Several Intrusion Detection Systems (IDS) have been proposed in the current decade. Most datasets which associate with intrusion detection dataset suffer from an imbalance class problem. This problem limits the performance of classifier for minority classes. This paper has presented a novel class imbalance processing technology for large scale multiclass dataset, referred to as BMCD. Our algorithm is based on adapting the Synthetic Minority Over-Sampling Technique (SMOTE) with multiclass dataset to improve the detection rate of minority classes while ensuring efficiency. In this work we have been combined five individual CICIDS2017 dataset to create one multiclass dataset which contains several types of attacks. To prove the efficiency of our algorithm, several machine learning algorithms have been applied on combined dataset with and without using BMCD algorithm. The experimental results have concluded that BMCD provides an effective solution to imbalanced intrusion detection and outperforms the state-of-the-art intrusion detection methods.
The importance of the Arabic language and its deep vocabulary in the live translation of the work of science and interior design can't be hidden from the whole world. The previous studies have dealt with the role of the linguistic vocabulary and Arabic calligraphy in interior spaces in terms of decoration and design. However, this research sheds light on the importance of linguistic vocabulary in the construction of design thought and how it has become the a basic motivation in the process of scientific and practical construction and not just aesthetic formations that took their place in the interior spaces, as linguistic vocabulary emerged recently and echoed within the specialization of interior design and formed a key motive to explor
... Show MoreMedium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the
Today’s modern medical imaging research faces the challenge of detecting brain tumor through Magnetic Resonance Images (MRI). Normally, to produce images of soft tissue of human body, MRI images are used by experts. It is used for analysis of human organs to replace surgery. For brain tumor detection, image segmentation is required. For this purpose, the brain is partitioned into two distinct regions. This is considered to be one of the most important but difficult part of the process of detecting brain tumor. Hence, it is highly necessary that segmentation of the MRI images must be done accurately before asking the computer to do the exact diagnosis. Earlier, a variety of algorithms were developed for segmentation of MRI images by usin
... Show MoreRoads irrespective of the type have specific standard horizontal distance measured at 90 degrees from a lot boundary to a development known as a setback. Non-observance of the recommended setbacks accommodated in any urban center’s master plan creates noise hazard to the public health and safety as the movement of vehicular traffic is not without the attendant noise. This study assessed noise intrusion level in shops along a section of Ibadan-Abeokuta road with due consideration to compliance with the recommended building structure setback. Analysis of noise descriptors evaluated in this study gave A-weighted equivalent sound pressure level average of 91.3 dBA, the daytime average sound level (LD) 92.27 dBA,
... Show MoreAbstract:
Objective: To assess old age behaviors toward cardiovascular health promotion. Find out the association between old age behaviors toward cardiovascular health promotion with certain sociodemographic characteristic and type of geriatric home.
Methodology: A descriptive study is conducted throughout the period of (April 12th 2022 to august 22nd, 2023) presented to assess of old age behaviors toward cardiovascular health promotion. Purposive sample of (140) old age were selected from males and female’s participants from public and private Geriatric Homes at Baghdad city questi
... Show MoreChinese policy was characterized in general toward Japan caution and fear and try to
mobilize all energies and alliances possible in order to interact and deal with that neighbor
foe, has that policy been in all its aspects to the enticements of regional and local conflicts, as
well as international variables that were the hardest and most influential on them.
The importance of the choice of the People of China's economic diplomacy toward the
study of Japan during the period of the Cold War is that each of them was in transition, China
at that time was barely beyond the midst of a civil war (1945-1949) led to the split into two
states: China, led by the People Mao Tse-Tung and Beijing as its capital, the National Chi
Background: Pneumonia is the common lower respiratory tract infection among pediatrics, especially under five; it is a common cause of under-five children morbidity and mortality. Objectives of study: To identify nurses' perceptions toward therapeutic strategies for children with pneumonia and to find the association between their perceptions and their demographic variables. Methods: A Convenient sample of 46 nurses in Baghdad city from three hospitals) Kadhimiya Hospital for Children, Central Teaching Hospital of Pediatrics, and Child Welfare Teaching Hospital) included in the study to identify their perceptions regarding pneumonia in children. Results: The results of the study present that most of the nurses' participants in the a
... Show More