailed study was made of the Rayleigh and Dunkerley methods due to their importance in the special calculations to find the amplitude of vibrations in the rotation system. The multi-node method was used to calculate both Dunkerley's and Rayleigh's methods. An experimental platform was built to study the vibrations that occur in the rotating shafts, and the results were compared with theoretical calculations and with different distances of the bearings. It pro
... Show More
This study is concerned with the reality of total quality management and its role in achieving the excellence performance of the employees of the Institute of Technology / Baghdad, excellence performance is described by the extent to which the organization is able to invest the effort of the human resource to achieve its Objectives by adopting the principles of Total Quality Management (TQM) according to some of its basic dimensions in proportion to the reality and Possibilities Institute, the aim is to study to know the reality of total quality management ,and indicate the levels of excellence performance in the Institute of Technology / Baghdad,
... Show MoreMedium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the
Background: Candida tropicalis is one of the most causes of vulvovaginal candidiasis (VVC) in women. Systemic candidiasis and candidemia may also occur in pregnancies. Objective: This study was carried out to detect and isolate of this yeast from aborted placenta, which may cause severe complications such as spontaneous abortion. Materials and methods: Fresh aborted placenta were collected and washed by normal saline to remove the blood. Then, cut it into portions and place it in test tube containing 5 ml of normal saline. Finally, shake for 10 minutes, after that, cultured for microbial isolation. Isolation and detection were done by some conventional methods with Api candida and CHROMagar. Results: The results showed that four iso
... Show MoreDue to its association with hepatocellular carcinoma and being one of the ten most common malignancies worldwide, hepatitis C viral infection has become a severe public health concern. Therefore, establishing an accurate, reliable and sensitive diagnostic test for this infection is strongly advised. Real-time polymerase chain reaction (PCR) has been created to achieve this purpose. The current study was established to investigate the hepatitis C virus among Iraqi patients with chronic renal failure and to detect the virus immunologically by the fourth generation enzyme-linked immunosorbent assay technique and molecularly by real-time PCR. As a result, out of 50 patients with chronic renal failure undergoing dialysis, 39 patients tes
... Show More
Abstract
The aim of the research is to clarify the requirements of the qualification of the external auditor in Iraq and the extent of their impact on the quality of the professional performance of the audit process. The research was based on analyzing the results of the questionnaire prepared for the impact of qualifications on the quality of professional performance. The researcher has reached a number of conclusions, the most important of which is that a highly qualified and unethical auditor has a greater negative impact on the quality of professional performance than those with low qualifications. The most important recommendations of the research were the need to pay
... Show MoreBackground: Acute appendicitis is regarded as one of the most common inflammation that needs surgical intervention. Different scoring systems have been used for diagnosing of acute appendicitis. ALVARADO score is one of the most widely used score in diagnosing of acute appendicitis, but the accuracy of the latter is insufficiently low in Middle-East patients. Thus a new scoring system called RIPASA score has been designed for diagnosing of acute appendicitis in those patients. The aim of this study is to use RIPASA score and compare its result with ALVARADO score in diagnosing of acute appendicitis.
Subjects and Methods: The study includes 200 patients with symptoms and signs of
... Show MoreThe present paper aims at evaluating the vailability quality and future horizons of potable water in the city of Shatra as a model. This is done in accordance with certain subjective and objective factors alongside the classification map of Shatra as a residential area. This system follows geographical studies specialized in urban construction. The problem of the present paper as well as the data approaching that problem have been chosen from the records of 2018. The researcher offered (919) questionnaire forms to be answered by a sample of dwellers in that area. Besides, the researcher also followed lab analysis of water samples collected from districts in the city of Shatra. GIS technology was also used to arrive at the real water shar
... Show More