Preferred Language
Articles
/
9hdcWZIBVTCNdQwC6azZ
Efficient Intrusion Detection Through the Fusion of AI Algorithms and Feature Selection Methods
...Show More Authors

With the proliferation of both Internet access and data traffic, recent breaches have brought into sharp focus the need for Network Intrusion Detection Systems (NIDS) to protect networks from more complex cyberattacks. To differentiate between normal network processes and possible attacks, Intrusion Detection Systems (IDS) often employ pattern recognition and data mining techniques. Network and host system intrusions, assaults, and policy violations can be automatically detected and classified by an Intrusion Detection System (IDS). Using Python Scikit-Learn the results of this study show that Machine Learning (ML) techniques like Decision Tree (DT), Naïve Bayes (NB), and K-Nearest Neighbor (KNN) can enhance the effectiveness of an Intrusion Detection System (IDS). Success is measured by a variety of metrics, including accuracy, precision, recall, F1-Score, and execution time. Applying feature selection approaches such as Analysis of Variance (ANOVA), Mutual Information (MI), and Chi-Square (Ch-2) reduced execution time, increased detection efficiency and accuracy, and boosted overall performance. All classifiers achieve the greatest performance with 99.99% accuracy and the shortest computation time of 0.0089 seconds while using ANOVA with 10% of features.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Oct 08 2002
Journal Name
Iraqi Journal Of Laser
Laser Detection and Tracking System Using an Array of Photodiodes with Fuzzy Logic controller
...Show More Authors

In this work laser detection and tracking system (LDTS) is designed and implemented using a fuzzy logic controller (FLC). A 5 mW He-Ne laser system and an array of nine PN photodiodes are used in the detection system. The FLC is simulated using MATLAB package and the result is stored in a lock up table to use it in the real time operation of the system. The results give a good system response in the target detection and tracking in the real time operation.

View Publication Preview PDF
Publication Date
Sat Jun 01 2019
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The adequacy of the methods used in the collection of tax debt in Iraq: Applied research in the General Authority for Taxation
...Show More Authors

If the sovereignty of the state is reflected in the taxation of its citizens, this sovereignty can not be completed and completed only if it works on its part to collect its debts, whether voluntary or compulsory, and the debt of the debt arises from the will of the individual and the will of the state alone, The existing management of seizure and collection is based on an unequal relationship between the State and the debtor from which the obligation arises. Naturally, this relationship has obligations and rights on both parties. The researcher used a set of studies and previous research, books and other sources related to the subject of research. This was done through the theoretical and practical aspects, which focused on direct and i

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jul 09 2023
Journal Name
Journal Of Engineering
New Approach in Detection MAC Spoofing in a WiFi LAN
...Show More Authors

Medium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Jan 01 2004
Journal Name
Ipmj-iraqi Postgraduate Medical Journal
Changes in alkaline phosphatase activity in rat mammary glands from virgin through pregnancy, lactation and post–lactation
...Show More Authors

The aim of this investigation is to study the rote of alkaline phosphatase in mammogenesis and lactogenesis. A total of fortyfemalealbino rats were used and divided according to their physiological states into four groups [ten rats each]. From each deeply ether anesthetized rat, the mammary gland was removed, fixed, quenched in liquid nitrogen and sectioned using SLEE cryostat. The sections were employed for routine haematoxylin and eosin stain and alkaline phosphatase demonstration using the calcium–cobalt method. The obvious finding in the mammary glands of pregnant rat was the presence of thick black rings indicating strong alkaline phosphatase activityaround the basal part of the secretory epithelium of the alveoli. In lactating mamma

... Show More
Publication Date
Wed Jan 01 2003
Journal Name
Ipmj-iraqi Postgraduate Medical Journal
Changes in acid phosphatase activity in rat’s mammary tissue from virginity, through pregnancy, lactation and post–lactation
...Show More Authors

Purpose: Studying the activity of acid phosphatase, which is the marker of lysosomal activity in the mammary glands of rats at different stages of the physiological maturation [virgih, pregnancy, lactation and Post lactation] Methods: Forty, female, albino rats were used in this study. They were divided into four groups according to their physiological states [virgin, pregnancy, lactation and post lactation]. The mammary glands, after suitable fixation and sectioning, were employed for routine haematoxylin and eosin stain and for acid phosphatase demonstration Results: Acid phosphatase activity was weakly diffuse in the secretory tubules of virgin rats, the diffuse and granular activity of this enzyme was increased during pregnancy in the s

... Show More
Publication Date
Sun Jun 01 2025
Journal Name
Chemical Engineering And Processing - Process Intensification
Wastewater treatment through a hybrid electrocoagulation and electro-Fenton process with a porous graphite air-diffusion cathode
...Show More Authors

View Publication
Scopus (1)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Sun Jul 06 2025
Journal Name
Jordan Medical Journal
Enhancing Adherence and Satisfaction with Disease-Modifying Therapies in Multiple Sclerosis Through Pharmacist-Led Interventions: Interventional Study
...Show More Authors

Background: Pharmacists are essential in treating MS. Pharmacists' involvement and patient consultation may improve patient adherence and satisfaction. Aim: To evaluate the influence of pharmacist-led interventions (PLI) on medication adherence and satisfaction in patients with multiple sclerosis receiving disease-modifying therapies (DMTs). Methods: This study was conducted on patients with relapsing-remitting multiple sclerosis who were receiving DMTs and attended a neurological consultant clinic in the medical city of Baghdad. It was a pre-post-intervention study. Each patient underwent two educational sessions: the first session took place at the beginning of the study, after completing the Arabic version of the treatment satisfaction q

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Sun Jun 01 2025
Journal Name
Chemical Engineering And Processing - Process Intensification
Wastewater treatment through a hybrid electrocoagulation and electro-Fenton process with a porous graphite air-diffusion cathode
...Show More Authors

View Publication
Scopus (2)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Sat Jun 01 2019
Journal Name
Journal Of Economics And Administrative Sciences
Comparison of some methods for estimating the parameters of the binary logistic regression model using the genetic algorithm with practical application
...Show More Authors

Abstract

   Suffering the human because of pressure normal life of exposure to several types of heart disease as a result of due to different factors. Therefore, and in order to find out the case of a death whether or not, are to be modeled using binary logistic regression model

    In this research used, one of the most important models of nonlinear regression models extensive use in the modeling of applications statistical, in terms of heart disease which is the binary logistic regression model. and then estimating the parameters of this model using the statistical estimation methods, another problem will be appears in estimating its parameters, as well as when the numbe

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Apr 30 2018
Journal Name
Journal Of Theoretical And Applied Information Technology
An efficient artificial fish swarm algorithm with harmony search for scheduling in flexible job-shop problem
...Show More Authors

Flexible job-shop scheduling problem (FJSP) is one of the instances in flexible manufacturing systems. It is considered as a very complex to control. Hence generating a control system for this problem domain is difficult. FJSP inherits the job-shop scheduling problem characteristics. It has an additional decision level to the sequencing one which allows the operations to be processed on any machine among a set of available machines at a facility. In this article, we present Artificial Fish Swarm Algorithm with Harmony Search for solving the flexible job shop scheduling problem. It is based on the new harmony improvised from results obtained by artificial fish swarm algorithm. This improvised solution is sent to comparison to an overall best

... Show More
View Publication Preview PDF
Scopus (3)
Scopus