Preferred Language
Articles
/
9hdcWZIBVTCNdQwC6azZ
Efficient Intrusion Detection Through the Fusion of AI Algorithms and Feature Selection Methods
...Show More Authors

With the proliferation of both Internet access and data traffic, recent breaches have brought into sharp focus the need for Network Intrusion Detection Systems (NIDS) to protect networks from more complex cyberattacks. To differentiate between normal network processes and possible attacks, Intrusion Detection Systems (IDS) often employ pattern recognition and data mining techniques. Network and host system intrusions, assaults, and policy violations can be automatically detected and classified by an Intrusion Detection System (IDS). Using Python Scikit-Learn the results of this study show that Machine Learning (ML) techniques like Decision Tree (DT), Naïve Bayes (NB), and K-Nearest Neighbor (KNN) can enhance the effectiveness of an Intrusion Detection System (IDS). Success is measured by a variety of metrics, including accuracy, precision, recall, F1-Score, and execution time. Applying feature selection approaches such as Analysis of Variance (ANOVA), Mutual Information (MI), and Chi-Square (Ch-2) reduced execution time, increased detection efficiency and accuracy, and boosted overall performance. All classifiers achieve the greatest performance with 99.99% accuracy and the shortest computation time of 0.0089 seconds while using ANOVA with 10% of features.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Jul 03 2016
Journal Name
Journal Of Educational And Psychological Researches
Recent trends in home economics teaching methods
...Show More Authors

Interest in the teaching profession is one of the most important steps on the road to education reform to develop the quality of education is not only through the teacher's professional competencies required, interest in the teaching profession in any society stems from fingerprints left by the teacher on his behavior and morals and their minds and their personalities. Today we are going to provide scientific, technical and research is enormous, we need more powerful skills and ways of thinking that must be acquired by the teacher. The current search is gaining importance in terms of:

  1. This is the first of its kind on the researcher's knowledge _ which deals with the modern trends in t

... Show More
View Publication Preview PDF
Publication Date
Sun Mar 06 2011
Journal Name
Baghdad Science Journal
Numeral Recognition Using Statistical Methods Comparison Study
...Show More Authors

The area of character recognition has received a considerable attention by researchers all over the world during the last three decades. However, this research explores best sets of feature extraction techniques and studies the accuracy of well-known classifiers for Arabic numeral using the Statistical styles in two methods and making comparison study between them. First method Linear Discriminant function that is yield results with accuracy as high as 90% of original grouped cases correctly classified. In the second method, we proposed algorithm, The results show the efficiency of the proposed algorithms, where it is found to achieve recognition accuracy of 92.9% and 91.4%. This is providing efficiency more than the first method.

View Publication Preview PDF
Crossref
Publication Date
Tue Jul 01 2025
Journal Name
Journal Of Studies In Humanities And Educational Sciences
The Effect of the Needham Constructivist Model on the Achievement of Third Year Biology Department Students in the Subject of Teaching Methods
...Show More Authors

The current research aims to know the effect of Needham's constructivist model on the achievement of third-year students in the Life Sciences Department in the teaching methods subject. To achieve the research objectives, the experimental method was followed for the experimental and control groups with dimensional measurement of the achievement variable of the teaching methods subject. The research sample included (62) students in the third year of the Life Sciences Department, distributed into two equal groups in the variables (self-assessment of learning methods - chronological age in years - intelligence level - previous information). To measure the level of students' achievement, an achievement test was constructed consisting of (40) te

... Show More
Publication Date
Tue Nov 18 2025
Journal Name
Al–bahith Al–a'alami
Tweets of Iraqi Political Leaders Regarding The Movement to Form The Governmet Through Twitter (From 3rd Septemper 2018 To 3rd Septemper 2019)
...Show More Authors

This research analyses the tweets of Iraqi politicians (leaders) that took place simultaneously with the formation of the Iraqi government after the elections in 2018. The formation of the Iraqi government was considered one of the most critical issues that emerged in the political process to which the Iraqi media as well as social networking sites paid considerable attention. In this regard, Iraqi political leaders have published many tweets concerning the formation of the government, some of them have caused great controversy in the political climate. As Twitter is one of the most digital platforms that have been widely used on the global scale in recent years, politicians have employed it to publish their opinions, ideas, and to excha

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Thu Jun 01 2017
Journal Name
Journal Of Economics And Administrative Sciences
The Role of Strategic audit in detection of financial corruption cases in Iraq - Proposed Framework
...Show More Authors

This research focuses on detecting the financial corruption cases in Iraq in light of adoption the strategic audit, the paper deals with the problem of the proliferation corruption cases particularly financial in Iraq and dramatically in the presence of audit and control devices as well as inspection and integrity devices, which indicates the existence of deficiencies and weaknesses in those devices in the implementation of audit and control functions in order to detect the corruption cases in the economic units in Iraq.

