In recent years, the world witnessed a rapid growth in attacks on the internet which resulted in deficiencies in networks performances. The growth was in both quantity and versatility of the attacks. To cope with this, new detection techniques are required especially the ones that use Artificial Intelligence techniques such as machine learning based intrusion detection and prevention systems. Many machine learning models are used to deal with intrusion detection and each has its own pros and cons and this is where this paper falls in, performance analysis of different Machine Learning Models for Intrusion Detection Systems based on supervised machine learning algorithms. Using Python Scikit-Learn library KNN, Support Vector Machine, Naïve Bayes, Decision Tree, Random Forest, Stochastic Gradient Descent, Gradient Boosting and Ada Boosting classifiers were designed. Performance-wise analysis using Confusion Matrix metric carried out and comparisons between the classifiers were a due. As a case study Information Gain, Pearson and F-test feature selection techniques were used and the obtained results compared to models that use all the features. One unique outcome is that the Random Forest classifier achieves the best performance with an accuracy of 99.96% and an error margin of 0.038%, which supersedes other classifiers. Using 80% reduction in features and parameters extraction from the packet header rather than the workload, a big performance advantage is achieved, especially in online environments.
Online communication on social networks has become a never-given-up way of expressing and sharing views and opinions within the realm of all topics on earth, and that is that! A basis essential in this is the limits at which "freedom of expression" should not be trespassed so as not to fall into the expression of "hate speech". These two ends make a base in the UN regulations pertaining to human rights: One is free to express, but not to hate by expression. Hereunder, a Critical Discourse Analysis in terms of Fairclough's dialectical-relational approach (2001) is made of Facebook posts (being made by common people, and not of official nature) targeting Islam and Muslims. This is made so as to recognize these instances of "speech" a
... Show MoreThis paper presents numerical and experimental stress analyses to evaluate the contact and bending stresses on the teeth of spiral bevel gear drive. Finite Element Method has been adopted as a numerical technique which accomplished basically by using ANSYS software package. The experimental stress analysis has been achieved by using a gear tooth model made of Castolite material which has photoelastic properties. The main goal of this research is detecting the maximum tooth stresses to avoid the severe areas that caused tooth failure and to increase the working life for this type of gear drives.
Process capability provides a quantitative measure for gasoline production conformance to specifications.It was measured throughout four consecutive months of the last quarter of 2011. Results revealed high percentages (up to 44%) of non conforming gasoline blends to Iraqi marketing specifications for petroleum products (2000) by inspecting 122 different samples of Iraqi regular gasoline (RON 85).
Quality cost analysis as an important financial control tool was carried out to evaluate Cost of Quality (COQ) which was large due to non conforming gasoline reached up to (722.8 M.ID) in October. In this research COQ was investigated in order to identify the opportunities of gasoline quality improvements through production process. Also cus
An indoor spraying robot is built in this research to solve numerous challenges associated with manual spraying. The mechanical, hardware and essential technologies used are all detailed and designed. The proposed spraying robot's conceptual design is split into two parts: hardware and software. The mechanical design, manufacturing, electrical, and electronics systems are described in the hardware part, while the control of the robot is described in the software section. This robot's kinematic and dynamic models were developed using three links that move in the x, y, and z directions. The robot was then designed using SolidWorks software to compute each connection's deflection and maximum stresses. The characteristics of the stepper moto
... Show MoreBackground: Maxillary first premolar with wide MOD cavity more susceptible to fracture. The aim of this study was to assess the influence of cavity design for cusp coverage on the fracture resistance of weakened maxillary first premolar restored with CAD/CAM hybrid ceramic versus nanohybide composite. Materials and Methods: Fifty six intact maxillary first premolars of approximately comparable sizes were divided into seven groups eight for each: Group A: Intact teeth (control group); Group B: teeth prepared for MOD inlay; Group C: teeth prepared for MOD onlay covering the lingual cusp; Group D: teeth prepared for MOD covering buccal and lingual cusps ,the previous three groups indirectly restored with nanohybrid composite (3M ESPE Z 250 X
... Show MoreDesign and build a center basins new p-type four mirrors were studied its effect on all parameters evaluating the performance of the solar cell silicon in the absence of a cooling system is switched on and noted that the efficiency of the performance Hzzh cell increased from 11.94 to 21 without cooling either with cooling has increased the efficiency of the
One of the most important features of the Amazon Web Services (AWS) cloud is that the program can be run and accessed from any location. You can access and monitor the result of the program from any location, saving many images and allowing for faster computation. This work proposes a face detection classification model based on AWS cloud aiming to classify the faces into two classes: a non-permission class, and a permission class, by training the real data set collected from our cameras. The proposed Convolutional Neural Network (CNN) cloud-based system was used to share computational resources for Artificial Neural Networks (ANN) to reduce redundant computation. The test system uses Internet of Things (IoT) services through our ca
... Show MoreDigital tampering identification, which detects picture modification, is a significant area of image analysis studies. This area has grown with time with exceptional precision employing machine learning and deep learning-based strategies during the last five years. Synthesis and reinforcement-based learning techniques must now evolve to keep with the research. However, before doing any experimentation, a scientist must first comprehend the current state of the art in that domain. Diverse paths, associated outcomes, and analysis lay the groundwork for successful experimentation and superior results. Before starting with experiments, universal image forensics approaches must be thoroughly researched. As a result, this review of variou
... Show More