Some of the main challenges in developing an effective network-based intrusion detection system (IDS) include analyzing large network traffic volumes and realizing the decision boundaries between normal and abnormal behaviors. Deploying feature selection together with efficient classifiers in the detection system can overcome these problems. Feature selection finds the most relevant features, thus reduces the dimensionality and complexity to analyze the network traffic. Moreover, using the most relevant features to build the predictive model, reduces the complexity of the developed model, thus reducing the building classifier model time and consequently improves the detection performance. In this study, two different sets of selected features have been adopted to train four machine-learning based classifiers. The two sets of selected features are based on Genetic Algorithm (GA) and Particle Swarm Optimization (PSO) approach respectively. These evolutionary-based algorithms are known to be effective in solving optimization problems. The classifiers used in this study are Naïve Bayes, k-Nearest Neighbor, Decision Tree and Support Vector Machine that have been trained and tested using the NSL-KDD dataset. The performance of the abovementioned classifiers using different features values was evaluated. The experimental results indicate that the detection accuracy improves by approximately 1.55% when implemented using the PSO-based selected features than that of using GA-based selected features. The Decision Tree classifier that was trained with PSO-based selected features outperformed other classifiers with accuracy, precision, recall, and f-score result of 99.38%, 99.36%, 99.32%, and 99.34% respectively. The results show that using optimal features coupling with a good classifier in a detection system able to reduce the classifier model building time, reduce the computational burden to analyze data, and consequently attain high detection rate.
This study was conducted to explore the effects of using ionized water on the productive and physiological performance of Japanese quails (Coturnix japonica). Our study was conducted at a private farm from 20th April, 2016 to 13th July, 2016 (84 d). One hundred 42-day-old Japanese quail chicks were used, divided randomly into 5 groups with 4 replicates. Treatments consisted in a control group (T1 - normal water:), alkaline (T2 - pH 8 and T3 - pH 9), and acidic water (T4 - pH 6 and T5 - pH 5). All birds were fed a balanced diet of energy and protein. The egg production ratio, egg weight, cumulative number of eggs, egg mass, feed conversion ratio, productivity per hen per week, and effects on plasma lipids, uric acid, glucose, calcium, and ph
... Show MoreRecently, the internet has made the users able to transmit the digital media in the easiest manner. In spite of this facility of the internet, this may lead to several threats that are concerned with confidentiality of transferred media contents such as media authentication and integrity verification. For these reasons, data hiding methods and cryptography are used to protect the contents of digital media. In this paper, an enhanced method of image steganography combined with visual cryptography has been proposed. A secret logo (binary image) of size (128x128) is encrypted by applying (2 out 2 share) visual cryptography on it to generate two secret share. During the embedding process, a cover red, green, and blue (RGB) image of size (512
... Show MoreWastewater recycling for non-potable uses has gained significant attention to mitigate the high pressure on freshwater resources. This requires using a sustainable technique to treat natural municipal wastewater as an alternative to conventional methods, especially in arid and semi-arid rural areas. One of the promising techniques applied to satisfy the objective of wastewater reuse is the constructed wetlands (CWs) which have been used extensively in most countries worldwide through the last decades. The present study introduces a significant review of the definition, classification, and components of CWs, identifying the mechanisms controlling the removal process within such units. Vertical, horizontal, and hybrid CWs
... Show More
Early detection of eye diseases can forestall visual deficiency and vision loss. There are several types of human eye diseases, for example, diabetic retinopathy, glaucoma, arteriosclerosis, and hypertension. Diabetic retinopathy (DR) which is brought about by diabetes causes the retinal vessels harmed and blood leakage in the retina. Retinal blood vessels have a huge job in the detection and treatment of different retinal diseases. Thus, retinal vasculature extraction is significant to help experts for the finding and treatment of systematic diseases. Accordingly, early detection and consequent treatment are fundamental for influenced patients to protect their vision. The aim of this paper is to detect blood vessels from
... Show MoreDetecting protein complexes in protein-protein interaction (PPI) networks is a challenging problem in computational biology. To uncover a PPI network into a complex structure, different meta-heuristic algorithms have been proposed in the literature. Unfortunately, many of such methods, including evolutionary algorithms (EAs), are based solely on the topological information of the network rather than on biological information. Despite the effectiveness of EAs over heuristic methods, more inherent biological properties of proteins are rarely investigated and exploited in these approaches. In this paper, we proposed an EA with a new mutation operator for complex detection problems. The proposed mutation operator is formulate
... Show MoreDigital image manipulation has become increasingly prevalent due to the widespread availability of sophisticated image editing tools. In copy-move forgery, a portion of an image is copied and pasted into another area within the same image. The proposed methodology begins with extracting the image's Local Binary Pattern (LBP) algorithm features. Two main statistical functions, Stander Deviation (STD) and Angler Second Moment (ASM), are computed for each LBP feature, capturing additional statistical information about the local textures. Next, a multi-level LBP feature selection is applied to select the most relevant features. This process involves performing LBP computation at multiple scales or levels, capturing textures at different
... Show MoreAnomaly detection is still a difficult task. To address this problem, we propose to strengthen DBSCAN algorithm for the data by converting all data to the graph concept frame (CFG). As is well known that the work DBSCAN method used to compile the data set belong to the same species in a while it will be considered in the external behavior of the cluster as a noise or anomalies. It can detect anomalies by DBSCAN algorithm can detect abnormal points that are far from certain set threshold (extremism). However, the abnormalities are not those cases, abnormal and unusual or far from a specific group, There is a type of data that is do not happen repeatedly, but are considered abnormal for the group of known. The analysis showed DBSCAN using the
... Show MoreMetal contents in vegetables are interesting because of issues related to food safety and potential health risks. The availability of these metals in the human body may perform many biochemical functions and some of them linked with various diseases at high levels. The current study aimed to evaluate the concentration of various metals in common local consumed vegetables using ICP-MS. The concentrations of metals in vegetables of tarragon, Bay laurel, dill, Syrian mesquite, vine leaves, thymes, arugula, basil, common purslane and parsley of this study were found to be in the range of, 76-778 for Al, 10-333 for B, 4-119 for Ba, 2812-24645 for Ca, 0.1-0.32 for Co, 201-464 for Fe, 3661-46400 for K, 0.31–1.
... Show More