Some of the main challenges in developing an effective network-based intrusion detection system (IDS) include analyzing large network traffic volumes and realizing the decision boundaries between normal and abnormal behaviors. Deploying feature selection together with efficient classifiers in the detection system can overcome these problems. Feature selection finds the most relevant features, thus reduces the dimensionality and complexity to analyze the network traffic. Moreover, using the most relevant features to build the predictive model, reduces the complexity of the developed model, thus reducing the building classifier model time and consequently improves the detection performance. In this study, two different sets of selected features have been adopted to train four machine-learning based classifiers. The two sets of selected features are based on Genetic Algorithm (GA) and Particle Swarm Optimization (PSO) approach respectively. These evolutionary-based algorithms are known to be effective in solving optimization problems. The classifiers used in this study are Naïve Bayes, k-Nearest Neighbor, Decision Tree and Support Vector Machine that have been trained and tested using the NSL-KDD dataset. The performance of the abovementioned classifiers using different features values was evaluated. The experimental results indicate that the detection accuracy improves by approximately 1.55% when implemented using the PSO-based selected features than that of using GA-based selected features. The Decision Tree classifier that was trained with PSO-based selected features outperformed other classifiers with accuracy, precision, recall, and f-score result of 99.38%, 99.36%, 99.32%, and 99.34% respectively. The results show that using optimal features coupling with a good classifier in a detection system able to reduce the classifier model building time, reduce the computational burden to analyze data, and consequently attain high detection rate.
An evaluation for the performance of model pile embedded in expansive soil was investigated. An extensive testing program was planned to achieve the purpose of this research. Therefore, special manufactured system was prepared for studying the behavior of model pile having different length to diameter ratios (L/D). Two types of piles were used in this research, straight shaft and under reamed piles. The effect of model pile type, L/D ratio and number of wetting drying cycles were studied. It is observed that significant reductions in pile movement when under reamed piles were considered. A proposed design charts was presented for straight shaft and under reamed piles to estimate the length of both types of piles that is requi
... Show MoreThe use of real-time machine learning to optimize passport control procedures at airports can greatly improve both the efficiency and security of the processes. To automate and optimize these procedures, AI algorithms such as character recognition, facial recognition, predictive algorithms and automatic data processing can be implemented. The proposed method is to use the R-CNN object detection model to detect passport objects in real-time images collected by passport control cameras. This paper describes the step-by-step process of the proposed approach, which includes pre-processing, training and testing the R-CNN model, integrating it into the passport control system, and evaluating its accuracy and speed for efficient passenger flow
... Show MoreThe goal of this work is to check the presence of PNS (photon number splitting) attack in quantum cryptography system based on BB84 protocol, and to get a maximum secure key length as possible. This was achieved by randomly interleaving decoy states with mean photon numbers of 5.38, 1.588 and 0.48 between the signal states with mean photon numbers of 2.69, 0.794 and 0.24. The average length for a secure key obtained from our system discarding the cases with Eavesdropping was equal to 125 with 20 % decoy states and 82 with 50% decoy states for mean photon number of 0.794 for signal states and 1.588 for decoy states.
The research Aim is to provide support to small enterprises by providing tools that enable measurement and test their performance and identifying weaknesses and work on them is determined by the problem of searching using traditional assessment methods for small projects with only financial performance measurement standards that do not provide a complete picture of the performance of these projects so use the balanced scorecard the four pillars (financial, customer, learning and growth, and internal processes) and identify deviations and work on them through the use of the outputs of the programme (probe), PROmoting Business Excellence-PROBE), which It is a model of performance evaluation, with which you can deve
... Show MoreActive worms have posed a major security threat to the Internet, and many research efforts have focused on them. This paper is interested in internet worm that spreads via TCP, which accounts for the majority of internet traffic. It presents an approach that use a hybrid solution between two detection algorithms: behavior base detection and signature base detection to have the features of each of them. The aim of this study is to have a good solution of detecting worm and stealthy worm with the feature of the speed. This proposal was designed in distributed collaborative scheme based on the small-world network model to effectively improve the system performance.
The aim of this study was to Identifying The Effect of using Linear programming and Branching programming by computer in Learning and Retention of movement concatenation(Linkwork) in parallel bars in Artistic Gymnastics. The searchers have used the experimental method. The search subject of this article has been taken (30) male - students in the second class from the College of Physical Education/University of Baghdad divided into three groups; the first group applied linear programming by computer, and the second group has been applicated branching programming by computer, while precision group used traditional method in the college. The researchers concluded the results by using the statistical bag for social sciences (spss) such as both
... Show MoreFuture wireless communication systems must be able to accommodate a large number of users and simultaneously to provide the high data rates at the required quality of service. In this paper a method is proposed to perform the N-Discrete Hartley Transform (N-DHT) mapper, which are equivalent to 4-Quadrature Amplitude Modulation (QAM), 16-QAM, 64-QAM, 256-QAM, … etc. in spectral efficiency. The N-DHT mapper is chosen in the Multi Carrier Code Division Multiple Access (MC-CDMA) structure to serve as a data mapper instead of the conventional data mapping techniques like QPSK and QAM schemes. The proposed system is simulated using MATLAB and compared with conventional MC-CDMA for Additive White Gaussian Noise, flat, and multi-path selective fa
... Show MoreAbstract
In this manuscript, a simple new method for the green synthesis of platinum nanoparticles (Pt NPs) utilizing F. carica Fig extract as reducing agent for antimicrobial activities was reported. Simultaneously, the microstructural and morphological features of the synthesized Pt NPs were thoroughly investigated. In particular, the attained Pt NPs exhibited spherical shape with diameter range of 5-30 nm and root mean square of 9.48 nm using Transmission Electron Microscopy (TEM) and Atomic Force Microscopy (AFM), respectively. Additionally, the final product (Pt NPs) was screened as antifungal and antibacterial agent against Candida and Aspergillus species as well as Gram-positive Staphyllococcus aureus and G
... Show MoreE-learning is a necessity imposed by the Corona pandemic, which has disrupted various educational institutions in the world, but some of these institutions have not been affected and education has continued with them, due to their flexible educational system that was able to employ technology in the continuity of the educational process in the so-called e-learning, because It has characteristics that make it the most suitable alternative to avoid the consequences of the Corona pandemic and its damage to the educational process, as e-learning is one of the modern methods that contribute to enhancing the effectiveness of the learner, and enabling him to assume greater responsibility compared to traditional education, so the learner becomes
... Show MoreThe need for renewable energy sources is higher than ever due to rising global warming, climate change, and ozone depletion. For refrigeration and air conditioning applications, adsorption refrigeration systems are viable alternatives cooling techniques. This study is a topic and part of the M.Sc. thesis. A field solar-powered ice maker unit was created, studied, tested, and evaluated on the 13th and 30th of May, 2022. Activated carbon and methanol pair was used to set up a refrigeration system in Baghdad (Al Dora). Experimental tests were carried out outdoors to determine the coefficient of performance COP and specific cooling power SCP of the system. The results showed that the lowest temperature
... Show More