Nowadays, internet security is a critical concern; the One of the most difficult study issues in network security is "intrusion detection". Fight against external threats. Intrusion detection is a novel method of securing computers and data networks that are already in use. To boost the efficacy of intrusion detection systems, machine learning and deep learning are widely deployed. While work on intrusion detection systems is already underway, based on data mining and machine learning is effective, it requires to detect intrusions by training static batch classifiers regardless considering the time-varying features of a regular data stream. Real-world problems, on the other hand, rarely fit into models that have such constraints. Furthermore, various uses in the real world, Data distributions in intrusion detection systems, for example, are non-stationary, which produce concept drift over time or non-stationary learning. The word "concept drift" is used to describe the process of changing one's mind about something in an online-supervised learning scenario, the connection between the input data and the target variable changes over time. We define adaptive learning, classify existing concept drift strategies, evaluate the most typical, distinct, and widely used approaches and algorithms, describe adaptive algorithm assessment methodology, and show a collection of examples, all of this is based on the assumption that you have a basic understanding of supervised learning. The survey examines the various aspects of concept drift in a comprehensive manner in order to think about the current fragmented "state-of-the-art". As a result, which intends to give scholars, industry analysts, and practitioners a comprehensive introduction to idea drift adaptability.
This research aimed to examine the correlation and influence of leader-member exchange in the organizational citizenship behavior in the existence of organizational trust as mediator variable among workers in ministry of migration and displaced, has been collecting data and information relating to research by designing questionnaire was distributed to the stratified random sample included (56) member of the workers in the ministry mentioned, and through the use of several statistical method were the main findings of research was the existence of a correlation relationship and influence between leader- member exchange and organizational trust, while the results confirmed no correlation and influen
... Show MoreGross domestic product (GDP) is an important measure of the size of the economy's production. Economists use this term to determine the extent of decline and growth in the economies of countries. It is also used to determine the order of countries and compare them to each other. The research aims at describing and analyzing the GDP during the period from 1980 to 2015 and for the public and private sectors and then forecasting GDP in subsequent years until 2025. To achieve this goal, two methods were used: linear and nonlinear regression. The second method in the time series analysis of the Box-Jenkins models and the using of statistical package (Minitab17), (GRETLW32)) to extract the results, and then comparing the two methods, T
... Show MoreThis research aims to know the role of transformational leadership in the organizational success of the College of Education at Samarra University. The researcher adopted the analytical descriptive method in analyzing the research problem. The research included two main hypotheses that resulted in four hypotheses that were subjected to statistical tests. A sample of (54) The researcher used the survey method as a main tool for collecting data and information as well as visits and structured interviews that took place during the period of application. The research reached a set of conclusions and recommendations among the conclusions that there is an art relationship There is a strong and moral impact between transformational lead
... Show More5-((2,4-dibromo-6-((cyclohexyl(methyl)amino)methyl)phenyl)diazenyl)quinolin-8-ol azo ligand (L) has been synthesized through the reaction of diazonium salt for 2,4-dibromo-6-((cyclohexyl(methyl)amino)methyl)aniline with 8-hydroxyquinoline. The azo ligand (L) was characterized utilizing spectroscopic techniques, including FTIR, UV-Vis, 1H and 13C NMR, as well as mass spectrometry and micro-elemental analysis (C.H.N). Metal complexes containing Co(II), Ni(II), Cu(II), and Zn(II) were synthesized and analyzed through mass spectrometry, flame atomic absorption, elemental analysis (C.H.N), infrared and UV-Vis spectroscopy, along with measurements of conductivity and magnetic properties. The experimental findings suggested that all met
... Show MoreAntibiotic resistance is a problem of deep scientific concern both in hospital and community settings. Rapid detection in clinical laboratories is essential for the judicious recognition of antimicrobial resistant organisms. So, the growth of Uropathgenic Escherichia coli (UPEC) isolates with Multidrug-resistant (MDR) and Extensively Drug-resistant (XDR) profiles that thwart therapy for (UTIs) has been detected and has straight squeezed costs and extended hospital stays. This study aims to detect MDR- and XDR-UPEC isolates. Out of 42 UPEC clinical isolates were composed from UTI patients. The bacterial strains were recognized by standard laboratory protocols. Susceptibility to antibiotic was measured by the standard disk diffusi
... Show MoreCities have witnessed great changes since the planning of the first cities. This is due to the increase in population and problems in services which affect urban security. As such, urban security is directed and affected by the nature of city planning and the types of services. Besides, the kind of services plays an imminent place in providing urban security at all levels. Other factors that influence urban security can be limited to the increase of population, economic and social changes. This leads to losing urban control. This study will explore the historical chronology to identify weaknesses in urban planning since its dawn and reaching solutions to protect urban security. The importance of the research lies in achieving urban secur
... Show MoreRecently, all over the world mechanism of cloud computing is widely acceptable and used by most of the enterprise businesses in order increase their productivity. However there are still some concerns about the security provided by the cloud environment are raises. Thus in this our research project, we are discussing over the cloud computing paradigm evolvement for the large business applications like CRM as well as introducing the new framework for the secure cloud computing using the method of IT auditing. In this case our approach is basically directed towards the establishment of the cloud computing framework for the CRM applications with the use of checklists by following the data flow of the CRM application and its lifecycle. Those ch
... Show MoreCities have witnessed great changes since the planning of the first cities. This is due to the increase in population and problems in services that affect urban security. As such, urban security is directed and affected by the nature of city planning and the types of services. Besides, the kind of services plays an imminent place in providing urban security at all levels. Other factors that influence urban security can be limited to the increase of population, economic and social changes. This leads to losing urban control. This study will explore the historical chronology to identify weaknesses in urban planning since its dawn and reaching solutions to protect urban security. The importance of the research lies in achieving urban securi
... Show MoreImage is an important digital information that used in many internet of things (IoT) applications such as transport, healthcare, agriculture, military, vehicles and wildlife. etc. Also, any image has very important characteristic such as large size, strong correlation and huge redundancy, therefore, encrypting it by using single key Advanced Encryption Standard (AES) through IoT communication technologies makes it vulnerable to many threats, thus, the pixels that have the same values will be encrypted to another pixels that have same values when they use the same key. The contribution of this work is to increase the security of transferred image. This paper proposed multiple key AES algorithm (MECCAES) to improve the security of the tran
... Show More