Classification of network traffic is an important topic for network management, traffic routing, safe traffic discrimination, and better service delivery. Traffic examination is the entire process of examining traffic data, from intercepting traffic data to discovering patterns, relationships, misconfigurations, and anomalies in a network. Between them, traffic classification is a sub-domain of this field, the purpose of which is to classify network traffic into predefined classes such as usual or abnormal traffic and application type. Most Internet applications encrypt data during traffic, and classifying encrypted data during traffic is not possible with traditional methods. Statistical and intelligence methods can find and model traffic patterns that can be categorized based on statistical characteristics. These methods help determine the type of traffic and protect user privacy at the same time. To classify encrypted traffic from end to end, this paper proposes using (XGboost) algorithms, finding the highest parameters using Bayesian optimization, and comparing the proposed model with machine learning algorithms (Nearest Neighbor, Logistic Regression, Decision Trees, Naive Bayes, Multilayer Neural Networks) to classify traffic from end to end. Network traffic has two classifications: whether the traffic is encrypted or not, and the target application. The research results showed the possibility of classifying dual and multiple traffic with high accuracy. The proposed model has a higher classification accuracy than the other models, and finding the optimal parameters increases the model accuracy.
Seven fish species were collected from the drainage network at Al-Madaen region, south of
Baghdad with the aid of a cast net during the period from March to August 1993. These fishes
were infected with 22 parasite species (seven sporozoans, three ciliated protozoans, seven
monogeneans, two nematodes, one acanthocephalan and two crustaceans) and one fungus
species. Among such parasites, Chloromyxum wardi and Cystidicola sp. are reported here for
the first time in Iraq. In addition, 11 new host records are added to the list of parasites of
fishes of Iraq.
In this paper, first we refom1Ulated the finite element model
(FEM) into a neural network structure using a simple two - dimensional problem. The structure of this neural network is described
, followed by its application to solving the forward and inverse problems. This model is then extended to the general case and the advantages and di sadvantages of this approach are descri bed along with an analysis of the sensi tivity of
... Show MoreIn information security, fingerprint verification is one of the most common recent approaches for verifying human identity through a distinctive pattern. The verification process works by comparing a pair of fingerprint templates and identifying the similarity/matching among them. Several research studies have utilized different techniques for the matching process such as fuzzy vault and image filtering approaches. Yet, these approaches are still suffering from the imprecise articulation of the biometrics’ interesting patterns. The emergence of deep learning architectures such as the Convolutional Neural Network (CNN) has been extensively used for image processing and object detection tasks and showed an outstanding performance compare
... Show MoreSocial protection meets different aspects of the needs of vulnerable groups, such as the economic, health, education, and family relations and ties in the Iraqi society. This is because vulnerable groups have suffered from social and economic influences that have negative implications on the social reality as a whole. Poverty is a case in point, which paved the way to frequent setbacks that have led to social structure instability. Accordingly, the present study aims to examine the role and effect of the Net of Social Protection Program in equally distributing social protection to curb or mitigate any negative consequnces that might happen to the poor segments and vulnerable people, who are succeptible to shocks, such as: the orphans, un
... Show MoreDocument clustering is the process of organizing a particular electronic corpus of documents into subgroups of similar text features. Formerly, a number of conventional algorithms had been applied to perform document clustering. There are current endeavors to enhance clustering performance by employing evolutionary algorithms. Thus, such endeavors became an emerging topic gaining more attention in recent years. The aim of this paper is to present an up-to-date and self-contained review fully devoted to document clustering via evolutionary algorithms. It firstly provides a comprehensive inspection to the document clustering model revealing its various components with its related concepts. Then it shows and analyzes the principle research wor
... Show MoreIdentify the effect of an educational design according to the repulsive (allosteric) learning model on the achievement of chemistry and lateral thinking. The sample consisted of (59) students from third-grade intermediate students. They were randomly distributed into two groups (experimental and control), and the equivalence was done in (chronological age, previous achievement in chemistry, intelligence, lateral thinking). The (30) students from experimental group were taught according to the instructional design, other 29 students from the (control) group were taught according to the usual method. Two tests done, one of them is an achievement test consisted of (30) items of the type of multiple choice, the other was a lateral think
... Show MoreLearning Disabilities are described as a hidden and puzzling disability. Children with these difficulties have the potential to hide weaknesses in their performance because they are a homogenous group of disorders that consist of obvious difficulties in acquiring and using reading, writing, Mathematical inference. Thus, the research aims to identify the disabilities of academic learning in (reading, writing, mathematics), identify the problems of behavior (general, motor, social). Identify the relationship among behaviour problems. The research also aims to identify the counseling needs to reduce the behavioral problems. The researcher adopted the analytical descriptive method by preparing two main tools for measuring learning disabiliti
... Show Morecurrent research aims to build an intellectual framework for concept of organizational forgetting, which is considered one of the most important topics in contemporary management thought, which is gain the consideration of most scholars and researchers in field of organizational behavior, which is to be a loss of intentional or unintentional knowledge of any organizational level. It turned out that just as organizations should learn and acquire knowledge, they must also forget, especially knowledge obsolete and worn out. And represented the research problem in the absence of Arab research dealing with organizational forgetting, and highlights the supporting infrastructure core, and show a close relationship with organizational le
... Show More