In recent years, the world witnessed a rapid growth in attacks on the internet which resulted in deficiencies in networks performances. The growth was in both quantity and versatility of the attacks. To cope with this, new detection techniques are required especially the ones that use Artificial Intelligence techniques such as machine learning based intrusion detection and prevention systems. Many machine learning models are used to deal with intrusion detection and each has its own pros and cons and this is where this paper falls in, performance analysis of different Machine Learning Models for Intrusion Detection Systems based on supervised machine learning algorithms. Using Python Scikit-Learn library KNN, Support Vector Machine, Naïve Bayes, Decision Tree, Random Forest, Stochastic Gradient Descent, Gradient Boosting and Ada Boosting classifiers were designed. Performance-wise analysis using Confusion Matrix metric carried out and comparisons between the classifiers were a due. As a case study Information Gain, Pearson and F-test feature selection techniques were used and the obtained results compared to models that use all the features. One unique outcome is that the Random Forest classifier achieves the best performance with an accuracy of 99.96% and an error margin of 0.038%, which supersedes other classifiers. Using 80% reduction in features and parameters extraction from the packet header rather than the workload, a big performance advantage is achieved, especially in online environments.
Praise be to God, who started his book with the praise of himself and prayers and peace be upon those who have no prophet after him and his family and companions and those who followed them with charity until the Day of Judgment.
For it is known to every researcher in jurisprudence and its origins that the semantics in terms of formulas for assignment are divided into an order and a prohibition, and I have seen it necessary to write a small research on the prohibition, and since this topic is complex, and has a great impact on the difference of scholars, I decided to write on one issue of it And it is the absolute prohibition and its effect on the difference of jurists, and what is meant by the absolute p
Urine proteomics have been an area of interest and recently in Kala-azar as an alternative sample type for serum or plasma. Because of simplicity, noninvasiveness of collection and simpler matrix. Many studies had detected an increased protein excretion in the urine of patients with active Kala-azar due to renal involvement particularly by an immunological related mechanism(s). This study have demonstrated the presence of three different protein profiles in Iraqi children (Patients: including 60 children aged 4-60 months) with defined Kala-azar using the conventional SDS-PAGE on urine samples. Urine protein profile in Kala-azar patients revealed three groups of banding patterns: group-1(33.4)% of the patients show the pattern of 5
... Show MoreThe present work aimed to examine the nature and degree of the cross-correlations among three different ionospheric indices: these are Optimum Working Frequency (OWF), Highest Probable Frequency (HPF), and Best Usable Frequency (BUF). VOCAP and ASASPS models were adopted to determine the datasets of the selected ionospheric indices. The determination was made for different transceiver stations that provide certain HF connection links during the minimum and maximum years of solar cycle 24, 2009 and 2014, respectively. Matlab program was implemented to produce the geodesic parameters for the selected transceiver stations. The determination was made for different path lengths (500, 1000, 1500, and 2000) Km and bearings (0o, 45
... Show MoreThis study concerns a new type of heat exchangers, which is that of shell-and-double concentric tube heat exchangers. The case studies include both design calculations and performance calculations.
The new heat exchanger design was conducted according to Kern method. The volumetric flow rates were 3.6 m3/h and 7.63 m3/h for the hot oil and water respectively. The experimental parameters studied were: temperature, flow rate of hot oil, flow rate of cold water and pressure drop.
A comparison was made for the theoretical and experimental results and it was found that the percentage error for the hot oil outlet temperature was (- 1.6%). The percentage
... Show MoreThe evolution of cryptography has been crucial to preservation subtle information in the digital age. From early cipher algorithms implemented in earliest societies to recent cryptography methods, cryptography has developed alongside developments in computing field. The growing in cyber threats and the increase of comprehensive digital communications have highlighted the significance of selecting effective and robust cryptographic techniques. This article reviews various cryptography algorithms, containing symmetric key and asymmetric key cryptography, via evaluating them according to security asset, complexity, and execution speed. The main outcomes demonstrate the growing trust on elliptic curve cryptography outstanding its capabi
... Show MoreLinear programming currently occupies a prominent position in various fields and has wide applications, as its importance lies in being a means of studying the behavior of a large number of systems as well. It is also the simplest and easiest type of models that can be created to address industrial, commercial, military and other dilemmas. Through which to obtain the optimal quantitative value. In this research, we dealt with the post optimality solution, or what is known as sensitivity analysis, using the principle of shadow prices. The scientific solution to any problem is not a complete solution once the optimal solution is reached. Any change in the values of the model constants or what is known as the inputs of the model that will chan
... Show MoreThe rotor dynamics generally deals with vibration of rotating structures. For designing rotors of a high speeds, basically its important to take into account the rotor dynamics characteristics. The modeling features for rotor and bearings support flexibility are described in this paper, by taking these characteristics of rotor dynamics features into standard Finite Element Approach (FEA) model. Transient and harmonic analysis procedures have been found by ANSYS, the idea has been presented to deal with critical speed calculation. This papers shows how elements BEAM188 and COMBI214 are used to represent the shaft and bearings, the dynamic stiffness and damping coefficients of journal bearings as a matrices have been found
... Show Moretock markets changed up and down during time. Some companies’ affect others due to dependency on each other . In this work, the network model of the stock market is discribed as a complete weighted graph. This paper aims to investigate the Iraqi stock markets using graph theory tools. The vertices of this graph correspond to the Iraqi markets companies, and the weights of the edges are set ulrametric distance of minimum spanning tree.
Addressed the problem of the research is marked (experimentation in caves fee) concept and its role in experimentation deviate Display Num formal charges caves. The search came in four sections: general framework for research and identified the research problem and the need for him. With an indication of the importance of his presence. Then specify the search for the goals of (revealed the nature and role of experimentation in determining the nature of Manifesting fee documented on the walls of caves), followed by the establishment of the three search limits (objectivity, the temporal and spatial) were then determine the terms related to the title. Then provide the theoretical framework and indicators that resulted from academic theorizi
... Show MoreAbstract
The method binery logistic regression and linear discrimint function of the most important statistical methods used in the classification and prediction when the data of the kind of binery (0,1) you can not use the normal regression therefore resort to binary logistic regression and linear discriminant function in the case of two group in the case of a Multicollinearity problem between the data (the data containing high correlation) It became not possible to use binary logistic regression and linear discriminant function, to solve this problem, we resort to Partial least square regression.
In this, search th
... Show More