Preferred Language
Articles
/
thcMP48BVTCNdQwC6WXf
Survey on intrusion detection system based on analysis concept drift: Status and future directions
...Show More Authors

Nowadays, internet security is a critical concern; the One of the most difficult study issues in network security is "intrusion detection". Fight against external threats. Intrusion detection is a novel method of securing computers and data networks that are already in use. To boost the efficacy of intrusion detection systems, machine learning and deep learning are widely deployed. While work on intrusion detection systems is already underway, based on data mining and machine learning is effective, it requires to detect intrusions by training static batch classifiers regardless considering the time-varying features of a regular data stream. Real-world problems, on the other hand, rarely fit into models that have such constraints. Furthermore, various uses in the real world, Data distributions in intrusion detection systems, for example, are non-stationary, which produce concept drift over time or non-stationary learning. The word "concept drift" is used to describe the process of changing one's mind about something in an online-supervised learning scenario, the connection between the input data and the target variable changes over time. We define adaptive learning, classify existing concept drift strategies, evaluate the most typical, distinct, and widely used approaches and algorithms, describe adaptive algorithm assessment methodology, and show a collection of examples, all of this is based on the assumption that you have a basic understanding of supervised learning. The survey examines the various aspects of concept drift in a comprehensive manner in order to think about the current fragmented "state-of-the-art". As a result, which intends to give scholars, industry analysts, and practitioners a comprehensive introduction to idea drift adaptability.

View Publication
Publication Date
Thu Jan 01 2015
Journal Name
Journal Of Engineering
Formal Characteristics of the Architectural Type of contemporary Mosques within the concept of Topology
...Show More Authors

Mosques could be considered as one of the most powerful architectural types throughout historical ages. With their highly symbolic formal legacy, Mosques  play an essential role in providing the Islamic city with its special identity. Nevertheless, the advent of digital technology and its ubiquity at different levels of architectural design marked the emergence of new tendencies in the Architecture of Mosques, represented by various models added to the storage of this architectural type. Consequently a review of these tendencies would be needed, aiming at pointing out the formal transformations and new suggested characteristics.

The paper investigates the surviving and the disappearing formal components of&n

... Show More
View Publication
Publication Date
Wed Jun 01 2022
Journal Name
Journal Of The College Of Languages (jcl)
Concept of Time in the Poetry of Abdulhaq Hamid: Abdülhak Hamid'in Şiirlerinde Zaman İncelenmesi
...Show More Authors

     After Organization literature era, two literary schools appeared in Turkey and Abdulhaq Hamid is one of this period most prominent poets. During his stay in France with a group of colleagues sent by Turkish Government, he was greatly influenced by the French modern literature and the French modern literary authors.

     The study discusses the concept of time in the poetry of Abdulhaq Hamid. Reading his poetry, it can be noticed that time is important where he frequently refers to day and night, morning and evening as time insinuations. Hence, the present paper gives a brief study of the poet’s life, and sheds lights on his poems that deal with time- concept.

Ön Söz

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed May 15 2019
Journal Name
Tikrit Journal Of Pure Science
Improvement of Alert System against Tampering and Theft in Surveillance Cameras
...Show More Authors

Use of Surveillance cameras in houses and markets became common, that resulted to minimize theft and make it a difficult task because it let recording and viewing what is going around. The wide application of these cameras, pushed thieves to seek new ways for abolition of the surveillance system and digital recording of events, such as cutting the signal wire between the camera and Digital video recorder or changing the direction of the camera away from the focus spot or damaging the camera or steal the device which means the loss of the recorded media. This paper focuses on such abolitions and fixed it by suggesting a way to notify the administrator immediately and automatically by Email about any violation of the system using MATLAB, whic

... Show More
View Publication
Publication Date
Thu Aug 04 2022
Journal Name
International Journal Of Gynecology & Obstetrics
Are sexual and reproductive health and rights taught in medical school? Results from a global survey
...Show More Authors
Abstract<p>Our aim was to investigate the inclusion of sexual and reproductive health and rights (SRHR) topics in medical curricula and the perceived need for, feasibility of, and barriers to teaching SRHR. We distributed a survey with questions on SRHR content, and factors regulating SRHR content, to medical universities worldwide using chain referral. Associations between high SRHR content and independent variables were analyzed using unconditional linear regression or χ<sup>2</sup> test. Text data were analyzed by thematic analysis. We collected data from 219 respondents, 143 universities and 54 countries. Clinical SRHR topics such as safe pregnancy and childbirth (95.7%) and contraceptive methods</p> ... Show More
View Publication
Scopus (10)
Crossref (11)
Scopus Clarivate Crossref
Publication Date
Wed Oct 11 2023
Journal Name
Journal Of Educational And Psychological Researches
Designing Educational Software Based on Web Quests and Its Effectiveness in Developing Information Search Skills among Students of the Department of Educational and Psychological Sciences
...Show More Authors

