With the development of communication technologies for mobile devices and electronic communications, and went to the world of e-government, e-commerce and e-banking. It became necessary to control these activities from exposure to intrusion or misuse and to provide protection to them, so it's important to design powerful and efficient systems-do-this-purpose. It this paper it has been used several varieties of algorithm selection passive immune algorithm selection passive with real values, algorithm selection with passive detectors with a radius fixed, algorithm selection with passive detectors, variable- sized intrusion detection network type misuse where the algorithm generates a set of detectors to distinguish the self-samples. Practical Experiments showed the process to achieve a high rate of detection in the system designer using data NSL-KDD with 12 field without vulnerability to change the radius of the detector or change the number of reagents were obtained as the ratio between detection (0.984, 0.998, 0.999) and the ratio between a false alarm (0.003, 0.002, 0.001). Contrary to the results of experiments conducted on data NSL-KDD with 41 field contact, which affected the rate of detection by changing the radius and the number of the detector as it has been to get the proportion of uncovered between (0.44, 0.824, 0.992) and the percentage of false alarm between (0.5, 0.175, 0.003).
With the vast usage of network services, Security became an important issue for all network types. Various techniques emerged to grant network security; among them is Network Intrusion Detection System (NIDS). Many extant NIDSs actively work against various intrusions, but there are still a number of performance issues including high false alarm rates, and numerous undetected attacks. To keep up with these attacks, some of the academic researchers turned towards machine learning (ML) techniques to create software that automatically predict intrusive and abnormal traffic, another approach is to utilize ML algorithms in enhancing Traditional NIDSs which is a more feasible solution since they are widely spread. To upgrade t
... Show MoreThis study uses an Artificial Neural Network (ANN) to examine the constitutive relationships of the Glass Fiber Reinforced Polymer (GFRP) residual tensile strength at elevated temperatures. The objective is to develop an effective model and establish fire performance criteria for concrete structures in fire scenarios. Multilayer networks that employ reactive error distribution approaches can determine the residual tensile strength of GFRP using six input parameters, in contrast to previous mathematical models that utilized one or two inputs while disregarding the others. Multilayered networks employing reactive error distribution technology assign weights to each variable influencing the residual tensile strength of GFRP. Temperatur
... Show MoreAn experimental study is made here to investigate the discharge coefficient for contracted rectangular Sharp crested weirs. Three Models are used, each with different weir width to flume width ratios (0.333, 0.5, and 0.666). The experimental work is conducted in a standard flume with high-precision head and flow measuring devices. Results are used to find a dimensionless equation for the discharge coefficient variation with geometrical, flow, and fluid properties. These are the ratio of the total head to the weir height, the ratio of the contracted weir width to the flume width, the ratio of the total head to the contracted width, and Reynolds and Weber numbers. Results show that the relationship between the discharge co
... Show MoreBackground: The study aim was to evaluate thermocycling effect on microleakage of occlusal and cervical margins of MOD cavity filled with bulk filled composites in comparison to incrementally placed nanohybrid composite and to evaluate the difference in microleakage between enamel and dentin margins for the three materials groups. Materials and method: Forty eight maxillary first premolars were prepared with MOD cavities. Samples were divided into three groups of sixteen teeth according to material used: Grandio: Grandio. SDR: SDR +Grandio. X-tra: X-tra base + Grandio. Each group was subdivided into two according to be thermocycled or not. After 24 hrs immersion in 2% methylene blue, samples weresectioned and microleakage was estimated. Res
... Show MoreSurveys has done for collecting Sunn Pest which been parasitized by oophagous parasitoids
in infested wheat fields of villages around Erbil, Sulimanya and Dohuk governorates from
April to the end of May 2010, the result showed that a high rat of eggs hatching was 96.3%
within Erbil governorate and its cleared from results that not all laid eggs had been hatched
normally . The percentage ratio of egg parasitism in general was low in most studied villages.
In this study: Trissolcus grandis Thompson, Trissolcus semistriotus Nees., and Telenomus sp.
on sunn pest eggs has been observed. Identification keys supported with figures were
formulated to identify of these species.
The capital in the bank is the important element in establishing it, because it maintains the banking sector in the event of exposure to losses or risks In addition to contributing to the provision of liquidity And protection of depositors' money from potential and unexpected losses. There is also a relationship between the prices of shares and the indicators of the durability of the capital owned, considering that the shares are the components of the bank capital The study limited the indicators of capital to assets and capital to deposits, capital to loans and financial investments Where the most important conclusions are the damage to the detriment of shareholders in contrast to the depositors in the case of increasing the propo
... Show MoreSeveral studies have indicated an unprecedented increase in the number of Arab youth who watch music videos. It is also a custom in Arab countries to broadcast songs at their happy parties such as weddings, engagements and birthdays. We see that guests and party owners interact by dancing and singing with the songs, while the viewership rates of Arab music videos have reached millions on YouTube. The researcher decided to study the image of women through the lyrics of these songs, due to their importance in shaping the image of women in the minds of young people and shaping the (self-image) of young women. Twenty songs were selected from the most watched songs on YouTube for the year 2024, and it was found that the negative qualities of t
... Show MoreThe aim of this research is to introduce agricultural insurance, to define financing in the form of salam and the role of agricultural insurance in the prevention of risks to agricultural finance operations in the form of salam by verifying the hypotheses through which to reach the results, including the imposition of risks for agricultural finance in the form of salam, The study of agricultural finance in the form of salm, the deductive approach to the development of the problem of research and hypotheses, and the inductive method to extrapolate the results through analysis and brother The researcher concluded that agricultural insurance works to bridge the risks facing agricultural finance in the form of the ladder in cases of
... Show MoreThis research aims to clarify the advantages of using the regression method as analytical procedure in the tax audit to reducing the examination cost , time, effort, human and material resources, and represents an applied study in the General Commission of taxes. In order to achieve its objectives the research has used in the theoretical side the descriptive approach (analytical), and in the practical side regression method has been applied to the research sample represented by the soft drinks company that is subject to the tax settlement for the year 2014, where the value of sales has been verified by using the regression method without conductinga comprehensive examination. The most important results of the research indicate that the r
... Show More