In modern years, internet and computers were used by many nations all overhead the world in different domains. So the number of Intruders is growing day-by-day posing a critical problem in recognizing among normal and abnormal manner of users in the network. Researchers have discussed the security concerns from different perspectives. Network Intrusion detection system which essentially analyzes, predicts the network traffic and the actions of users, then these behaviors will be examined either anomaly or normal manner. This paper suggested Deep analyzing system of NIDS to construct network intrusion detection system and detecting the type of intrusions in traditional network. The performance of the proposed system was evaluated by using Kdd cup 99 dataset. The experimental results displayed that the proposed module are best suited due to their high detection rate with false alarm rate.
In this study, we focused on the random coefficient estimation of the general regression and Swamy models of panel data. By using this type of data, the data give a better chance of obtaining a better method and better indicators. Entropy's methods have been used to estimate random coefficients for the general regression and Swamy of the panel data which were presented in two ways: the first represents the maximum dual Entropy and the second is general maximum Entropy in which a comparison between them have been done by using simulation to choose the optimal methods.
The results have been compared by using mean squares error and mean absolute percentage error to different cases in term of correlation valu
... Show More--The objective of the current research is to identify: 1) Preparing a scale level for e-learning applications, 2) What is the relationship between the applications of e-learning and the students of the Department of Chemistry at the Faculty of Education for Pure Sciences/ Ibn Al-Haytham – University of Baghdad. To achieve the research objectives, the researcher used the descriptive approach because of its suitability to the nature of the study objectives. The researcher built a scale for e-learning applications that consists of (40) items on the five-point Likrat scale (I agree, strongly agree, neutral, disagree, strongly disagree). He also adopted the scale of scientific values, and it consists of (40) items on a five-point scale as wel
... Show MoreIn this research two algorithms are applied, the first is Fuzzy C Means (FCM) algorithm and the second is hard K means (HKM) algorithm to know which of them is better than the others these two algorithms are applied on a set of data collected from the Ministry of Planning on the water turbidity of five areas in Baghdad to know which of these areas are less turbid in clear water to see which months during the year are less turbid in clear water in the specified area.
The social networking sites have brought about fundamental changes and a qualitative shift in the marketing industry and its strategies. The Iraqi ministries have used this site i.e. Facebook to spread and disseminate values in order to consolidate it in Iraqi society which has witnessed many changes in all aspects of life.
The researcher studies the pages of both ministries to know the values contained in the publications of the pages of these two ministries, the quality of grooming as well as the forms in which these values are marketed.
The researcher uses a survey method and content analysis for the publications of these two pages during the study period starting from January 1, 2
... Show MoreErratum for Organic acid concentration thresholds for ageing of carbonate minerals: Implications for CO2 trapping/storage.
It highlights the importance of research through its focus on the assessment of tax for settling accounts Mmakhr medicines and annual statement controls and its role in determining the taxable income of the real tax Mmakhr drugs and achieve tax equity through tax settling accounts. The tax authority relies annual controls laid down by the tax settling accounts for Mmakhr medicines despite their inclusion bookkeeping business No. 2 system for the year 1985 average .ually this basis formulated hypothesis (that the adoption of the tax authority on annual controls in the tax settling accounts for Mmakhr medicine does not contribute in determining income taxable real tax for this Almmakr). the resulting search for a number of conclusions and
... Show MoreThe nuclear structure of 40Ar, 112Cd, 133Cs, 151Eu, 154Sm, and 226Ra target nuclei used in nuclear battery technology was investigated. These nuclei are widely used for the radioisotope thermo-electric generator space studies and for betavoltaic battery microelectronic systems. For this purpose, some nuclear static properties were calculated. In particular, the single particle radial nuclear density distribution, the corresponding root mean square radii, neutron skin thicknesses, and binding energies were calculated within the framework of Hartree-Fock approximation with Skyrme interaction. The bremsstrahlung spectra produced by the absorption of beta particles throu
... Show MoreAchieve breastfeeding book and theft book
To the end of the door cut the way of the manuscript
Sailing Forum for Sheikh Ibrahim bin Mohammed Halabi
(T: 659 H)