With the proliferation of both Internet access and data traffic, recent breaches have brought into sharp focus the need for Network Intrusion Detection Systems (NIDS) to protect networks from more complex cyberattacks. To differentiate between normal network processes and possible attacks, Intrusion Detection Systems (IDS) often employ pattern recognition and data mining techniques. Network and host system intrusions, assaults, and policy violations can be automatically detected and classified by an Intrusion Detection System (IDS). Using Python Scikit-Learn the results of this study show that Machine Learning (ML) techniques like Decision Tree (DT), Naïve Bayes (NB), and K-Nearest Neighbor (KNN) can enhance the effectiveness of an Intrusion Detection System (IDS). Success is measured by a variety of metrics, including accuracy, precision, recall, F1-Score, and execution time. Applying feature selection approaches such as Analysis of Variance (ANOVA), Mutual Information (MI), and Chi-Square (Ch-2) reduced execution time, increased detection efficiency and accuracy, and boosted overall performance. All classifiers achieve the greatest performance with 99.99% accuracy and the shortest computation time of 0.0089 seconds while using ANOVA with 10% of features.
Human herpes virus-8 (HHV-8) infection has increased recently in Arabic countries. HHV-8 in healthy persons does not necessarily cause life-threatening infection, and however, it causes a more severe infection among immunocompromised patients. The distribution of HHV-8 genotypes varies according to ethnicity and depends on the geographic region prior rapid development of global travel. A cross sectional prospective study included a hundred healthy blood donor samples with a mean age of (36.60±10.381), 81% were positive for molecular detection of HHV-8 DNA. PCR results for HHV-8 were strongly related with risk factors such as the number of sexual relations, previous surgeries, blood transfusion, dental operation, and the number of b
... Show MoreThe question of estimation took a great interest in some engineering, statistical applications, various applied, human sciences, the methods provided by it helped to identify and accurately the many random processes.
In this paper, methods were used through which the reliability function, risk function, and estimation of the distribution parameters were used, and the methods are (Moment Method, Maximum Likelihood Method), where an experimental study was conducted using a simulation method for the purpose of comparing the methods to show which of these methods are competent in practical application This is based on the observations generated from the Rayleigh logarithmic distribution (RL) with sample sizes
... Show MoreDoxycycline hyclate is an antibiotic drug with a broad‐spectrum activity against a variety of gram‐positive and gram‐negative bacteria and is frequently used as a pharmacological agent and as an effector molecule in an inducible gene expression system. A sensitive, reliable and fast spectrophotometric method for the determination of doxycycline hyclate in pure and pharmaceutical formulations has been developed using flow injection analysis (FIA) and batch procedures. The proposed method is based on the reaction between the chromogenic reagent (V4+) and doxycycline hyclate in a neutral medium, resulting in the formation of a yellow compound that shows maximum absorbance at 3
Heart sound is an electric signal affected by some factors during the signal's recording process, which adds unwanted information to the signal. Recently, many studies have been interested in noise removal and signal recovery problems. The first step in signal processing is noise removal; many filters are used and proposed for treating this problem. Here, the Hankel matrix is implemented from a given signal and tries to clean the signal by overcoming unwanted information from the Hankel matrix. The first step is detecting unwanted information by defining a binary operator. This operator is defined under some threshold. The unwanted information replaces by zero, and the wanted information keeping in the estimated matrix. The resulting matrix
... Show MoreModern civilization increasingly relies on sustainable and eco-friendly data centers as the core hubs of intelligent computing. However, these data centers, while vital, also face heightened vulnerability to hacking due to their role as the convergence points of numerous network connection nodes. Recognizing and addressing this vulnerability, particularly within the confines of green data centers, is a pressing concern. This paper proposes a novel approach to mitigate this threat by leveraging swarm intelligence techniques to detect prospective and hidden compromised devices within the data center environment. The core objective is to ensure sustainable intelligent computing through a colony strategy. The research primarily focusses on the
... Show MoreSoftware-defined networking (SDN) is an innovative network paradigm, offering substantial control of network operation through a network’s architecture. SDN is an ideal platform for implementing projects involving distributed applications, security solutions, and decentralized network administration in a multitenant data center environment due to its programmability. As its usage rapidly expands, network security threats are becoming more frequent, leading SDN security to be of significant concern. Machine-learning (ML) techniques for intrusion detection of DDoS attacks in SDN networks utilize standard datasets and fail to cover all classification aspects, resulting in under-coverage of attack diversity. This paper proposes a hybr
... Show MoreThe educational sector is one of the important sectors in the world, and it is considered one of the means of community development. In addition, it is one of the means of making the country’s renaissance and devel-opment because it represents the factory of thinking minds that make change. There is no doubt that this sector is the same as any other sector. The deficit in the studied scientific planning has been prolonged, which led to its deterioration, and the problems of education remain diverse and inherited from previous time periods, where the hierarchical cluster analysis was used on postgraduate students in universities in Iraq, except for Kurdistan region, and the number of universities that were included in the study was
... Show MoreWe aimed to obtain magnesium/iron (Mg/Fe)-layered double hydroxides (LDHs) nanoparticles-immobilized on waste foundry sand-a byproduct of the metal casting industry. XRD and FT-IR tests were applied to characterize the prepared sorbent. The results revealed that a new peak reflected LDHs nanoparticles. In addition, SEM-EDS mapping confirmed that the coating process was appropriate. Sorption tests for the interaction of this sorbent with an aqueous solution contaminated with Congo red dye revealed the efficacy of this material where the maximum adsorption capacity reached approximately 9127.08 mg/g. The pseudo-first-order and pseudo-second-order kinetic models helped to describe the sorption measure
In this paper, two meshless methods have been introduced to solve some nonlinear problems arising in engineering and applied sciences. These two methods include the operational matrix Bernstein polynomials and the operational matrix with Chebyshev polynomials. They provide an approximate solution by converting the nonlinear differential equation into a system of nonlinear algebraic equations, which is solved by using