Some of the main challenges in developing an effective network-based intrusion detection system (IDS) include analyzing large network traffic volumes and realizing the decision boundaries between normal and abnormal behaviors. Deploying feature selection together with efficient classifiers in the detection system can overcome these problems. Feature selection finds the most relevant features, thus reduces the dimensionality and complexity to analyze the network traffic. Moreover, using the most relevant features to build the predictive model, reduces the complexity of the developed model, thus reducing the building classifier model time and consequently improves the detection performance. In this study, two different sets of selected features have been adopted to train four machine-learning based classifiers. The two sets of selected features are based on Genetic Algorithm (GA) and Particle Swarm Optimization (PSO) approach respectively. These evolutionary-based algorithms are known to be effective in solving optimization problems. The classifiers used in this study are Naïve Bayes, k-Nearest Neighbor, Decision Tree and Support Vector Machine that have been trained and tested using the NSL-KDD dataset. The performance of the abovementioned classifiers using different features values was evaluated. The experimental results indicate that the detection accuracy improves by approximately 1.55% when implemented using the PSO-based selected features than that of using GA-based selected features. The Decision Tree classifier that was trained with PSO-based selected features outperformed other classifiers with accuracy, precision, recall, and f-score result of 99.38%, 99.36%, 99.32%, and 99.34% respectively. The results show that using optimal features coupling with a good classifier in a detection system able to reduce the classifier model building time, reduce the computational burden to analyze data, and consequently attain high detection rate.
Some auditors may think that the audit process ends with discovering misstatements and informing management about them, while the discovery of misstatements may be classified by some as the first step in the phase of separating these distortions, as the auditor should collect these misstatements, evaluate them and detail them into misstatements involving errors or misstatements involving fraud Then evaluating it to material or immaterial according to what was stated in the international auditing standards and directing management to amend the essential ones. The importance of this research lies in identifying the concept of distortions and their types, identifying the method of evaluating distortions into substantial and non-essent
... Show MoreThe objective of this study was tointroduce a recursive least squares (RLS) parameter estimatorenhanced by using a neural network (NN) to facilitate the computing of a bit error rate (BER) (error reduction) during channels estimation of a multiple input-multiple output orthogonal frequency division multiplexing (MIMO-OFDM) system over a Rayleigh multipath fading channel.Recursive least square is an efficient approach to neural network training:first, the neural network estimator learns to adapt to the channel variations then it estimates the channel frequency response. Simulation results show that the proposed method has better performance compared to the conventional methods least square (LS) and the original RLS and it is more robust a
... Show MoreMonthly water samples from three stations in Diwanya river at Diwanyia city were collected during December 1999 to June 2000. Variables from each stations were determined including ; temperature, pH ,dissolved oxygen, dissolved carbon dioxide , alkalinity ,total hardness, calcium ,magnesium , phosphate, nitrite, nitrate, chlorophyll-a , and total number of phytoplankton .The river considered as fresh water , alkaline ,very hard .The parameters recorded at different values from up and down stream.
In recent years, the Global Navigation Satellite Services (GNSS) technology has been frequently employed for monitoring the Earth crust deformation and movement. Such applications necessitate high positional accuracy that can be achieved through processing GPS/GNSS data with scientific software such as BERENSE, GAMIT, and GIPSY-OSIS. Nevertheless, these scientific softwares are sophisticated and have not been published as free open source software. Therefore, this study has been conducted to evaluate an alternative solution, GNSS online processing services, which may obtain this privilege freely. In this study, eight years of GNSS raw data for TEHN station, which located in Iran, have been downloaded from UNAVCO website
... Show MoreData security is an important component of data communication and transmission systems. Its main role is to keep sensitive information safe and integrated from the sender to the receiver. The proposed system aims to secure text messages through two security principles encryption and steganography. The system produced a novel method for encryption using graph theory properties; it formed a graph from a password to generate an encryption key as a weight matrix of that graph and invested the Least Significant Bit (LSB) method for hiding the encrypted message in a colored image within a green component. Practical experiments of (perceptibility, capacity, and robustness) were calculated using similarity measures like PSNR, MSE, and
... Show MoreAbstract
This study was to demonstrate the role-use planning scientific methods is disabled and little used in the planning and follow-up construction of vital projects in the province of Baghdad, including network planning methods, in order to find the optimal time to finish the project in light of the resources available and the budget set for it, in the current research has been used the most prominent network planning methods and two stylistic (CPM / PERT), was the application of the critical path method on standard-design school project (traditional) to draw Action Network according to confirmed times for the activities of the project and account his Crashing time , It was Pert technique applied to the project hemato
... Show MoreThe aim of this research is to identify the level of health services provided in the health centers operating in the family medicine system in Baghdad, and to determine the extent to which these health centers are applied to the internationally recognized standards , "Defining the quality of service gap between health care centers operating in the family medicine system and the standards adopted by the corresponding international centers (Al-Shabab Model Family Medicine Center, Al-Jahad Family Health Center, Al-Adhamiya Family Health Center, Al-Zawiya Family Health Center), and in view of what our health institutions are facing. The family of primary health care centers has difficulties, obstacles and challenges such as the diffi
... Show MoreBackground: Saliva is one of the most important etiological host factors in relation to dental caries. It affects the carious process by its organic and inorganic constituents; in addition to its physiological functions as (flow rate, pH and buffer capacity). The aims of this study were to determine the concentrations of major elements (calcium and phosphorus) and trace elements (ferrous iron, nickel, chromium and aluminum) in saliva among a group of adolescent girls, and to explore the relation of these elements, flow rate and pH with dental caries. Material & Methods: The study group consisted of 25 girls with an age of 13-15 years old. Dental caries was diagnosed by both clinical and radiographical examinations following the criteria of
... Show More This paper describes the application of consensus optimization for Wireless Sensor Network (WSN) system. Consensus algorithm is usually conducted within a certain number of iterations for a given graph topology. Nevertheless, the best Number of Iterations (NOI) to reach consensus is varied in accordance with any change in number of nodes or other parameters of . graph topology. As a result, a time consuming trial and error procedure will necessary be applied
to obtain best NOI. The implementation of an intellig ent optimization can effectively help to get the optimal NOI. The performance of the consensus algorithm has considerably been improved by the inclusion of Particle Swarm Optimization (PSO). As a case s