With the proliferation of both Internet access and data traffic, recent breaches have brought into sharp focus the need for Network Intrusion Detection Systems (NIDS) to protect networks from more complex cyberattacks. To differentiate between normal network processes and possible attacks, Intrusion Detection Systems (IDS) often employ pattern recognition and data mining techniques. Network and host system intrusions, assaults, and policy violations can be automatically detected and classified by an Intrusion Detection System (IDS). Using Python Scikit-Learn the results of this study show that Machine Learning (ML) techniques like Decision Tree (DT), Naïve Bayes (NB), and K-Nearest Neighbor (KNN) can enhance the effectiveness of an Intrusion Detection System (IDS). Success is measured by a variety of metrics, including accuracy, precision, recall, F1-Score, and execution time. Applying feature selection approaches such as Analysis of Variance (ANOVA), Mutual Information (MI), and Chi-Square (Ch-2) reduced execution time, increased detection efficiency and accuracy, and boosted overall performance. All classifiers achieve the greatest performance with 99.99% accuracy and the shortest computation time of 0.0089 seconds while using ANOVA with 10% of features.
The target of this study was to study the natural phytochemical components of the head (capsule) of Cynara scolymus cultivated in Iraq. The head (capsule) of plant was extracted by maceration in70% ethanol for 72 hours, and fractioned by hexane, chloroform and ethyl acetate. Preliminary qualitative phytochemical screening was performed on the ethyl acetate fraction for capsule was revealed the presence of flavonoid and aromatic acids. These were examined by (high -performance liquid chromatography) (HPLC diodarray), (high- performance thin-layer chromatography)(HPTLC).
Flavonoids were isolated by preparative layer chromatography and aromatic acid was isolated by preparative high-
... Show MoreA batch and flow injection (FI) spectrophotometric methods are described for the determination of barbituric acid in aqueous and urine samples. The method is based on the oxidative coupling reaction of barbituric acid with 4-aminoantipyrine and potassium iodate to form purple water soluble stable product at λ 510 nm. Good linearity for both methods was obtained ranging from 2 to 60 μg mL−1, 5–100 μg mL−1 for batch and FI techniques, respectively. The limit of detection (signal/noise = 3) of 0.45 μg mL−1 for batch method and 0.48 μg mL−1 for FI analysis was obtained. The proposed methods were applied successfully for the determination of barbituric acid in tap water, river water, and urine samples with good recoveries of 99.92
... Show MoreIn this research, the Williamson-Hall method and of size-strain plot method was employed to analyze X- ray lines for evaluating the crystallite size and lattice strain and of cadmium oxide nanoparticles. the crystallite size value is (15.2 nm) and (93.1 nm) and lattice strain (4.2 x10−4 ) and (21x10−4) respectively. Also, other methods have been employed to evaluate the crystallite size. The current methods are (Sherrer and modified Sherrer methods ) and their results are (14.8 nm) and (13.9nm) respectively. Each method of analysis has a different result because the alteration in the crystallite size and lattice strain calculated according to the Williamson-Hall and size-strain plot methods shows that the non-uniform strain in nan
... Show MoreDeepFake is a concern for celebrities and everyone because it is simple to create. DeepFake images, especially high-quality ones, are difficult to detect using people, local descriptors, and current approaches. On the other hand, video manipulation detection is more accessible than an image, which many state-of-the-art systems offer. Moreover, the detection of video manipulation depends entirely on its detection through images. Many worked on DeepFake detection in images, but they had complex mathematical calculations in preprocessing steps, and many limitations, including that the face must be in front, the eyes have to be open, and the mouth should be open with the appearance of teeth, etc. Also, the accuracy of their counterfeit detectio
... Show MoreCost is the essence of any production process for it is one of the requirements for the continuity of activities so as to increase the profitability of the economic unit and to support the competitive situation in the market. Therefore, there should be an overall control to reduce the cost without compromising the product quality; to achieve this, the management should have detailed credible and reliable information about the cost to be measured, collected, understood and to analyze the causes for the spread of deviations and obstacles the management faces, and to search for the factors that trigger the emergence of these deviations and obstacles
Background: Staphylococcus spp. are widely distributed in nature and can cause nosocomial, skin infections, and foodborne illness, and it may lead to severe financial losses in birds by causing systemic infection in numerous organs. Aim: This study was conducted to determine the prevalence of Staphylococcus spp. in humans and birds in Baghdad city. Methods: Seventy-six oral cavity swabs were collected, including 41 from birds and 35 from breeders. All samples were examined by bacteriological methods and identified by using the VITEK technique, the samples were then further studied to test the ability of biofilm formation, and MDR factors and MAR index were tested with the use of seven antibiotics. Results: Among the 76 oral swa
... Show MoreChronic myelogenous leukemia (CML) is a myeloproliferative neoplasm arises from Bcr-Abl gene translocation (called Ph chromosome) in hematopoietic stem cells (HSCs). This genetic abnormality results in constitutive activation of tyrosine kinase and subsequent uncontrol growth and multiplication of granulocytes. The cornerstone in treatment of CML are tyrosine kinase inhibitors, of which imatinib is the most effectively used. JAK2V617F mutation is an acquired single nucleotide polymorphism (SNP) occurs in JAK2 gene and is associated with many hematological malignancy other than CML. It was thought that the two genetic abnormalities (Bcr-Abl and JAK2V617F) occur mutually; however, growing body of evidences suggested the reverse. This study a
... Show MoreIn this work, the possibility to use new suggested carriers (D= Aspirin, Ibuprofen, Paracetamol, Tramal) is discussed for diclofenac drug (voltarine) by using quantum mechanics calculations. The calculation methods (PM3) and (DFT) have been used for determination the reaction path of (O-D) bond rupture energies. Different groups of drugs as a carrier for diclofenac prodrugs (in a vacuum) have been used; at their optimized geometries. The calculations included the geometrical structure and some of the physical properties, in addition to the toxicity, biological activity, and NLO properties of the prodrugs, investigated using HF method. The calculations were done by Gaussian 09 program. The comparison was made for total energies of reactan
... Show MoreOne of the serious problems in any wireless communication system using multi carrier modulation technique like Orthogonal Frequency Division Multiplexing (OFDM) is its Peak to Average Power Ratio (PAPR).It limits the transmission power due to the limitation of dynamic range of Analog to Digital Converter and Digital to Analog Converter (ADC/DAC) and power amplifiers at the transmitter, which in turn sets the limit over maximum achievable rate.
This issue is especially important for mobile terminals to sustain longer battery life time. Therefore reducing PAPR can be regarded as an important issue to realize efficient and affordable mobile communication services.
... Show More