In recent years, the world witnessed a rapid growth in attacks on the internet which resulted in deficiencies in networks performances. The growth was in both quantity and versatility of the attacks. To cope with this, new detection techniques are required especially the ones that use Artificial Intelligence techniques such as machine learning based intrusion detection and prevention systems. Many machine learning models are used to deal with intrusion detection and each has its own pros and cons and this is where this paper falls in, performance analysis of different Machine Learning Models for Intrusion Detection Systems based on supervised machine learning algorithms. Using Python Scikit-Learn library KNN, Support Vector Machine, Naïve Bayes, Decision Tree, Random Forest, Stochastic Gradient Descent, Gradient Boosting and Ada Boosting classifiers were designed. Performance-wise analysis using Confusion Matrix metric carried out and comparisons between the classifiers were a due. As a case study Information Gain, Pearson and F-test feature selection techniques were used and the obtained results compared to models that use all the features. One unique outcome is that the Random Forest classifier achieves the best performance with an accuracy of 99.96% and an error margin of 0.038%, which supersedes other classifiers. Using 80% reduction in features and parameters extraction from the packet header rather than the workload, a big performance advantage is achieved, especially in online environments.
In the early 90s military operations and United Nations Special Commission “UNSCOM” teams have been destroyed the past Iraqi chemical program. Both operations led an extensive number of scattered remnants of contaminated areas. The quantities of hazardous materials, incomplete destructed materials, and toxic chemicals were sealed in two bunkers. Deficiency of appropriate destruction technology led to spreading the contamination around the storage site. This paper aims to introduce the environmental detection of the contamination in the storage site area using geospatial analysis technique. The environmental contamination level of nutrients and major ions such as sulphate (SO4), potassium (K), sodium (Na), magnesi
... Show MoreChange detection is a technology ascertaining the changes of
specific features within a certain time Interval. The use of remotely
sensed image to detect changes in land use and land cover is widely
preferred over other conventional survey techniques because this
method is very efficient for assessing the change or degrading trends
of a region. In this research two remotely sensed image of Baghdad
city gathered by landsat -7and landsat -8 ETM+ for two time period
2000 and 2014 have been used to detect the most important changes.
Registration and rectification the two original images are the first
preprocessing steps was applied in this paper. Change detection using
NDVI subtractive has been computed, subtrac
Herpes simplex virus (HSV) is a common human pathogen that causes severe infections in newborns and immunocompromised patients. Conjunctivitis or corneal epithelial keratitis is caused by HSV type 1 all over the world and at all times of the year. The present study was aimed at detecting HSV in patients suffering from conjunctivitis. One hundred and ten (110) clinical samples (90 patients and 20 controls, both males and females) of eye conjunctiva swabs were collected from patients of different ages. The samples were analyzed using qPCR and ELISA techniques. The qPCR results revealed that HSV was present in 47 (52.2%) of the 90 patients who were infected. Of these patients, 25 (48.0%) were males and 22 (57.8%) were females, indicati
... Show MoreThis study is carried out to investigate the prevalence of Coxiella burnetii (C. burnetii) infections in cattle using an enzyme-linked immunosorbent assay (ELISA) and polymerase chain reaction (PCR) assay targeting IS1111A transposase gene. A total of 130 lactating cows were randomly selected from different areas in Wasit province, Iraq and subjected to blood and milk sampling during the period extended between November 2018 and May 2019. ELISA and PCR tests revealed that 16.15% and 10% of the animals studied were respectively positive. Significant correlations (P<0.05) were detected between the positive results and clinical data. Two positive PCR products were analyzed phylogenetically, named as C. burnetii IQ-No.5 and C. burnet
... Show MoreA strong sign language recognition system can break down the barriers that separate hearing and speaking members of society from speechless members. A novel fast recognition system with low computational cost for digital American Sign Language (ASL) is introduced in this research. Different image processing techniques are used to optimize and extract the shape of the hand fingers in each sign. The feature extraction stage includes a determination of the optimal threshold based on statistical bases and then recognizing the gap area in the zero sign and calculating the heights of each finger in the other digits. The classification stage depends on the gap area in the zero signs and the number of opened fingers in the other signs as well as
... Show MoreCalendula officinalis L. (Asteraceae) known as marigold is known to have several pharmacological activities and used for the treatment of several diseases as measles, jaundice, constipation and several inflammations. Marigold flowers contain several chemical constituents mainly flavonoids, triterpenoids and essential oil. In this study marigold flowers cultivated in Iraq had been investigated for its flavonoids content. The study revealed the presence of quercetin and kaempferol glycosides and the absence of myricetin glycosides. The flowers were extracted with ethanol 70% fractionated with different solvent and the flavonoids were isolated by preparative HPLC. The isolated flavonoids were identified by measuring melting points, UV, IR,
... Show MoreThe Internet of Things (IoT) is an expanding domain that can revolutionize different industries. Nevertheless, security is among the multiple challenges that it encounters. A major threat in the IoT environment is spoofing attacks, a type of cyber threat in which malicious actors masquerade as legitimate entities. This research aims to develop an effective technique for detecting spoofing attacks for IoT security by utilizing feature-importance methods. The suggested methodology involves three stages: preprocessing, selection of important features, and classification. The feature importance determines the most significant characteristics that play a role in detecting spoofing attacks. This is achieved via two techniques: decision tr
... Show MoreEchocardiography is a widely used imaging technique to examine various cardiac functions, especially to detect the left ventricular wall motion abnormality. Unfortunately the quality of echocardiograph images and complexities of underlying motion captured, makes it difficult for an in-experienced physicians/ radiologist to describe the motion abnormalities in a crisp way, leading to possible errors in diagnosis. In this study, we present a method to analyze left ventricular wall motion, by using optical flow to estimate velocities of the left ventricular wall segments and find relation between these segments motion. The proposed method will be able to present real clinical help to verify the left ventricular wall motion diagnosis.
One of the most Interesting natural phenomena is clouds that have a very strong effect on the climate, weather and the earth's energy balance. Also clouds consider the key regulator for the average temperature of the plant. In this research monitoring and studying the cloud cover to know the clouds types and whether they are rainy or not rainy using visible and infrared satellite images. In order to interpret and know the types of the clouds visually without using any techniques, by comparing between the brightness and the shape of clouds in the same area for both the visible and infrared satellite images, where the differences in the contrasts of visible image are the albedo differences, while in the infrared images is the temperature d
... Show MoreAutism Spectrum Disorder, also known as ASD, is a neurodevelopmental disease that impairs speech, social interaction, and behavior. Machine learning is a field of artificial intelligence that focuses on creating algorithms that can learn patterns and make ASD classification based on input data. The results of using machine learning algorithms to categorize ASD have been inconsistent. More research is needed to improve the accuracy of the classification of ASD. To address this, deep learning such as 1D CNN has been proposed as an alternative for the classification of ASD detection. The proposed techniques are evaluated on publicly available three different ASD datasets (children, Adults, and adolescents). Results strongly suggest that 1D
... Show More