With the proliferation of both Internet access and data traffic, recent breaches have brought into sharp focus the need for Network Intrusion Detection Systems (NIDS) to protect networks from more complex cyberattacks. To differentiate between normal network processes and possible attacks, Intrusion Detection Systems (IDS) often employ pattern recognition and data mining techniques. Network and host system intrusions, assaults, and policy violations can be automatically detected and classified by an Intrusion Detection System (IDS). Using Python Scikit-Learn the results of this study show that Machine Learning (ML) techniques like Decision Tree (DT), Naïve Bayes (NB), and K-Nearest Neighbor (KNN) can enhance the effectiveness of an Intrusi
... Show MoreThere is no doubt that teachers are the leaders of positive changing in community where they directed the students and build their brains. In our current generation that characterized by accelerated technological development that communication changes, economic and politics, needs from the teacher an active leadership skills that match with the soul of our generation and contribute in confrontation the current challenges and the future challenges in the form that lead to create a conscious generation where they will be a basic brick for the future community where the listeners looking forward the education where they support the continuity communication of develop process, economy, scientifically and in all life fields. In our study we take
... Show MoreBored piles settlement behavior under vertical loaded is the main factor that affects the design requirements of single or group of piles in soft soils. The estimation of bored pile settlement is a complicated problem because it depends upon many factors which may include ground conditions, validation of bored pile design method through testing and validation of theoretical or numerical prediction of the settlement value. In this study, a prototype single and bored pile group model of arrangement (1*1, 1*2 and 2*2) for total length to diameter ratios (L/D) is 13.33 and clear spacing three times of diameter, subjected to vertical axial loads. The bored piles model used for the test was 2000
... Show MoreThe aim of this study was to study chemical constituents of aerial parts of Cardaria draba since no phytochemical investigation had been studied before in Iraq. Aerial parts of Cardaria draba were defatted by maceration in hexane for 72 h. The defatted plant materials were extracted using Soxhlet apparatus, the aqueous Methanol 90% as a solvent extraction for 18 h, and fractionated with petroleum ether- chloroform (CHCl3)- ethylacetate- and n-butanol respectivly. The ethyl acetate, n-butanol, and n-butanol after hydrolysis fractions were investigated by high performance liquid chromatography (HPLC) and thin-layer chromatography (TLC) for its phenolic acid and flavonoid contents. Flavono
... Show MoreWith the increasing use of antibiotics around the world, the study and appreciation of antibiotics has become essential. An antibiotic formulation may include one or added active ingredients depending on the type and method of manufacturing the antibiotic. Antibiotics can only combat diseases of bacterial origin. As for viral diseases such as the common cold and influenza, antibiotics will not be able to combat them. The objective of this review is to digest the literature related to estimation of antibiotics and to show the methods that have been used in the estimation of the antibiotics (amoxicillin, ampicillin, cephalothin, carbenicillin, and cefotaxime) in medicinal preparations and a biological fluid for example blood
... Show MoreIn the present paper, three reliable iterative methods are given and implemented to solve the 1D, 2D and 3D Fisher’s equation. Daftardar-Jafari method (DJM), Temimi-Ansari method (TAM) and Banach contraction method (BCM) are applied to get the exact and numerical solutions for Fisher's equations. The reliable iterative methods are characterized by many advantages, such as being free of derivatives, overcoming the difficulty arising when calculating the Adomian polynomial boundaries to deal with nonlinear terms in the Adomian decomposition method (ADM), does not request to calculate Lagrange multiplier as in the Variational iteration method (VIM) and there is no need to create a homotopy like in the Homotopy perturbation method (H
... Show MoreLinear regression is one of the most important statistical tools through which it is possible to know the relationship between the response variable and one variable (or more) of the independent variable(s), which is often used in various fields of science. Heteroscedastic is one of the linear regression problems, the effect of which leads to inaccurate conclusions. The problem of heteroscedastic may be accompanied by the presence of extreme outliers in the independent variables (High leverage points) (HLPs), the presence of (HLPs) in the data set result unrealistic estimates and misleading inferences. In this paper, we review some of the robust
... Show MoreForensic accounting (FA) is an important tool in exposing financial manipulation and corruption within institutions, making the role of FA essential in the Iraqi judicial system (IJS). This role suffers from limited implementation due to the lack of specialized legislation and insufficient awareness of its importance. The role of FA in the IJS can be enhanced by enhancing professional training, amending university curricula to include FA, and developing legislation regulating this field. Furthermore, cooperation between courts and the FA should be strengthened to ensure adequate financial evidence (FE) in judicial cases. For example, the experiences of developed countries, such as the United States and the United Kingdom, demonstrate how FA
... Show More