Regarding to the computer system security, the intrusion detection systems are fundamental components for discriminating attacks at the early stage. They monitor and analyze network traffics, looking for abnormal behaviors or attack signatures to detect intrusions in early time. However, many challenges arise while developing flexible and efficient network intrusion detection system (NIDS) for unforeseen attacks with high detection rate. In this paper, deep neural network (DNN) approach was proposed for anomaly detection NIDS. Dropout is the regularized technique used with DNN model to reduce the overfitting. The experimental results applied on NSL_KDD dataset. SoftMax output layer has been used with cross entropy loss function to enforce the proposed model in multiple classification, including five labels, one is normal and four others are attacks (Dos, R2L, U2L and Probe). Accuracy metric was used to evaluate the model performance. The proposed model accuracy achieved to 99.45%. Commonly the recognition time is reduced in the NIDS by using feature selection technique. The proposed DNN classifier implemented with feature selection algorithm, and obtained on accuracy reached to 99.27%.
Spraying pesticides is one of the most common procedures that is conducted to control pests. However, excessive use of these chemicals inversely affects the surrounding environments including the soil, plants, animals, and the operator itself. Therefore, researchers have been encouraged to...
Geotechnical engineering like any other engineering field has to develop and cope with new technologies. This article intends to investigate the spatial relationships between soil’s liquid limit (LL), plasticity index (PI) and Liquidity index (LI) for particular zones of Sulaymaniyah City. The main objective is to study the ability to produce digital soil maps for the study area and determine regions of high expansive soil. Inverse Distance Weighting (IDW) interpolation tool within the GIS (Geographic Information System) program was used to produce the maps. Data from 592 boreholes for LL and PI and 245 boreholes for LI were used for this study. Layers were allocated into three depth ranges (1 to 2, 2 to 4 and 4 to 6)
... Show MoreIn recent years, the world witnessed a rapid growth in attacks on the internet which resulted in deficiencies in networks performances. The growth was in both quantity and versatility of the attacks. To cope with this, new detection techniques are required especially the ones that use Artificial Intelligence techniques such as machine learning based intrusion detection and prevention systems. Many machine learning models are used to deal with intrusion detection and each has its own pros and cons and this is where this paper falls in, performance analysis of different Machine Learning Models for Intrusion Detection Systems based on supervised machine learning algorithms. Using Python Scikit-Learn library KNN, Support Ve
... Show MoreThe major of DDoS attacks use TCP protocol and the TCP SYN flooding attack is the most common one among them. The SYN Cookie mechanism is used to defend against the TCP SYN flooding attack. It is an effective defense, but it has a disadvantage of high calculations and it doesn’t differentiate spoofed packets from legitimate packets. Therefore, filtering the spoofed packet can effectively enhance the SYN Cookie activity. Hop Count Filtering (HCF) is another mechanism used at the server side to filter spoofed packets. This mechanism has a drawback of being not a perfect and final solution in defending against the TCP SYN flooding attack. An enhanced mechanism of Integrating and combining the SYN Cookie with Hop Count Filtering (HCF) mech
... Show MoreThe research aims to delve into the nature of international financial reporting standards and the unified accounting system adopted in the Iraqi environment and financial ratios in the theoretical side. In the practical aspect, the results of some financial ratios of Basrah Gas Company were compared with the adoption of the financial statements prepared on the basis of the consolidated accounting system with the prepared financial statements Based on the International Financial Reporting Standards (IFRS). The research has reached a number of conclusions, including a difference in the accounting rules and practices between IFRS and the consolidated accounting system in force in Iraq. The adoption of IFRS has led to a decrease in profitabi
... Show MoreIn this study, mesoporous silica (MPS) is made using the sol-gel method from a cheap source (Na2SiO3) using the surfactant hydroxycetyl hydroxyethyl dimonium chloride as a template. The task is the adsorption-based removal of the medication metoprolol (MP) at concentrations between 10 and 50 ppm. Variables such as: contact time, dose of adsorbent, starting concentration of adsorbate, and adsorption temperature were studied which show the equilibrium time and adsorbent dose are 40 min and 0.05 g respectively. The Langmuir, Freundlich, Temkin, and Dubinin-Radushkevich isotherm models were fitted to the data obtained from the experiments. Comparing the outcomes showed that, of the four investigated isotherm models, the Freundlich equation m
... Show MoreIn this research the natural frequency of a cracked simple supported beam (the crack is in many places and in different depths) is investigated analytically, experimentally and numerically by ANSYS program, and the results are compared. The beam is made of iron with dimensions of L*W*H= (0.84*0.02* 0.02m), and density = 7680kg/m3, E=200Gpa. A comparison made between analytical results from ANSYS with experimental results, where the biggest error percentage is about (7.2 %) in crack position (42 cm) and (6 mm) depth. Between Rayleigh method with experimental results the biggest error percentage is about (6.4 %) for the same crack position and depth. From the error percentages it could be concluded that the Rayleigh method gives
... Show MoreThis study reveals the impact of critical reading on viewers understanding and astatic judgment at artworks. And aims to find out the reasons and motives behind their issuing of these judgments towards artworks.
The study adopts the qualitative method as two pre and post interviews were conducted and analysed according to a thematic analysis method.
The results show that critical reading contributes to their understanding of the content of artworks and the message that the artist would like to convey to the recipient audience. and directs them towards the aesthetic judgment that is based on full understanding of the philosophical contents of the artwork, which, in turn, contributes to the development of artistic culture and a
The traction property is one of the important mechanical properties, especially the rotary parts which are subjected to constant and variable loads There are many methods used to improve this property, and the shoot peening by metal balls is considered the most critical one. the study focuses on this characteristic of steel CK35 used in many engineering applications as the rotating shafts and railway This study shows that the fatigue strength is improved by14% after shoot peening with metal balls. The study includs the rehabilitation of damaged samples as a result of fatigue corrosion. The standard solution adopted was 36% MgCl2 with a 30 days immersion period. These samples has been improved by 6% after it decreased by18% d
... Show MoreAbstract
Although the subject of biofuels industry is linked directly to the energy sector, but has links and numerous indirect effects, in particular effects on the environment and agriculture, this study (opportunities and challenges of biofuels industry and impact on the development of the agricultural sector in developing countries) a modest step to identify the industry in detail and identify the types of products and raw materials entering, then define or limit the positive and negative impacts of this industry in General and for specific products In particular, detailed, and then flip all those effects on the agricultural sector in developing countries can benef
... Show More