Nowadays, internet security is a critical concern; the One of the most difficult study issues in network security is "intrusion detection". Fight against external threats. Intrusion detection is a novel method of securing computers and data networks that are already in use. To boost the efficacy of intrusion detection systems, machine learning and deep learning are widely deployed. While work on intrusion detection systems is already underway, based on data mining and machine learning is effective, it requires to detect intrusions by training static batch classifiers regardless considering the time-varying features of a regular data stream. Real-world problems, on the other hand, rarely fit into models that have such constraints. Furthermore, various uses in the real world, Data distributions in intrusion detection systems, for example, are non-stationary, which produce concept drift over time or non-stationary learning. The word "concept drift" is used to describe the process of changing one's mind about something in an online-supervised learning scenario, the connection between the input data and the target variable changes over time. We define adaptive learning, classify existing concept drift strategies, evaluate the most typical, distinct, and widely used approaches and algorithms, describe adaptive algorithm assessment methodology, and show a collection of examples, all of this is based on the assumption that you have a basic understanding of supervised learning. The survey examines the various aspects of concept drift in a comprehensive manner in order to think about the current fragmented "state-of-the-art". As a result, which intends to give scholars, industry analysts, and practitioners a comprehensive introduction to idea drift adaptability.
Abstract : The concept of moderation is one of the important concepts that have been discussed in political thought in general and in Islamic political thought in particular. It concerns the status of moderation and balance and the need of Islamic societies to apply them in contemporary times. The Islamic societies faced challenges facing Islamic advancement. And the right, which is the middle between the excessive and the excessive -and the exaggeration and cost-, and between negligence and default, moderation and integritybetween both two sides are: excessive and negligent". In addition, the concept of moderation and its intellectual roots have been sought in the Holy Quran and the noble prophetic, and the search for its charac
... Show MoreDespite the importance of this term in linguistics and rhetoric ancient and modern literary forms in general, is that it is possible to use in clarifying the foundations of the relationship hidden and manifest between shapes in models art adjacent or successive spatially, as the artwork plastic in general and sculpture in particular consists of formal structure somewhat similar to the structure in any language text and we can decode these blades structure and analyze the implications and come to their meanings and re-read and interpreted under the guidance of the concepts and techniques of neighboring developed primarily for linguistic analysis of texts or launched from their references. This split search to four chapters included the fi
... Show MoreReceipt date:10/8/2019 acceptance date:18/12/2019 Publication date:31/12/2021
This work is licensed under a Creative Commons Attribution 4.0 International License.
This research is concerned with the concept of identity in general "Overall definition" and is not exposed to the classifications of identity or concepts that deal with their types and classifications, only the concept in terms of the initial picture as well as the views of thinkers on the proof of
... Show MoreThe Present study aims to shed some light on the concept of authority of university students and to find statistically significant differences as regards this concepts in accordance with three variables gender (males, females),field of study(scientific ,humanities)and grade(second ,fourth). To accomplish the study a ( 7) level scale was developed for the concept of authority and it subjected to validity and credibility the scale was used with 590 student sample (237) males and (353) females Results show that male students show obedience to authority forms below the Avery e component with the theoretical Avery of the scale besides ,reinforcement was on the top of authority chain ,followed by person traits ,friends, affect punishment and t
... Show MoreIn this paper, a cognitive system based on a nonlinear neural controller and intelligent algorithm that will guide an autonomous mobile robot during continuous path-tracking and navigate over solid obstacles with avoidance was proposed. The goal of the proposed structure is to plan and track the reference path equation for the autonomous mobile robot in the mining environment to avoid the obstacles and reach to the target position by using intelligent optimization algorithms. Particle Swarm Optimization (PSO) and Artificial Bee Colony (ABC) Algorithms are used to finding the solutions of the mobile robot navigation problems in the mine by searching the optimal paths and finding the reference path equation of the optimal
... Show MoreIn this paper, Bayes estimators of the parameter of Maxwell distribution have been derived along with maximum likelihood estimator. The non-informative priors; Jeffreys and the extension of Jeffreys prior information has been considered under two different loss functions, the squared error loss function and the modified squared error loss function for comparison purpose. A simulation study has been developed in order to gain an insight into the performance on small, moderate and large samples. The performance of these estimators has been explored numerically under different conditions. The efficiency for the estimators was compared according to the mean square error MSE. The results of comparison by MSE show that the efficiency of Bayes est
... Show More'Steganography is the science of hiding information in the cover media', a force in the context of information sec, IJSR, Call for Papers, Online Journal
Hartha Formation is an overburdened horizon in the X-oilfield which generates a lot of Non-Productive Time (NPT) associated with drilling mud losses. This study has been conducted to investigate the loss events in this formation as well as to provide geological interpretations based on datasets from nine wells in this field of interest. The interpretation was based on different analyses including wireline logs, cuttings descriptions, image logs, and analog data. Seismic and coherency data were also used to formulate the geological interpretations and calibrate that with the loss events of the Hartha Fm.
The results revealed that the upper part of the Hartha Fm. was identified as an interval capable of creating potentia
... Show More