Malicious software (malware) performs a malicious function that compromising a computer system’s security. Many methods have been developed to improve the security of the computer system resources, among them the use of firewall, encryption, and Intrusion Detection System (IDS). IDS can detect newly unrecognized attack attempt and raising an early alarm to inform the system about this suspicious intrusion attempt. This paper proposed a hybrid IDS for detection intrusion, especially malware, with considering network packet and host features. The hybrid IDS designed using Data Mining (DM) classification methods that for its ability to detect new, previously unseen intrusions accurately and automatically. It uses both anomaly and misuse detection techniques using two DM classifiers (Interactive Dichotomizer 3 (ID3) classifier and Naïve Bayesian (NB) Classifier) to verify the validity of the proposed system in term of accuracy rate. A proposed HybD dataset used in training and testing the hybrid IDS. Feature selection is used to consider the intrinsic features in classification decision, this accomplished by using three different measures: Association rules (AR) method, ReliefF measure, and Gain Ratio (GR) measure. NB classifier with AR method given the most accurate classification results (99%) with false positive (FP) rate (0%) and false negative (FN) rate (1%).
A recurrent condition that affects up to 10% of people worldwide is gastric ulceration illness. The existence of gastric juice pH with the lowering of mucous defences is prerequisites for the development of chronic ulcers. The main variables affecting the mucosa susceptibility to damage include Helicobacter pylori (H. pylori) infections or non-steroidal anti-inflammatory medicines (NSAIDs). Proton pump inhibitors (PPIs) including histamine-2 (H2) receptor inhibitors, two common therapies for peptic ulcers, have been linked to side impacts, recurrence or a variety of pharmacological combinations. Conversely, therapeutic herbs or the chemicals they contain may be used to cure or eliminate a wide range of illnesses. Therefore, prominent pharma
... Show MoreThis research introduce a study with application on Principal Component Regression obtained from some of the explainatory variables to limitate Multicollinearity problem among these variables and gain staibilty in their estimations more than those which yield from Ordinary Least Squares. But the cost that we pay in the other hand losing a little power of the estimation of the predictive regression function in explaining the essential variations. A suggested numerical formula has been proposed and applied by the researchers as optimal solution, and vererifing the its efficiency by a program written by the researchers themselves for this porpuse through some creterions: Cumulative Percentage Variance, Coefficient of Determination, Variance
... Show MoreThe purpose of this paper is to identifying the level of skill self-esteem of the young tennis players in the Governorate of Baghdad, identifying some aspects of attention (acuteness, concentration, and diversion of attention) among the young tennis players of the Baghdad governorate, and identify the skills of serve and serve spiking in tennis by young tennis players in Baghdad governorate. The researchers used the descriptive approach in the correlative relations style for its suitability and the research problem. the research sample was chosen in a deliberate way from the youth team players in tennis for the Governorate of Baghdad and the participants in the 2021-2022 sports season, whose number is (20) male players and (4) young playe
... Show MoreResearch on the role of organizational change in easing the organizational conflict focuses for being one of the important topics and relatively modern and which have a significant impact on the future of organizations, so this study was to identify the relationship and the impact of organizational change and of deportation (technological, organizational structure, human resources, the change in the task) at the organizational conflict in the Earth company link Iraq, in order to reach the goals of the research, it has been the development of a questionnaire distributed to a random sample of (100) composed employees from managers and heads of departments and the people and staff at the Earth company link Iraq, the study found: the
... Show MoreThis research dealt with the impact of internal control on tax performance using balanced scorecard indicators because of its special importance in improving tax performance and reform. The internal control system is a safety valve for senior management in all organizations, it plays an important role in the regularity and development of work and the fight against corruption To provide reliable and accurate data and information, follow up on compliance with laws, regulations and instructions. The aim of this research is to demonstrate how control affects tax performance and how to adapt internal control components to improve tax performance. In the General Authority for taxes and its branches,. The research resulted in a number of conclu
... Show MoreThis investigation was carried out to study the treatment and recycling of wastewater in the cotton textile industry for an effluent containing three dyes: direct blue, sulphur black and vat yellow. The reuse of such effluent can only be made possible by appropriate treatment method such as chemical coagulation. Ferrous and ferric sulphate with and without calcium hydroxide were employed in this study as the chemical coagulants.
The results showed that the percentage removal of direct blue ranged between 91.4 and 94 , for sulphur black ranged between 98.7 and 99.5 while for vat yellow it was between 97 and 99.
Steganography can be defined as the art and science of hiding information in the data that could be read by computer. This science cannot recognize stego-cover and the original one whether by eye or by computer when seeing the statistical samples. This paper presents a new method to hide text in text characters. The systematic method uses the structure of invisible character to hide and extract secret texts. The creation of secret message comprises four main stages such using the letter from the original message, selecting the suitable cover text, dividing the cover text into blocks, hiding the secret text using the invisible character and comparing the cover-text and stego-object. This study uses an invisible character (white space
... Show MoreFace Identification is an important research topic in the field of computer vision and pattern recognition and has become a very active research area in recent decades. Recently multiwavelet-based neural networks (multiwavenets) have been used for function approximation and recognition, but to our best knowledge it has not been used for face Identification. This paper presents a novel approach for the Identification of human faces using Back-Propagation Adaptive Multiwavenet. The proposed multiwavenet has a structure similar to a multilayer perceptron (MLP) neural network with three layers, but the activation function of hidden layer is replaced with multiscaling functions. In experiments performed on the ORL face database it achieved a
... Show MoreAspect-Oriented Software Development (AOSD) is a technology that helps achieving
better Separation of Concern (SOC) by providing mechanisms to identify all relevant points
in a program at which aspectual adaptations need to take place. This paper introduces a
banking application using of AOSD with security concern in information hiding.