Nowadays, internet security is a critical concern; the One of the most difficult study issues in network security is "intrusion detection". Fight against external threats. Intrusion detection is a novel method of securing computers and data networks that are already in use. To boost the efficacy of intrusion detection systems, machine learning and deep learning are widely deployed. While work on intrusion detection systems is already underway, based on data mining and machine learning is effective, it requires to detect intrusions by training static batch classifiers regardless considering the time-varying features of a regular data stream. Real-world problems, on the other hand, rarely fit into models that have such constraints. Furthermore, various uses in the real world, Data distributions in intrusion detection systems, for example, are non-stationary, which produce concept drift over time or non-stationary learning. The word "concept drift" is used to describe the process of changing one's mind about something in an online-supervised learning scenario, the connection between the input data and the target variable changes over time. We define adaptive learning, classify existing concept drift strategies, evaluate the most typical, distinct, and widely used approaches and algorithms, describe adaptive algorithm assessment methodology, and show a collection of examples, all of this is based on the assumption that you have a basic understanding of supervised learning. The survey examines the various aspects of concept drift in a comprehensive manner in order to think about the current fragmented "state-of-the-art". As a result, which intends to give scholars, industry analysts, and practitioners a comprehensive introduction to idea drift adaptability.
This paper presents a numerical simulation of the flow around elliptic groynes by using CFD software. The flow was simulated in a flume with 4m long, 0.4m wide, and 0.175m high with a constant bed slope. Moreover, the first Groyne placed at 1m from the flow inlet with a constant the Groyne height of 10cm and a 1cm thickness, and the width of Groynes equals 7cm. A submergence ratio of the elliptic Groynes of 75% was assumed, corresponding to a discharge of 0.0057m3/sec. The CFD model showed a good ability to simulate the flow around Groynes with good accuracy. The results of CFD software showed that when using double elliptic Groy
... Show MoreAdministrative procedures in various organizations produce numerous crucial records and data. These
records and data are also used in other processes like customer relationship management and accounting
operations.It is incredibly challenging to use and extract valuable and meaningful information from these data
and records because they are frequently enormous and continuously growing in size and complexity.Data
mining is the act of sorting through large data sets to find patterns and relationships that might aid in the data
analysis process of resolving business issues. Using data mining techniques, enterprises can forecast future
trends and make better business decisions.The Apriori algorithm has bee
Background: Odontogenisis is a complex process controlled by dynamic and reciprocal interactions that regulated by various molecules. Thymosin β4 is a small bioactive peptide with wide spectrum biological effects on much cell types. The present study was designed to highlight the effect of synthetic exogenous Tβ4 on developing dental tissue of the upper central teeth of rats, by histological examination and immunohistochemical evaluation of TGFβ1. Materials and method: Thirty six Albino Wister pregnant rat 18control group received intraperitoneal injection of normal saline and the others are experimental group received 50µg/300µl of Tβ4 injection. The animals were sacrificed at periods 16th and 18th day I.U.L and one day p
... Show MoreThe study aimed to identify the news framing on the Israeli Arabic-speaking i24 channel of the Israeli aggression on Gaza -2021 by analyzing the channel’s Program “this evening”. The study used the media survey method, and in its framework, it relied on the content analysis method for the program’s episodes from May 5, 2021 AD until June 4, 2021 AD, with 22 episodes. The study showed the program’s interest in launching the Palestinian resistance’s rockets significantly, followed by the Israeli military operations, and the program’s reliance on correspondents largely as a source of news material related to the aggression. It also proved that a news report and a reporter's report was the most important form of presenting news
... Show MoreIn this paper, CdO nanoparticles prepared by pulsed laser deposition techniqueonto a porous silicon (PS) surface prepared by electrochemical etching of p-type silicon wafer with resistivity (1.5-4Ω.cm) in hydrofluoric (HF) acid of 20% concentration. Current density (15 mA/cm2) and etching times (20min). The films were characterized by the measurement of AFM, FTIR spectroscopy and electrical properties.
Atomic Force microscopy confirms the nanometric size.Chemical components during the electrochemical etching show on surface of PSchanges take place in the spectrum of CdO deposited PS when compared to as-anodized PS.
The electrical properties of prepared PS; namely current density-voltage charact
... Show MoreBackground: Chronic periodontitis is an inflammatory disease of tissues supporting the teeth. Salivary compositions have been most intensely studied as a potential marker for periodontal disease. In this study, analysis of saliva provides a simple and non-invasive method of evaluating the role of salivary IgA (s-IgA) levels in periodontal disease by detecting the level of (s-IgA) in patients with chronic periodontitis smokers and non smokers patients and correlate the mean (s-IgA) levels with clinical periodontal parameters Plaque index (PLI) gingival index (GI), probing pocket depth (PPD) and clinical attachment level (CAL). Materials and Methods: The study samples consists of (15) patients with chronic periodontitis who were non smokers (
... Show MorePraise be to God, Lord of the worlds, and prayers and peace be upon our master Muhammad and upon his family and companions.
And after:
Muslim scholars have fought in the extent of regard to these interests, each according to his opinion and according to his evaluation, and his consideration of this interest, but it remains important that the legislation in them needs more precaution and caution against the predominance of passions, because the passions often decorate spoilers so they see an interest, so practical application must To realize the spirit of Islamic Sharia in its entirety of its rulings, and the preponderance between the interests and evils that prevail in our societies, which c
... Show MoreField experiment was conducted during 2007 in the experimental field of crop science Department/ Collage of Agriculture/ University of Baghdad, in order to identify the mechanism of compensation of cotton plant of Lashata Variety, with different levels of fruiting form removal in various time intervals and the effect of this factor on yield component. We use complete randomized block design with three replications. To compare the treatments: (control), 50% bud removal for one, two and three successive weeks, and 100% bud removal for one, two and three successive weeks, 50% flower removal for one, two and three successive weeks and 100% flower removal for one, two and three successive weeks, 50% boll removal for one, two and three successive
... Show MoreDue to the fact that living organisms do not exist individually, but rather exist in clusters interacting with each other, which helps to spread epidemics among them. Therefore, the study of the prey-predator system in the presence of an infectious disease is an important topic because the disease affects the system's dynamics and its existence. The presence of the hunting cooperation characteristic and the induced fear in the prey community impairs the growth rate of the prey and therefore affects the presence of the predator as well. Therefore, this research is interested in studying an eco-epidemiological system that includes the above factors. Therefore, an eco-epidemiological prey-predator model incorporating predation fear and
... Show More