Some of the main challenges in developing an effective network-based intrusion detection system (IDS) include analyzing large network traffic volumes and realizing the decision boundaries between normal and abnormal behaviors. Deploying feature selection together with efficient classifiers in the detection system can overcome these problems. Feature selection finds the most relevant features, thus reduces the dimensionality and complexity to analyze the network traffic. Moreover, using the most relevant features to build the predictive model, reduces the complexity of the developed model, thus reducing the building classifier model time and consequently improves the detection performance. In this study, two different sets of selected features have been adopted to train four machine-learning based classifiers. The two sets of selected features are based on Genetic Algorithm (GA) and Particle Swarm Optimization (PSO) approach respectively. These evolutionary-based algorithms are known to be effective in solving optimization problems. The classifiers used in this study are Naïve Bayes, k-Nearest Neighbor, Decision Tree and Support Vector Machine that have been trained and tested using the NSL-KDD dataset. The performance of the abovementioned classifiers using different features values was evaluated. The experimental results indicate that the detection accuracy improves by approximately 1.55% when implemented using the PSO-based selected features than that of using GA-based selected features. The Decision Tree classifier that was trained with PSO-based selected features outperformed other classifiers with accuracy, precision, recall, and f-score result of 99.38%, 99.36%, 99.32%, and 99.34% respectively. The results show that using optimal features coupling with a good classifier in a detection system able to reduce the classifier model building time, reduce the computational burden to analyze data, and consequently attain high detection rate.
In drilling processes, the rheological properties pointed to the nature of the run-off and the composition of the drilling mud. Drilling mud performance can be assessed for solving the problems of the hole cleaning, fluid management, and hydraulics controls. The rheology factors are typically termed through the following parameters: Yield Point (Yp) and Plastic Viscosity (μp). The relation of (YP/ μp) is used for measuring of levelling for flow. High YP/ μp percentages are responsible for well cuttings transportation through laminar flow. The adequate values of (YP/ μp) are between 0 to 1 for the rheological models which used in drilling. This is what appeared in most of the models that were used in this study. The pressure loss
... Show MoreA. chroococcum isolate was examined for its ability to produce the hydrolytic enzymes chitinase, pectinase, protease, and lipase, in an effort to enhance the growth of fava bean (Vicia faba). Biological experiment was conducted in pots with complete random design (CRD). The experiment includes three treatments: control (plant without treatment) (P), NPK fertilizer (plant + fertilizer) (PF), and A. chroococcum inoculum (plant + A. chroococcum) (PA). These treatments were performed with sterile and non-sterile soil, which were planted with fava beans. At the end of experiment (seven weeks from planting), length and weight of plant shoot and plant root were calculated. The results show that the isolate wa
... Show MoreDuring the 1970s, communicative view of language teaching began to be incorporated into syllabus design. The central question for the proponents of this view was: what does the learner want/need to do with the target language? This lead to the emergence of a teaching method (or approach) called communicative language teaching (CLT) during the late 1970s and early 1980s focusing on the functions that must be incorporated into a classroom. According to Brown (2001:43) CLT is a unified but broadly based, theoretically well informed set of tenets about the nature of language and of language learning and teaching. Harmer (2001:84) states that the communicative approach is the name which was given to a set of beliefs which included not only a
... Show MoreBackground: Breast cancer is the commonest type of malignancy worldwide and in Iraq. It is a serious disease that affects the general health and cause systemic changes that affect the physical and chemical properties of saliva leading to adverse effects on oral health. This study was conducted toassess the tumor marker CA15-3 and selected elements in saliva and their relation to oral health status among breast cancer patients compared to control group. Materials and Methods: The total sample consisted of 60 women aged 35-45 years. 30 women were newly diagnosed with breast cancer before taking any treatment and surgery (study group) and 30 women without clinical signs and symptoms of breast cancer as a control group. Dental caries was record
... Show MoreThis study aimed to determine the radioactivity and radiation hazard indicators of rice samples potentially for human consumption. Gamma spectroscopy was used to calculate the specific activity of natural and artificial radionuclides (238U, 232Th, 40K, and 137Cs) in local and imported rice samples collected from local markets in Baghdad Governorate, Iraq, in addition to various radiological hazard indices. The radionuclide concentrations in the samples varied from 2.123 ± 1.457 Bq/kg to 13.032 ± 3.610 Bq/kg for 238U, 2.906 ± 1.705 Bq/kg to 17.290 ± 4.158 Bq/kg for 232
In this study, the energy charging mechanism is mathematically modeled to determine the impact of design modifications on the thermofluidic behavior of a phase change material (PCM) filled in a triplex tube containment geometry. The surface area of the middle tube, where the PCM is placed, is supported by single or multi-internal frustum tubes in vertical triplex tubes to increase the performance of the heating and cooling of the system. In addition to the ordinary straight triplex tubes, three more scenarios are considered: (1) changing the middle tube to the frustum tube, (2) changing the inner tube to the frustum tube, and (3) changing both the internal and central tubes to the frustum tubes. The impact of adopting the tube desig
... Show MoreAim: To evaluate the cytotoxic activity of newly synthesized a series of novel HDAC inhibitors comprising sulfonamide as zinc binding group and Isatin derivatives as cap group joined by mono amide linker as required to act as HDAC inhibitors. Materials and Methods: The utilization of sulfonamide as zinc binding group joined by N-alkylation reaction with ethyl-bromo hexanoate as linker group that joined by amide reaction with Isatin derivatives as cap groups which known to possess antitumor activity in the designed of new histone deacetylase inhibitors and using the docking and MTT assay to evaluate the compounds. Results: Four compounds have been synthesized and characterized successfully by ART-FTIR, NMR and ESI-Ms. the compounds w
... Show MoreMedium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the
It has become clear to see the role of the small and medium enterprises in the economy, and for the continuity of these projects it is necessary to supply finance from the banks, How ever the latter suffers risk of lending.
&n
... Show More