Secure data communication across networks is always threatened with intrusion and abuse. Network Intrusion Detection System (IDS) is a valuable tool for in-depth defense of computer networks. Most research and applications in the field of intrusion detection systems was built based on analysing the several datasets that contain the attacks types using the classification of batch learning machine. The present study presents the intrusion detection system based on Data Stream Classification. Several data stream algorithms were applied on CICIDS2017 datasets which contain several new types of attacks. The results were evaluated to choose the best algorithm that satisfies high accuracy and low computation time.
In this study, 25 clinical isolates of Proteus spp. were collected from urine, wounds and burns specimens from different hospitals in Baghdad city, all isolates were identified by using different bacteriological media, biochemical assays and Vitek-2 system. It was found that 15 (60%) isolates were identifies as Proteus mirabilis and 10 (40 %) isolates were Proteus vulgaris. The susceptibility of P. mirabilis and P. vulgaris isolates towards cefotaxime was (66.6 %) and (44.4 %) respectively; while the susceptibility of P. mirabilis and P. vulgaris isolates towards ceftazidime was (20%). Extended spectrum β-lactamses producing Proteus was (30.7 %). DNA of 10 isolates of P. mirabilis and 4 isolates of P. vulgaris were extracted and detecti
... Show MoreKarbala province was one of the most important areas in Iraq and considered an
economic resource of vegetation such as trees of fruits, sieve and other vegetation.
This research aimed to utilize change detection for investigating the current
vegetation cover at last three decay. The main objectives of this research are collect
a group of studied area (Karbala province) satellite images in sequence time for
the same area, these image captured by Landsat (TM 1995, ETM+ 2005 and
Landsat 8 OLI (Operational Land Imager) 2015. Preprocessing such as atmosphere
correction and rectification has been done. Mosaic model between the parts of
studied area was performing. Gap filling consider being very important step has
be
Widespread COVID-19 infections have sparked global attempts to contain the virus and eradicate it. Most researchers utilize machine learning (ML) algorithms to predict this virus. However, researchers face challenges, such as selecting the appropriate parameters and the best algorithm to achieve an accurate prediction. Therefore, an expert data scientist is needed. To overcome the need for data scientists and because some researchers have limited professionalism in data analysis, this study concerns developing a COVID-19 detection system using automated ML (AutoML) tools to detect infected patients. A blood test dataset that has 111 variables and 5644 cases was used. The model is built with three experiments using Python's Auto-
... Show MoreThe current study was designed to investigate the occurrence of aflatoxin B1 in thirty two samples of fish feedstuff were collected randomly from some Iraqi local markets using ELISA technique. Aflatoxin B1 was detected in thirty samples and the concentration of toxin ranged from 50 ppb to 1000 ppb.
Microwave and ozone were used for detoxification of aflatoxin B1 from sample with highest concentration (1000 ppb), two degree of temperature and two times (50°C and 100°C for 5 minute and 10 minute to each degree) of microwave, also two doses and two times (2 g and 4 g for 5 minute and 10 minute to each dose) of ozone gas were used.
Degradation of aflatoxin B1 by
... Show MoreBackground: The role of Human papillomaviruses (HPV) in the etiology of ovarian cancer remains unclear and the results are controversial. Several studies have verified the presence of HPV DNA in both malignant and benign ovarian tumors.
Objectives: Determine the percentage of detection of HPV high (16&18) and low risk types (6&11) in surface epithelial ovarian carcinoma compared to benign and control groups.
Materials And Methods: Molecular detection and genotyping of HPV DNA were performed in 76 ovarian tissue blocks by using in situ hybridization (ISH) technique for detecting and localization of high risk HPV (16 and 18) and low risk HPV (6&11) types.
Results: The presence of ISH signals fo
This paper describes a research effort that aims of developing solar models for housing suitable for the Arabian region since the Arabian Peninsula is excelled with very high levels of solar radiation.
The current paper is focused on achieving energy efficiency through utilizing solar energy and conserving energy. This task can be accomplished by implementation the major elements related to energy efficiency in housing design , such as embark on an optimum photovoltaic system orientation to maximize seize solar energy and produce solar electricity. All the precautions were taken to minimizing the consumption of solar energy for providing the suitable air-condition to the inhibitor of the solar house in addition to use of energy effici
The purpose of this paper is to build a simulation model by using HEC-RAS software to simulate the reality of water movement in the main river of Basra City (South of Iraq) which is known as Siraji-Khoura River. The main objective of the simulation is to detect areas where the water cycle is interrupted in some stations of the river stream, as this river has become an outlet for the disposal of sewage, leading to pollution and causing weakness in some sections of the river & obstructing the water cycle that takes place between this river and Shatt al – Arab river. A field survey data of the river and its banks were adopted to derive the grades, longitudinal and cross sections of the river, these data included three-dimensional coordinates
... Show MoreAssume that is a meromorphic fuction of degree n where X is compact Riemann surface of genus g. The meromorphic function gives a branched cover of the compact Riemann surface X. Classes of such covers are in one to one correspondence with conjugacy classes of r-tuples ( of permutations in the symmetric group , in which and s generate a transitive subgroup G of This work is a contribution to the classification of all primitive groups of degree 7, where X is of genus one.
Arabic text categorization for pattern recognitions is challenging. We propose for the first time a novel holistic method based on clustering for classifying Arabic writer. The categorization is accomplished stage-wise. Firstly, these document images are sectioned into lines, words, and characters. Secondly, their structural and statistical features are obtained from sectioned portions. Thirdly, F-Measure is used to evaluate the performance of the extracted features and their combination in different linkage methods for each distance measures and different numbers of groups. Finally, experiments are conducted on the standard KHATT dataset of Arabic handwritten text comprised of varying samples from 1000 writers. The results in the generatio
... Show MoreE-mail is an efficient and reliable data exchange service. Spams are undesired e-mail messages which are randomly sent in bulk usually for commercial aims. Obfuscated image spamming is one of the new tricks to bypass text-based and Optical Character Recognition (OCR)-based spam filters. Image spam detection based on image visual features has the advantage of efficiency in terms of reducing the computational cost and improving the performance. In this paper, an image spam detection schema is presented. Suitable image processing techniques were used to capture the image features that can differentiate spam images from non-spam ones. Weighted k-nearest neighbor, which is a simple, yet powerful, machine learning algorithm, was used as a clas
... Show More