Some of the main challenges in developing an effective network-based intrusion detection system (IDS) include analyzing large network traffic volumes and realizing the decision boundaries between normal and abnormal behaviors. Deploying feature selection together with efficient classifiers in the detection system can overcome these problems. Feature selection finds the most relevant features, thus reduces the dimensionality and complexity to analyze the network traffic. Moreover, using the most relevant features to build the predictive model, reduces the complexity of the developed model, thus reducing the building classifier model time and consequently improves the detection performance. In this study, two different sets of selected features have been adopted to train four machine-learning based classifiers. The two sets of selected features are based on Genetic Algorithm (GA) and Particle Swarm Optimization (PSO) approach respectively. These evolutionary-based algorithms are known to be effective in solving optimization problems. The classifiers used in this study are Naïve Bayes, k-Nearest Neighbor, Decision Tree and Support Vector Machine that have been trained and tested using the NSL-KDD dataset. The performance of the abovementioned classifiers using different features values was evaluated. The experimental results indicate that the detection accuracy improves by approximately 1.55% when implemented using the PSO-based selected features than that of using GA-based selected features. The Decision Tree classifier that was trained with PSO-based selected features outperformed other classifiers with accuracy, precision, recall, and f-score result of 99.38%, 99.36%, 99.32%, and 99.34% respectively. The results show that using optimal features coupling with a good classifier in a detection system able to reduce the classifier model building time, reduce the computational burden to analyze data, and consequently attain high detection rate.
Background: The efficacy of educational strategies is crucial for nursing students to competently perform pediatric procedures like nasogastric tube insertion. Specific Background: This study evaluates the effectiveness of simulation, blended, and self-directed learning strategies in enhancing these skills among nursing students. Knowledge Gap: Previous research lacks a comprehensive comparison of these strategies' impacts on skill development in pediatric nursing contexts. Aims: The study aims to assess the effectiveness of different educational strategies on nursing students' ability to perform pediatric nasogastric tube insertions. Methods: A pre-experimental design was employed at the College of Nursing, University of Baghdad, i
... Show MoreQJ Rashid, IH Abdul-Abbas, MR Younus, PalArch's Journal of Archaeology of Egypt/Egyptology, 2021 - Cited by 4
Monaural source separation is a challenging issue due to the fact that there is only a single channel available; however, there is an unlimited range of possible solutions. In this paper, a monaural source separation model based hybrid deep learning model, which consists of convolution neural network (CNN), dense neural network (DNN) and recurrent neural network (RNN), will be presented. A trial and error method will be used to optimize the number of layers in the proposed model. Moreover, the effects of the learning rate, optimization algorithms, and the number of epochs on the separation performance will be explored. Our model was evaluated using the MIR-1K dataset for singing voice separation. Moreover, the proposed approach achi
... Show MoreThe research aims to extrapolate the repercussions of the use of expert systems in the work of the external auditor on the quality of audit, as the research problem was that despite the use of these techniques in audit work, there is a problem related to the efficiency and effectiveness of these technological systems used in audit work, the feasibility of their use and the extent of their impact: The quality of the audit process.
The researchers adopted the questionnaire as a tool for collecting study data from a community composed of auditors in auditing offices and companies in Iraq, and the auditors of the Iraqi Federal Financial Supervision Bureau. The number of recovered and valid qu
... Show MoreThe current research aims to determine the requirements of Trends of International Mathematics and Science Study (TIMSS 2019) and to find out the extent to which the content of science textbooks for grades (1-4) in the Sultanate of Oman includes the requirements of (TIMSS 2019). Only the content dimension has been taken into account when conducting the content analysis. The study population includes all science books from the first to the fourth grade for the academic year 2021-2022. The study identified and organized the requirements in the study tool, which is a list of requirements of (TIMSS 2019). The results showed a general deficiency in all grades (1-4) in the content dimension including many main topics, subtopics, and objectives
... Show Moreقياس جودة نظام الحكم أنموذج فعالة الأداء الحكومي في العراق
Seek Iraqi insurance companies to face the global changes today that may affect the overall performance of the company, it must find an effective means of providing everything you need company information, and by increasing attention to administrative operations in general, especially the marketing process, which from its core focus on activities related to elements of the marketing mix, as the success of any company in achieving the planned objectives, linked to its ability to make sound decisions in the context of the above elements, for the latter of great importance, especially if based on facts and indicators obtained from th
... Show MoreWith the growth of mobile phones, short message service (SMS) became an essential text communication service. However, the low cost and ease use of SMS led to an increase in SMS Spam. In this paper, the characteristics of SMS spam has studied and a set of features has introduced to get rid of SMS spam. In addition, the problem of SMS spam detection was addressed as a clustering analysis that requires a metaheuristic algorithm to find the clustering structures. Three differential evolution variants viz DE/rand/1, jDE/rand/1, jDE/best/1, are adopted for solving the SMS spam problem. Experimental results illustrate that the jDE/best/1 produces best results over other variants in terms of accuracy, false-positive rate and false-negative
... Show More