Clustering algorithms have recently gained attention in the related literature since
they can help current intrusion detection systems in several aspects. This paper
proposes genetic algorithm (GA) based clustering, serving to distinguish patterns
incoming from network traffic packets into normal and attack. Two GA based
clustering models for solving intrusion detection problem are introduced. The first
model coined as handles numeric features of the network packet, whereas
the second one coined as concerns all features of the network packet.
Moreover, a new mutation operator directed for binary and symbolic features is
proposed. The basic concept of proposed mutation operator depends on the most
frequent value of the features using mode operator. The proposed GA-based
clustering models are evaluated using Network Security Laboratory-Knowledge
Discovery and Data mining (NSL-KDD) benchmark dataset. Also, it is compared
with two baseline methods namely k-means and k-prototype to judge their
performance and to confirm the value of the obtained clustering structures. The
experiments demonstrate the effectiveness of the proposed models for intrusion
detection problem in which and models outperform the two baseline
methods in accuracy ( ), detection rate ( ) and true negative rate ( ).
Moreover, the results prove the positive impact of the proposed mutation operator to
enhance the strength of model in all evaluation metrics. It successfully attains
6.4, 5.463 and 3.279 percentage of relative improvement in over and
baseline models respectively.
Object detection in real time is considered as a challenging problem. However, it is very important in a wide range of applications, especially in field of multimedia. The players and ball are the most important objects in soccer game videos and detecting them is a challenging task because of many difficulties, such as shadow and illumination, ball size, ball occluded by players or merged with lines, and similar appearance of players. To overcome these problems, we present a new system to detect the players and ball in real-time by using background subtraction and Sobel detection. The results were more accurate and approximately two times faster than those using only background subtraction.
In this paper, we introduce a type of modules, namely S-K-nonsingular modules, which is a generalization of K-nonsingular modules. A comprehensive study of these classes of modules is given.
In this paper, we provide some types of - -spaces, namely, - ( )- (respectively, - ( )- , - ( )- and - ( )-) spaces for minimal structure spaces which are denoted by ( -spaces). Some properties and examples are given.
The relationships between a number of types of - -spaces and the other existing types of weaker and stronger forms of -spaces are investigated. Finally, new types of open (respectively, closed) functions of -spaces are introduced and some of their properties are studied.
Vitamins k is an important fat-soluble vitamin that can be obtained from plants, bacteria and animals and is necessary for the blood clotting. It plays a key function as a cofactor in the synthesizing of blood clotting proteins in the liver; recently, the interest for its functions in extra-hepatic tissue has increased. Vitamin k deficiency is usually caused by abnormal absorption rather than in the lack of vitamin in food. Apart from its impact on clotting, chronic subclinical deficiency of vitamin K maybe a risk factor for many diseases such as osteoporosis, atherosclerosis, cancer, insulin resistance, neurodegenerative diseases and others, while current food intake guidelines be focused on the daily dose necessary to avoid blood loss.
... Show MoreThe increase in cloud computing services and the large-scale construction of data centers led to excessive power consumption. Datacenters contain a large number of servers where the major power consumption takes place. An efficient virtual machine placement algorithm is substantial to attain energy consumption minimization and improve resource utilization through reducing the number of operating servers. In this paper, an enhanced discrete particle swarm optimization (EDPSO) is proposed. The enhancement of the discrete PSO algorithm is achieved through modifying the velocity update equation to bound the resultant particles and ensuring feasibility. Furthermore, EDPSO is assisted by two heuristic algorithms random first fit (RFF) a
... Show MoreThe capacity factor is the main factor in assessing the efficiency of wind Turbine. This paper presents a procedure to find the optimal wind turbine for five different locations in Iraq based on finding the highest capacity factor of wind turbine for different locations. The wind data for twelve successive years (2009-2020) of five locations in Iraq are collected and analyzed. The longitudes and latitudes of the candidate sites are (44.3661o E, 33.3152o N), (47.7738o E, 30.5258o N), (45.8160o E, 32.5165o N), (44.33265o E, 32.0107o N) and (46.25691o E, 31.0510o N) for Baghdad, Basrah, Al-Kut, Al-Najaf, and Al-Nasiriyah respectively. The average wind velocity, standard deviation, Weibull shape and scale factors, and probability density functi
... Show MoreSoil compaction is one of the most harmful elements affecting soil structure, limiting plant growth and agricultural productivity. It is crucial to assess the degree of soil penetration resistance to discover solutions to the harmful consequences of compaction. In order to obtain the appropriate value, using soil cone penetration requires time and labor-intensive measurements. Currently, satellite technologies, electronic measurement control systems, and computer software help to measure soil penetration resistance quickly and easily within the precision agriculture applications approach. The quantitative relationships between soil properties and the factors affecting their diversity contribute to digital soil mapping. Digital soil maps use
... Show MoreThe financial fraud considers part of large concept to management and financial corruption, the financial fraud is appeared especially after corporate, that is Emerge agency theory, that is because recognize relationship between the management company and stakeholder, that is through group from constriction in order to block the management to fraud practice, that on the basis was choose another party in order fraud this practice and give opinion on financial statement, that consider basis decision making from stakeholder to basis the report auditor about creditability this is statement that reflect real activity for the company.The Auditor in order to lead work him Full professionalism to must using group from control Techniques, that is
... Show MoreThis study aimed to detect Anaplasma phagocytophilum in horses through hematological and molecular tests. The 16S rRNA gene of the Anaplasma phagocytophilum parasite was amplified by polymerase chain reaction (PCR), then sequenced, and subjected to phylogenetic analysis to explore "Equine Granulocytic Anaplasmosis" (EGA) infection in three important gathering race horses areas in Baghdad governorate, Iraq. Blood samples were obtained from 160 horses of varying ages, three breeds, and both sexes, between January and December 2021. Prevalence and risk variables for anaplasmosis were analyzed using statistical odds ratio and chi-square tests. Results demonstrated that clinical anaplasmosis symptoms comprised jaundice, wei
... Show MoreAbstract:
The distribution or retention of profits is the third decision among financial management decisions in terms of priority, whether at the level of theory or practice, as the issue of distribution or retention is multi-party in terms of influence and impact, as determining the optimal percentage for each component is still the subject of intellectual debate because these decisions are linked to the future of the organization and several considerations, The research focus on the nature of the policies followed by the Iraqi banking sector As the sample chosen by the intentional sampling method was represented by the Commercial Bank of
... Show More