Some of the main challenges in developing an effective network-based intrusion detection system (IDS) include analyzing large network traffic volumes and realizing the decision boundaries between normal and abnormal behaviors. Deploying feature selection together with efficient classifiers in the detection system can overcome these problems. Feature selection finds the most relevant features, thus reduces the dimensionality and complexity to analyze the network traffic. Moreover, using the most relevant features to build the predictive model, reduces the complexity of the developed model, thus reducing the building classifier model time and consequently improves the detection performance. In this study, two different sets of selected features have been adopted to train four machine-learning based classifiers. The two sets of selected features are based on Genetic Algorithm (GA) and Particle Swarm Optimization (PSO) approach respectively. These evolutionary-based algorithms are known to be effective in solving optimization problems. The classifiers used in this study are Naïve Bayes, k-Nearest Neighbor, Decision Tree and Support Vector Machine that have been trained and tested using the NSL-KDD dataset. The performance of the abovementioned classifiers using different features values was evaluated. The experimental results indicate that the detection accuracy improves by approximately 1.55% when implemented using the PSO-based selected features than that of using GA-based selected features. The Decision Tree classifier that was trained with PSO-based selected features outperformed other classifiers with accuracy, precision, recall, and f-score result of 99.38%, 99.36%, 99.32%, and 99.34% respectively. The results show that using optimal features coupling with a good classifier in a detection system able to reduce the classifier model building time, reduce the computational burden to analyze data, and consequently attain high detection rate.
order to increase the level of security, as this system encrypts the secret image before sending it through the internet to the recipient (by the Blowfish method). As The Blowfish method is known for its efficient security; nevertheless, the encrypting time is long. In this research we try to apply the smoothing filter on the secret image which decreases its size and consequently the encrypting and decrypting time are decreased. The secret image is hidden after encrypting it into another image called the cover image, by the use of one of these two methods" Two-LSB" or" Hiding most bits in blue pixels". Eventually we compare the results of the two methods to determine which one is better to be used according to the PSNR measurs

The research aimed to determine the role of the agricultural extension in educating farmers about the legislation on the protection of the rural environment from pollution with chemical pesticides working in the Department of Agricultural Extension and Training and the Department of Agricultural Extension in the directorates of agriculture of Najaf and Qadisiyah, and to determine the role of the agricultural extension in the axis of farmers' use of the correct methods to protect the rural environment from pollution with chemical pesticides and the axis of the reasons that lead farmers to pollute the rural environment with chemical pesticides, and to achieve the objectives of this research prepared A questionnaire in the light of rev
... Show MoreThis research aims to know the effectiveness of teaching with a proposed strategy according to the common Knowledge construction modelin mathematical proficiency among students of the second middle class. The researchers adopted the method of the experimental approach, as the experimental design was used for two independent and equal groups with a post-test. The experiment was applied to a sample consisting of (83) students divided into two groups: an experimental comprising (42) students and a control group, the second comprising (41) students., from Badr Shaker Al-Sayyab Intermediate School for Boys, for the first semester of the academic year (2021-2022), the two groups were rewarded in four variables: (chronological age calculated in mo
... Show MoreBackground: The adenomatoid odontogenic tumor is a relatively rare benign epithelial odontogenic tumor. It contains both epithelial and mesenchymal components. Few cases presented as an extrafollicular lesion or involve the mandible or associated with other odontogenic lesions. This paper represents a rare case of an extrafollicular AOT. Case presentation: A 24-year-old female had a painless swelling on the right side of the lower jaw since one-month duration. Intraorally there was a well defined fluctuant-blue swelling in the right alveolar premolar region measuring 1×2 cm obliterating the right lower buccal vestibule. Grade II mobility in the vital 44 and 45 teeth were observed. Panoramic radiographs showed a well-defined pear shaped
... Show MoreThe heavy metals Cd, Cu, Fe, pb, and Zn were determined in dissolved and particulate phases of the water,in addition to exchangeable and residual phases of the sediment and in the selected organs of the fish Cyprinus carpio collected from the Euphrates River near Al-Nassiriya city center south of Iraq during the summer period / 2009 .Also sediment texture and total organic carbon(TOC) were measured. Analysis emploing a flam Atomic Absorption Spectrophotometers . The mean regional concentrations of the heavy metals in dissolved (µg/l) and particulate phases (µg/gm) dry weight were Cd (0.15,16.13) ,Cu (0.59,24.48) ,Fe (726,909.4) ,Pb (0.20, 49.95) and Zn (2.5,35.62) respectively,and those for exchangeable and residual phases of the
... Show MoreNovel derivatives of 1-(´1, ´3, ´4, ´6-tetra benzoyl-β-D-fructofuranosyl)-1H- benzotriazole and 1-(´1, ´3, ´4, ´6-tetra benzoyl-β-D-fructofuranosyl)-1H- benzotriazole carrying Schiff bases moiety were synthesised and fully characterised. The protection of D- fructose using benzoyl chloride was synthesized, followed by nucleophilic addition/elimination between benzotria- zole and chloroacetyl chloride to give 1-(1- chloroacetyl)- 1H-benzotriazole. The next step was condensation reaction of protected fructose and 1-(1-chloroacetyl)-1H- benzotriazole producing a new nucleoside analogue. The novel nucleoside analogues underwent a second conden- sation reaction with different aromatic and aliphatic amines to provide new Schiff b
... Show MoreThe study aimed at designing compound exercises using added weight on some skill abilities in youth soccer players aged (17 – 19) years old. The researcher sued the experimental method on (30) players aged (17 – 19) years old from Al Zawraa Sport Club. The subjects were divided into three groups and the training program was applied for (8) weeks with (3) training sessions per week. The data was collected and treated using proper statistical operations to conclude that compound exercises with weights between improved the subjects compared to the groups that did not use the added weights. Finally, the researchers recommended the necessity of using compound exercises using added weights during training sessions for youth soccer pla
... Show More