With the proliferation of both Internet access and data traffic, recent breaches have brought into sharp focus the need for Network Intrusion Detection Systems (NIDS) to protect networks from more complex cyberattacks. To differentiate between normal network processes and possible attacks, Intrusion Detection Systems (IDS) often employ pattern recognition and data mining techniques. Network and host system intrusions, assaults, and policy violations can be automatically detected and classified by an Intrusion Detection System (IDS). Using Python Scikit-Learn the results of this study show that Machine Learning (ML) techniques like Decision Tree (DT), Naïve Bayes (NB), and K-Nearest Neighbor (KNN) can enhance the effectiveness of an Intrusion Detection System (IDS). Success is measured by a variety of metrics, including accuracy, precision, recall, F1-Score, and execution time. Applying feature selection approaches such as Analysis of Variance (ANOVA), Mutual Information (MI), and Chi-Square (Ch-2) reduced execution time, increased detection efficiency and accuracy, and boosted overall performance. All classifiers achieve the greatest performance with 99.99% accuracy and the shortest computation time of 0.0089 seconds while using ANOVA with 10% of features.
The Present investigation includes the isolation and identification of Pseudomonas aeruginosa for different cases of hospital contamination from 1/ 6/2003 to 30/9/2004, the identification of bacteria depended on morphological , cultural and biochemical characters, 37 of isolates were diagnosed from 70 smears from wounds and burns beside 25 isolates were identified from 200 smears taken from operation theater and hospital wards including the floors , walls , sources of light and operation equipment the sensitivity of all isolates to antibiotic were done , which exhibited complete sensitivity to Ciprofloxacin , Ceftraixon, Tobromycin and Gentamysin ,while they were complete resist to Amoxcillin , Tetracyclin , Nitrofurantion , Clindamycin C
... Show MoreThis study detects the presence of cholesterol in an Iraqi plant named Suaeda baccata Forsk of the family Chenopodiacae, wildly and widely grown in Iraq. The absence of any publication concerning the sterol content of this Suaeda specie, and the industrial importance of cholesterol depending on its role as a precursor in the synthesis of some hormones, like progesterone, acquired this study its value. The investigations revealed the presence of cholesterol that was proved by TLC together with the standard compound cholesterol, and anisaldehyde spray reagent using three different solvent systems, then authenticated by HPLC, in which the reten
... Show MoreThere is no doubt that teachers are the leaders of positive changing in community where they directed the students and build their brains. In our current generation that characterized by accelerated technological development that communication changes, economic and politics, needs from the teacher an active leadership skills that match with the soul of our generation and contribute in confrontation the current challenges and the future challenges in the form that lead to create a conscious generation where they will be a basic brick for the future community where the listeners looking forward the education where they support the continuity communication of develop process, economy, scientifically and in all life fields. In our study we take
... Show MoreBored piles settlement behavior under vertical loaded is the main factor that affects the design requirements of single or group of piles in soft soils. The estimation of bored pile settlement is a complicated problem because it depends upon many factors which may include ground conditions, validation of bored pile design method through testing and validation of theoretical or numerical prediction of the settlement value. In this study, a prototype single and bored pile group model of arrangement (1*1, 1*2 and 2*2) for total length to diameter ratios (L/D) is 13.33 and clear spacing three times of diameter, subjected to vertical axial loads. The bored piles model used for the test was 2000
... Show MoreWith the increasing use of antibiotics around the world, the study and appreciation of antibiotics has become essential. An antibiotic formulation may include one or added active ingredients depending on the type and method of manufacturing the antibiotic. Antibiotics can only combat diseases of bacterial origin. As for viral diseases such as the common cold and influenza, antibiotics will not be able to combat them. The objective of this review is to digest the literature related to estimation of antibiotics and to show the methods that have been used in the estimation of the antibiotics (amoxicillin, ampicillin, cephalothin, carbenicillin, and cefotaxime) in medicinal preparations and a biological fluid for example blood
... Show MoreUsing the Internet, nothing is secure and as we are in need of means of protecting our data, the use of passwords has become important in the electronic world. To ensure that there is no hacking and to protect the database that contains important information such as the ID card and banking information, the proposed system stores the username after hashing it using the 256 hash algorithm and strong passwords are saved to repel attackers using one of two methods: -The first method is to add a random salt to the password using the CSPRNG algorithm, then hash it using hash 256 and store it on the website. -The second method is to use the PBKDF2 algorithm, which salts the passwords and extends them (deriving the password) before being ha
... Show MoreIn the present paper, three reliable iterative methods are given and implemented to solve the 1D, 2D and 3D Fisher’s equation. Daftardar-Jafari method (DJM), Temimi-Ansari method (TAM) and Banach contraction method (BCM) are applied to get the exact and numerical solutions for Fisher's equations. The reliable iterative methods are characterized by many advantages, such as being free of derivatives, overcoming the difficulty arising when calculating the Adomian polynomial boundaries to deal with nonlinear terms in the Adomian decomposition method (ADM), does not request to calculate Lagrange multiplier as in the Variational iteration method (VIM) and there is no need to create a homotopy like in the Homotopy perturbation method (H
... Show More