Regarding to the computer system security, the intrusion detection systems are fundamental components for discriminating attacks at the early stage. They monitor and analyze network traffics, looking for abnormal behaviors or attack signatures to detect intrusions in early time. However, many challenges arise while developing flexible and efficient network intrusion detection system (NIDS) for unforeseen attacks with high detection rate. In this paper, deep neural network (DNN) approach was proposed for anomaly detection NIDS. Dropout is the regularized technique used with DNN model to reduce the overfitting. The experimental results applied on NSL_KDD dataset. SoftMax output layer has been used with cross entropy loss function to enforce the proposed model in multiple classification, including five labels, one is normal and four others are attacks (Dos, R2L, U2L and Probe). Accuracy metric was used to evaluate the model performance. The proposed model accuracy achieved to 99.45%. Commonly the recognition time is reduced in the NIDS by using feature selection technique. The proposed DNN classifier implemented with feature selection algorithm, and obtained on accuracy reached to 99.27%.
In the midst of the public narrative film , we discussed the issue of dealing with the current narrative more specialized which its future dimension form shift and twist on the level of construction narrative film in some of its diverse and renewable trends in its two ways theoretical and practical and non-give important implications for the modes of operation of the renewable narrative structures and the fact that the cinema is an arts which always open to ideas in neighboring fields and this come naturally as a result of the continuing intellectual and knowledge sharing between cinema and other science . our current research has already begun to address the issue in a stream of consciousness narrative structure film based on all that t
... Show MoreThe research endeavors to harness the benefits stemming from the integration of constraint theory into construction project management, with the primary goal of mitigating project completion delays. Additionally, it employs fuzzy analysis to determine the relative significance of fundamental constraints within projects by assigning them appropriate weights. The research problem primarily revolves around two key issues. Firstly, the persistent utilization of outdated methodologies and a heavy reliance on workforce experience without embracing modern computerized technologies. Secondly, the recurring problem of project delivery delays. Construction projects typically encompass five fundamental constraint types: cost restrictions, tim
... Show MoreBackground A prospective clinical study was
performed to compare the efficacy of the use of lowmolecular-
weight heparin group (enoxparin group)
with control group in the prevention of deep-vein
thrombosis after total knee arthroplasty.
Aim of the study: to assess the prevalence of DVT
after total knee arthroplasty and evaluate the
importance of the use of low molecular weight
heparin in the prevention of this DVT.
Methods Thirty-three patients undergoing total
knee arthroplasty were randomly divided into two
groups. One group consisted of 12 patients who
received no prophylaxis with an anticoagulant (the
control group), other group consisted of 21 patients
who received the low-molecular-weight h
This research paper aims at studying the effect of adopting the corporate social responsibility on marketing performance indicators, where the study adopted the descriptive method for theoretical concepts, in addition to the statistical approach by using the SPSS v25 program to analyze the questionnaire and test the hypotheses of the study. The results showed that there is a positive correlation between social responsibility and marketing performance indicators, and the study found that it is better for NAFTAL Company to mix the environmental and social responsibilities in order to improve its marketing performance. Also, the study recommended that Naftal should adopt the four responsibilities equally, correctly and make its work
... Show MoreTool wear is a major problem in machining operations because the resulting material loss gradually changes of the machine tool. There many factors may leads to material loss like; friction, corrosion, and also it’s happened by rubbing during machining processes between the work piece and the tool. Dimensional accuracy of the work piece, and also the surface finish will be reducing by tool wear. It can also increase cutting force. In this study, we focused on the effect of the coating process on crater wear problems. Crater wear is caused by the flow between the chip and the rake face of the tool, whereas flank wear is caused by the contact between the tool and the work piece. In reducing crater wear, aluminum titanium nitride (AlTiN) u
... Show MoreAccountancy unit is looked is upon as unit that established for the purpose achieve it goals and programmers for unlimited time. Unless otherwise take place such as liquation whether voluntary or mandatory. Thus going concern logic is considered to be the logical foundation witch the familiar accounting principles are based upon. The future of a Company real its financial statues and position and the extent of it ability to face events in future. Hence the success and continuity its activities depend on the extent of the company activity to generate profits. And its ability to retain appropriate liquidity to serve its debts.
Therefore financial statements of the company consider to be on
... Show MoreSince the introduction of the HTTP/3, research has focused on evaluating its influences on the existing adaptive streaming over HTTP (HAS). Among these research, due to irrelevant transport protocols, the cross-protocol unfairness between the HAS over HTTP/3 (HAS/3) and HAS over HTTP/2 (HAS/2) has caught considerable attention. It has been found that the HAS/3 clients tend to request higher bitrates than the HAS/2 clients because the transport QUIC obtains higher bandwidth for its HAS/3 clients than the TCP for its HAS/2 clients. As the problem originates from the transport layer, it is likely that the server-based unfairness solutions can help the clients overcome such a problem. Therefore, in this paper, an experimental study of the se
... Show MoreThe predilection for 5G telemedicine networks has piqued the interest of industry researchers and academics. The most significant barrier to global telemedicine adoption is to achieve a secure and efficient transport of patients, which has two critical responsibilities. The first is to get the patient to the nearest hospital as quickly as possible, and the second is to keep the connection secure while traveling to the hospital. As a result, a new network scheme has been suggested to expand the medical delivery system, which is an agile network scheme to securely redirect ambulance motorbikes to the nearest hospital in emergency cases. This research provides a secured and efficient telemedicine transport strategy compatible with the
... Show MoreWith the fast-growing of neural machine translation (NMT), there is still a lack of insight into the performance of these models on semantically and culturally rich texts, especially between linguistically distant languages like Arabic and English. In this paper, we investigate the performance of two state-of-the-art AI translation systems (ChatGPT, DeepSeek) when translating Arabic texts to English in three different genres: journalistic, literary, and technical. The study utilizes a mixed-method evaluation methodology based on a balanced corpus of 60 Arabic source texts from the three genres. Objective measures, including BLEU and TER, and subjective evaluations from human translators were employed to determine the semantic, contextual an
... Show More