In recent years, the world witnessed a rapid growth in attacks on the internet which resulted in deficiencies in networks performances. The growth was in both quantity and versatility of the attacks. To cope with this, new detection techniques are required especially the ones that use Artificial Intelligence techniques such as machine learning based intrusion detection and prevention systems. Many machine learning models are used to deal with intrusion detection and each has its own pros and cons and this is where this paper falls in, performance analysis of different Machine Learning Models for Intrusion Detection Systems based on supervised machine learning algorithms. Using Python Scikit-Learn library KNN, Support Vector Machine, Naïve Bayes, Decision Tree, Random Forest, Stochastic Gradient Descent, Gradient Boosting and Ada Boosting classifiers were designed. Performance-wise analysis using Confusion Matrix metric carried out and comparisons between the classifiers were a due. As a case study Information Gain, Pearson and F-test feature selection techniques were used and the obtained results compared to models that use all the features. One unique outcome is that the Random Forest classifier achieves the best performance with an accuracy of 99.96% and an error margin of 0.038%, which supersedes other classifiers. Using 80% reduction in features and parameters extraction from the packet header rather than the workload, a big performance advantage is achieved, especially in online environments.
The present study focused mainly on the analysis of stiffened and unstiffened composite laminated plates subjected to buckling load. Analytical, numerical and experimental analysis for different cases has been considered. The experimental investigation is to manufacture the laminates and to find mechanical properties of glass-polyester such as longitudinal, transverse young modulus, shear modulus. The compressive test was carried to find the critical buckling load of plate. The design parameters of the laminates such as aspect ratio, thickness ratio, boundary conditions and number of stiffeners were investigated using high order shear deformation theory (HOST) and Finite element coded by ANSYS .The main conclusion was the buckling load c
... Show MoreIn this study, the induced splined shaft teeth contact and bending stresses have been investigated numerically using finite element method(Ansys package version 11.0) with changing the most effecting design parameter,(pressure angle, teeth number, fillet radius and normal module), for internal and external splined shaft. Experimental work has been achieved using two dimensional photoelastic techniques to get the contact and bending stresses; the used material is Bakelite sheet type “PSM-4”.
The results of numerical stress analysis indicate that, the increasing of the pressure angle and fillet radius decrease the bending stress and increase the contact stress for both internal and external spline shaft teeth while the increasing of
In this work, an investigation for the dynamic analysis of thin composite cylindrical and spherical shells is presented. The analytical solution is based upon the higher order shear deformation theory of elastic shells from which the developed equations are derived to deal with orthotropic layers. This will cover the determination of the fundamental natural frequencies and mode shapes for simply supported composites cylindrical and spherical shells.
The analytical results obtained by using the derived equations were confirmed by the finite element technique using the well known Ansys package. The results have shown a good agreement with a maximum percentage of discrepancy, which gives a confidence o
... Show MoreBackground: The rapid evolution of Artificial Intelligence (AI) has significantly influenced Education, demonstrating substantial potential to transform traditional teaching and learning methods. AI reshapes teacher-student interactions and the relationship with knowledge. Objective: To analyze the potential benefits, ethical challenges, and limitations of AI in Education based on recent scientific literature, emphasizing the balance between technology and human interaction. Methods: A documentary research approach with a descriptive focus was employed, following the PRISMA protocol for systematic reviews. The search strategy involved analyzing evidence from 18 scientific articles published within the last six years. Results:AI o
... Show MoreThere are different types of corruptions such as administrative, political, economic and financial corruption. The corruption forms also varied such as bribery, nepotism and extortion. All types and forms of corruption play significant role in the all economic variables generally and on investments in particular, and the corruption used to be an intermediate means in reducing the rate of economic growth. The corruption contributes in reducing the domestic investments via pay bribery by investors to officials’ persons for supplemental contracts and tenders which finally leads to reduction in the investment efficiency. The corruption also contributes in rise of operational costs for the investment projects. In additio
... Show MoreThe purpose of this paper is to statistically classify and categorize Building Information Modelling (BIM)-Facility Management (FM) publications in order to extract useful information related to the adoption and use of BIM in FM.
This study employs a quantitative approach using science mapping techniques to examine BIM-FM publications using Web of Science (WOS) database for the period between 2000 and April 2018.
The findi
ABSTRACT this paper extends the literature on the elements and effect of financial literacy by investigating the elements of financial literacy and the impact of financial literacy on financial inclusion and savings. This research confirms the results of researches of other economies but exposes some dissimilarities as well. The principal factors of financial literacy are discovered to be government efficiency, educational level, income, economic performance and infrastructure. Both education levels and financial literacy are found to be meaningfully and positively linked to financial inclusion and savings in G20 economies
In this paper, the probabilistic behavior of plain concrete beams subjected to flexure is studied using a continuous mesoscale model. The model is two-dimensional where aggregate and mortar are treated as separate constituents having their own characteristic properties. The aggregate is represented as ellipses and generated under prescribed grading curves. Ellipses are randomly placed so it requires probabilistic analysis for model using the Monte Carlo simulation with 20 realizations to represent geometry uncertainty. The nonlinear behavior is simulated with an isotropic damage model for the mortar, while the aggregate is assumed to be elastic. The isotropic damage model softening be
Abstract
Robotics manipulators with structural flexibility provide an attractive alternative to rigid robotics manipulators for many of the new and evolving applications in robotics. In certain applications their use is unavoidable. The increased complexity in modeling and control of such manipulators is offset by desirable performance enhancements in some respects. In this paperthe single- link flexible robotics manipulator was designed and implemented from Perspex and designed with 0.5 m length , 0.02 m width and with 0.004 m thickness with mass located at the tip. There are four subsystems; motion, control, accelerometer and gyro and a host computer subsystem. The work principle of single-link robotics manipul
... Show MoreThe last decade of this 20th century provides a wide spread of applications of one of the computer techniques, which is called Fuzzy Logic. This technique depends mainly on the fuzzy set theory, which is considered as a general domain with respect to the conventional set theory. This paper presents in initiative the fuzzy sets theory and fuzzy logic as a complete mathematics system. Here it was explained the concept of fuzzy set and defined the operations of fuzzy logic. It contains eleven operations beside the other operations which related to fuzzy algebra. Such search is considered as an enhancement for supporting the others waiting search activities in this field.