Stems objective of this research through the provision of approach of strategic audit concepts and indicate the extent importance of adopting of strategic audit as a means to detect the f

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Jul 11 2017
Journal Name
The 39th Annual International Conference Of The Ieee Engineering In Medicine And Biology Society (embc'17)
Higuchi fractal dimension of the electroencephalogram as a biomarker for early detection of Alzheimer's disease
...Show More Authors

It is widely accepted that early diagnosis of Alzheimer's disease (AD) makes it possible for patients to gain access to appropriate health care services and would facilitate the development of new therapies. AD starts many years before its clinical manifestations and a biomarker that provides a measure of changes in the brain in this period would be useful for early diagnosis of AD. Given the rapid increase in the number of older people suffering from AD, there is a need for an accurate, low-cost and easy to use biomarkers that could be used to detect AD in its early stages. Potentially, the electroencephalogram (EEG) can play a vital role in this but at present, no reliable EEG biomarker exists for early diagnosis of AD. The gradual s

... Show More
View Publication
Scopus (50)
Crossref (31)
Scopus Crossref
Publication Date
Fri Jul 21 2023
Journal Name
Journal Of Engineering
Shared Congestion Detection: A Comparative Study
...Show More Authors

Most Internet-tomography problems such as shared congestion detection depend on network measurements. Usually, such measurements are carried out in multiple locations inside the network and relied on local clocks. These clocks usually skewed with time making these measurements unsynchronized and thereby degrading the performance of most techniques. Recently, shared congestion detection has become an important issue in many computer networked applications such as multimedia streaming and
peer-to-peer file sharing. One of the most powerful techniques that employed in literature is based on Discrete Wavelet Transform (DWT) with cross-correlation operation to determine the state of the congestion. Wavelet transform is used as a de-noisin

... Show More
View Publication Preview PDF
Publication Date
Mon Mar 08 2021
Journal Name
Baghdad Science Journal
edge detection using modification prewitt operators
...Show More Authors

in this paper we adopted ways for detecting edges locally classical prewitt operators and modification it are adopted to perform the edge detection and comparing then with sobel opreators the study shows that using a prewitt opreators

View Publication Preview PDF
Crossref
Publication Date
Mon Jun 01 2020
Journal Name
Journal Of The College Of Languages (jcl)
The Labyrinths of the Contemporary French Novel Through the Texts of Patrick Modiano: Les Labyrinthes du Roman Français Contemporain à travers l’Œuvre de Patrick Modiano
...Show More Authors

The current paper aims to study the different forms by which the theme of labyrinth imposes itself as a preferred narrative structure in the novels of the French writer Patrick Modiano. Theoretically speaking, the current research paper will limit itself to the theoretical framework of the textual poetics which relies on the study of literary texts without paying much attention, neither to the context, nor to the life of its author. The analysis of the strong and varied links that Modiano's novels establish with labyrinth represents a field which has not received adequate attention by the critical studies dedicated to this French writer. As it will be shown throughout the current paper, Modiano views labyrint

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Jan 01 2022
Journal Name
Tropical Journal Of Natural Product Research
Detection of Herpes Simplex Virus Type 1 in Patients Affected by Conjunctivitis
...Show More Authors

Herpes simplex virus (HSV) is a common human pathogen that causes severe infections in newborns and immunocompromised patients. Conjunctivitis or corneal epithelial keratitis is caused by HSV type 1 all over the world and at all times of the year. The present study was aimed at detecting HSV in patients suffering from conjunctivitis. One hundred and ten (110) clinical samples (90 patients and 20 controls, both males and females) of eye conjunctiva swabs were collected from patients of different ages. The samples were analyzed using qPCR and ELISA techniques. The qPCR results revealed that HSV was present in 47 (52.2%) of the 90 patients who were infected. Of these patients, 25 (48.0%) were males and 22 (57.8%) were females, indicati

... Show More
View Publication Preview PDF
Scopus