Several Intrusion Detection Systems (IDS) have been proposed in the current decade. Most datasets which associate with intrusion detection dataset suffer from an imbalance class problem. This problem limits the performance of classifier for minority classes. This paper has presented a novel class imbalance processing technology for large scale multiclass dataset, referred to as BMCD. Our algorithm is based on adapting the Synthetic Minority Over-Sampling Technique (SMOTE) with multiclass dataset to improve the detection rate of minority classes while ensuring efficiency. In this work we have been combined five individual CICIDS2017 dataset to create one multiclass dataset which contains several types of attacks. To prove the efficiency of our algorithm, several machine learning algorithms have been applied on combined dataset with and without using BMCD algorithm. The experimental results have concluded that BMCD provides an effective solution to imbalanced intrusion detection and outperforms the state-of-the-art intrusion detection methods.
Objective(s): To evaluate women's perceptions toward wellness. Methodology: A descriptive-evaluation design is employed through the present study to evaluate women's perceptions toward wellness in Baghdad City. A non-probability (purposive) sample of (140) woman is selected from three primary health centers in Baghdad City. A questionnaire, of (57) items, is designed and constructed for the purpose of the study. Split-half internal consistency reliability of the study instrument is determined through computation of Cronbach alpha correlation coefficient and the content validity of the instrument determined thr
Quality function deployment tool is trying to improve health services through this study that will be applied in health sector environment , and be based on applying quality function deployment tool (QFD) TO preferable evaluation of main patients requirements in order to determine the technical requirements that need most attention across improving and developing health services .
Main requirements are determined to patients lying in the hospital (under research) which is (educational Baghdad \ medicine city office) in Baghdad, and other technical requirements through pers
... Show MoreThe effective application of the method of measuring and evaluating performance according to the Balanced Scorecard the need for an information system a comprehensive and integrated for internal and external environment, Which requires the need to develop accounting information system in general and cost management information systems to suit the particular requirements of the environment in terms of the development of modern methods of measurement to include the use of some methods that have proven effective in measuring and evaluating performance.
The research problem in need of management to develop methods of measuring and evaluating performance through the use of both financial measures and non
... Show Moreيسعى المجتمع من خلال الوحدات الإقتصادية إلى الوصول إلى تحقيق أفضل الإنجازات التي لا تتمثل بالسلع والخدمات حسب وإنما بما يتحقق من مردود لكافة الاطراف المعنية بالوحدات الإقتصادية على ان لايتم ذلك على حساب قيم المجتمع وأخلاقياته وآدابه العامة. وعليه تصبح الوحدات الإقتصادية مسرحاً لصراعات قوى متعددة كل منها له قيمه الأخلاقية سواء كان فرداً أومجموعة افراد أو وحدة إقتصادية أو أي جهة أُخرى، وبحكم مسؤولياته
... Show MoreThe research aims to clarify the COBIT5 framework for IT governance and to develop of a criterion based on Balanced Scorecard that contributes in measuring the performance of IT governance. To achieve these goals, the researchers adopted the deductive approach in the design of balanced scorecard to measure the IT governance at the Bank of Baghdad that was chosen because it relied heavily on IT.
The research has reached a number of conclusions, the most important of which is that the performance of IT department in the Bank of Baghdad falls within the good level that requires constant monitoring, the most committed items of Balanced Scorecard by the Bank were customer, internal operation, growth and finally the financial item; IT
... Show MoreAssessing performance efficiency is critical to the management need for oversight, planning, and continuous periodic evaluation of the multiple activities of Northern Cement State Company in order to determine the level of achievement of the objectives set, and to correct the deviations and delays that the evaluation shows and limitation of liability. What cannot be measured cannot be managed. The aim of this research is to highlight the impact of using BSC, financial and non-financial, to give comprehensive and clear picture of the company's performance and to measure the quality of its performance by using six-sigma and the level of deviations in achieving the planned goals. Therefore, four-key hypotheses were formulated for th
... Show MoreMental disorders (MDs) are a common problem in Primary Health Care Centers (PHCCs). Many people with serious MDs are challenged by symptoms and disabilities that result from the disease and by stereotypes and prejudice due to misconceptions about mental illness. This study aims at evaluating the knowledge, and attitude toward mental health concepts and services and causes of the reluctance to seek those services among people attending PHCCs. A descriptive cross-sectional study was conducted. The random sampling technique was used to include (10) of Directorates of Health (DoHs) coverage north, middle, and south of Iraq. The study was executed in (50) selected PHCs, (5) PHCCs in each DoH involved randomly selected (30) people attending th
... Show MoreIn this paper, the botnet detection problem is defined as a feature selection problem and the genetic algorithm (GA) is used to search for the best significant combination of features from the entire search space of set of features. Furthermore, the Decision Tree (DT) classifier is used as an objective function to direct the ability of the proposed GA to locate the combination of features that can correctly classify the activities into normal traffics and botnet attacks. Two datasets namely the UNSW-NB15 and the Canadian Institute for Cybersecurity Intrusion Detection System 2017 (CICIDS2017), are used as evaluation datasets. The results reveal that the proposed DT-aware GA can effectively find the relevant features from
... Show More