Regarding to the computer system security, the intrusion detection systems are fundamental components for discriminating attacks at the early stage. They monitor and analyze network traffics, looking for abnormal behaviors or attack signatures to detect intrusions in early time. However, many challenges arise while developing flexible and efficient network intrusion detection system (NIDS) for unforeseen attacks with high detection rate. In this paper, deep neural network (DNN) approach was proposed for anomaly detection NIDS. Dropout is the regularized technique used with DNN model to reduce the overfitting. The experimental results applied on NSL_KDD dataset. SoftMax output layer has been used with cross entropy loss function to enforce the proposed model in multiple classification, including five labels, one is normal and four others are attacks (Dos, R2L, U2L and Probe). Accuracy metric was used to evaluate the model performance. The proposed model accuracy achieved to 99.45%. Commonly the recognition time is reduced in the NIDS by using feature selection technique. The proposed DNN classifier implemented with feature selection algorithm, and obtained on accuracy reached to 99.27%.
El estudio se clasifica dentro los estudios teóricos sobre literatura que se ocupa del estudio de los métodos de la crítica literaria: El Estructralismo literario francés y el Formalismo ruso del siglo XX que se utilizan en la interpretación literaría. Las dos corrientes literarias estudian la literatura como ciencia que busca aplicar un método científico al estudio de la literatura. Dicho estudio trata de exponer las teorías críticas que surgen en el debate de la interpretación de los textos literarios como el de Susan Sontag, Ricoeur Paul y Mijail Bajitin, etc. Además se incluye algunos ejemplos implican el análisis estructuralista y formalista como Kafka y la tragedia Judía. y Sur Racine.
ABSTRACT:
... Show MoreThe orient culture and heritage has directly influenced ,in a way or another , the literary works which recently have been noted by the oriental Jews inside and outside of Israel. Several Jewish writers, who came from the orient (especially from Iran ), have written their works while influenced by traditions and customs of the Iranian society, in which they were born , lived , and raised, and by the writers who were born in that society and then moved to Israel and lived there as a result of the Zionism and its notorious promises to gather Jewish people from all over the world to establish their national home at the expense of the Palestinian land and people.
That final
... Show MoreLas diferencias entre el pretérito perfecto simple y el imperfecto son uno de los temas más complejos de la lengua española, no sólo para el estudiante, sino para el profesor, puesto que sistematizar los casos y hacerlos fácilmente comprensibles al alumno es tarea difícil. Los profesores de lengua, cuyas investigaciones han dado lugar a una serie de teorías y de corrientes metodológicas y didácticas que permiten enfocar la enseñanza de una lengua extranjera de manera muy distinta a como se hacía tradicionalmente. Vamos a repasar muy brevemente cuáles son estas teorías.
En primer lugar es necesario señalar en qué consiste el aprendizaje de una segunda lengua:
"El aprendizaje de una segunda lengua (L2) es el
... Show MoreThe issue of penalized regression model has received considerable critical attention to variable selection. It plays an essential role in dealing with high dimensional data. Arctangent denoted by the Atan penalty has been used in both estimation and variable selection as an efficient method recently. However, the Atan penalty is very sensitive to outliers in response to variables or heavy-tailed error distribution. While the least absolute deviation is a good method to get robustness in regression estimation. The specific objective of this research is to propose a robust Atan estimator from combining these two ideas at once. Simulation experiments and real data applications show that the proposed LAD-Atan estimator
... Show Moreresearch aim :
- The research aimed to investigate the effect of two treatment
methods in the gaining of fourth grade students in geography
object.
- Research hypothesis
there are no statistically significant differences at the level of ( 0.05 )
in the average level of achievement in geography between the first
experimental group ( strengthening lessons ) and the second group
( re- teaching )
no individual differences statically significant at the level of ( 0.05 )
in the average level achievement in geography object of the second
experimental group ( re- teaching ) and the first experimental group
( strengthening lesson )
the research sample : the researcher selected randomly Baghdad
استهدف البحث الحالي قياس الذاكرة العاملة لدى التالميذ ذوي صعوبات تعلم القراءة، وتحقيقا ألهداف البحث اعد الباحثان اختبار الذاكرة العاملة للتالميذ ذوي صعوبات القراءة باستعمال مهام بصرية - سمعية وتنفيذية على وفق إنموذج بادلي)Baddely)، ثم استخرج الخصائص السيكومترية لكل منهما المتمثلة بالصدق والثبات. وتحدد البحث الحالي بالتالميذ ذوي صعوبات تعلم القراءة في المدارس االبتدائية التابعة للمدير ية العامة لتربية بابل ف
... Show MoreThe purpose of this paper is to introduce and prove some coupled coincidence fixed point theorems for self mappings satisfying -contractive condition with rational expressions on complete partially ordered metric spaces involving altering distance functions with mixed monotone property of the mapping. Our results improve and unify a multitude of coupled fixed point theorems and generalize some recent results in partially ordered metric space. An example is given to show the validity of our main result.
Rationing is a commonly used solution for shortages of resources and goods that are vital for the citizens of a country. This paper identifies some common approaches and policies used in rationing as well asrisks that associated to suggesta system for rationing fuelwhichcan work efficiently. Subsequently, addressing all possible security risks and their solutions. The system should theoretically be applicable in emergency situations, requiring less than three months to implement at a low cost and minimal changes to infrastructure.
The concealment of data has emerged as an area of deep and wide interest in research that endeavours to conceal data in a covert and stealth manner, to avoid detection through the embedment of the secret data into cover images that appear inconspicuous. These cover images may be in the format of images or videos used for concealment of the messages, yet still retaining the quality visually. Over the past ten years, there have been numerous researches on varying steganographic methods related to images, that emphasised on payload and the quality of the image. Nevertheless, a compromise exists between the two indicators and to mediate a more favourable reconciliation for this duo is a daunting and problematic task. Additionally, the current
... Show More