Some of the main challenges in developing an effective network-based intrusion detection system (IDS) include analyzing large network traffic volumes and realizing the decision boundaries between normal and abnormal behaviors. Deploying feature selection together with efficient classifiers in the detection system can overcome these problems. Feature selection finds the most relevant features, thus reduces the dimensionality and complexity to analyze the network traffic. Moreover, using the most relevant features to build the predictive model, reduces the complexity of the developed model, thus reducing the building classifier model time and consequently improves the detection performance. In this study, two different sets of selected features have been adopted to train four machine-learning based classifiers. The two sets of selected features are based on Genetic Algorithm (GA) and Particle Swarm Optimization (PSO) approach respectively. These evolutionary-based algorithms are known to be effective in solving optimization problems. The classifiers used in this study are Naïve Bayes, k-Nearest Neighbor, Decision Tree and Support Vector Machine that have been trained and tested using the NSL-KDD dataset. The performance of the abovementioned classifiers using different features values was evaluated. The experimental results indicate that the detection accuracy improves by approximately 1.55% when implemented using the PSO-based selected features than that of using GA-based selected features. The Decision Tree classifier that was trained with PSO-based selected features outperformed other classifiers with accuracy, precision, recall, and f-score result of 99.38%, 99.36%, 99.32%, and 99.34% respectively. The results show that using optimal features coupling with a good classifier in a detection system able to reduce the classifier model building time, reduce the computational burden to analyze data, and consequently attain high detection rate.
In the last few years, the literature conferred a great interest in studying the feasibility of using memristive devices for computing. Memristive devices are important in structure, dynamics, as well as functionalities of artificial neural networks (ANNs) because of their resemblance to biological learning in synapses and neurons regarding switching characteristics of their resistance. Memristive architecture consists of a number of metastable switches (MSSs). Although the literature covered a variety of memristive applications for general purpose computations, the effect of low or high conductance of each MSS was unclear. This paper focuses on finding a potential criterion to calculate the conductance of each MMS rather t
... Show MoreSustainability is a major demand and need pursued by cities in all areas of life due to the environmental, social and economic gains they provide, especially in the field of city planning and urban renewal projects that aim to integrate the past, present and future.
The research aims to evaluate the Haifa Street renewal project, and Al-Shawaka district, one of the Baghdad districts located next to Al-Karkh, was elected by comparing the sustainability indicators of urban renewal with the reality of the situation through a field survey and questionnaire form and focusing on the social and economic impacts and environmental for the project on the study area. To reach the most important conclusions and recommendations
... Show MoreThis paper describes the use of microcomputer as a laboratory instrument system. The system is focused on three weather variables measurement, are temperature, wind speed, and wind direction. This instrument is a type of data acquisition system; in this paper we deal with the design and implementation of data acquisition system based on personal computer (Pentium) using Industry Standard Architecture (ISA)bus. The design of this system involves mainly a hardware implementation, and the software programs that are used for testing, measuring and control. The system can be used to display the required information that can be transferred and processed from the external field to the system. A visual basic language with Microsoft foundation cl
... Show MoreHiding secret information in the image is a challenging and painstaking task in computer security and steganography system. Certainly, the absolute intricacy of attacks to security system makes it more attractive.in this research on steganography system involving information hiding,Huffman codding used to compress the secret code before embedding which provide high capacity and some security. Fibonacci decomposition used to represent the pixels in the cover image, which increase the robustness of the system. One byte used for mapping all the pixels properties. This makes the PSNR of the system higher due to random distribution of embedded bits. Finally, three kinds of evaluation are applied such as PSNR, chi-square attack, a
... Show MoreIn these recent years, the world has witnessed a kind of social exclusion and the inability to communicate directly due to the Corona Virus Covid 19 (COVID-19) pandemic, and the consequent difficulty of communicating with patients with hospitals led to the need to use modern technology to solve and facilitate the problem of people communicating with each other. healthcare has made many remarkable developments through the Internet of things (IOT) and cloud computing to monitor real-time patients' data, which has enabled many patients' lives to be saved. this paper presents the design and implementation of a Private Backend Server Software based on an IoT health monitoring system concerned emergency medical services utilizing biosenso
... Show MoreThere is a suggestion that an antidiuretic hormone-induced decrease in diuresis might contribute to the rapid relief of the acute pain in renal colic. This study was designed to evaluate the efficacy of desmopressin nasal spray compared with diclofenac given intramuscularly in patients with acute renal colic. The study included 75 patients randomized into three different groups; group A received desmopressin (40 μg, nasal spray), group B diclofenac (75 mg) intramuscularly and group C, both desmopressin and diclofenac. Pain was assessed using a visual analogue scale (a 10-cm horizontal scale ranging from `no pain' to `unbearable pain') at baseline, 10, 20 and 30 min after administering t
... Show MoreSummary:The anatomy of the arterial and venous vessels of the mammalian oviduct is well describedin women and in laboratory and farm animals. The arteries are derived from the ovarian anduterine stems; the relative contribution of these vessels, however, or variations in that contributionwith the menstrual or estrus cycle and/or gamete or embryo transport is unknown.
The research aims to develop the general performance and improve the level of activity of private insurance companies in line with the current progress of the country. Besides, Evaluating financial performance to diagnose weaknesses and strengths in sample research companies and then developing appropriate solutions. The deviation in the financial performance of the research sample was revealed by measuring the various accounts of the company. The research sample included five companies in the private insurance sector listed in the Iraqi Stock Exchange Market, which represent the private insurance sector. The research concluded that the added economic value is a broad concept that goes beyond the traditional performance evaluation process a
... Show More