The aim of the research is to design educational software based on Web Quests and to measure its effectiveness in developing information search skills of students at the Department of Educational and Psychological Sciences. The research is experimental in nature using pre-post measurement. The research sample consisted of (91) male and female students from the second grade in the Department of Educational and Psychological Sciences, they were divided into two equal groups; the experimental group consisted of (47) students who adopted the educational software as a studying method, and the control group consisted of (44) students who follow the traditional method. The researchers prepared a list of skills for searching information and they

... Show More
View Publication Preview PDF
Publication Date
Thu Mar 01 2012
Journal Name
Advances In Materials Physics And Chemistry
Study the Effect of Irradiation Time and HF Concentration on Porosity of Porous Silicon and Study Some of the Electrical Properties of Its Based Device
...Show More Authors

ABSTRACT Porous silicon has been produced in this work by photochemical etching process (PC). The irradiation has been achieved using ordinary light source (150250 W) power and (875 nm) wavelength. The influence of various irradiation times and HF concentration on porosity of PSi material was investigated by depending on gravimetric measurements. The I-V and C-V characteristics for CdS/PSi structure have been investigated in this work too.

Preview PDF
Crossref (4)
Crossref
Publication Date
Sun Apr 07 2013
Journal Name
Journal Of Educational And Psychological Researches
skills and its relationship to the with concept of self in social The chidren kindergarten age (4-6) years
...Show More Authors

 The interest in Multi social skills and self-concept is extremely  important for many of the scholars of education and psychology has taken a great deal in their writings and their interests as they see that social skills training is to make sure of the same, and that whenever enable the individual from acquiring social skills whenever asserted itself.The research aims know social skills and self-concept and their relationship to the children Riyadh age (4-6 years), and the research sample consisted of(200) boys and girls from kindergarten in the city of Baghdad Bjanbey Rusafa second and Karkh second.And to the objectives of the research realized the researcher has built two measures of social skills a

... Show More
View Publication Preview PDF
Publication Date
Sat Jun 01 2019
Journal Name
Journal Of Economics And Administrative Sciences
Analysis of the relationship between Government spending compression and the window of the currency and its impact on the exchange rate of the Iraqi dinar
...Show More Authors

The exchange rate is the backbone of  any economy in the world, whether  developed or developing, where most countries adopted  many policies, in order to ensure the stability of the exchange rate of the currency, because of its importance as a link between the local economy and the others ,And it contribute in the achievement of internal and external balance and despite the many different factors that affect it, but there is wide consensus on the effectiveness of the role of spending and the currency window in the exchange rate of the Iraqi dinar, especially in the Iraqi economy, effectiveness As the increase in government spending lead to an increase in the supply of money and increase domestic demand and high pr

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jul 09 2023
Journal Name
Journal Of Engineering
New Approach in Detection MAC Spoofing in a WiFi LAN
...Show More Authors

Medium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jul 19 2017
Journal Name
International Journal Of Advances In Chemical Engineering And Biological Sciences
Detection of Aflatoxin M1 in Pasteurized Canned Milk and Using of UV Radiation for Detoxification
...Show More Authors

The current study was designed to investigate the presence of aflatoxin M1 in 25 samples of pasteurized canned milk which collected randomly from some Iraqi local markets using ELISA technique. Aflatoxin M1 was present in 21 samples, the concentration of aflatoxin M1 ranged from (0.25-50 ppb). UV radiation (365nm wave length) was used for detoxification of aflatoxin M1 (sample with highest concentration /50 ppb of aflatoxin M1 in two different volumes ((25 & 50 ml)) for two different time (15 & 30 min) and 30, 60, 90 cm distance between lamp and milk layer were used for this purpose). Results showed that distance between lamp and milk layer was the most effective parameter in reduction of aflatoxin M1, and whenever the distance increase the

... Show More
View Publication
Crossref (2)
Crossref