In recent years, the world witnessed a rapid growth in attacks on the internet which resulted in deficiencies in networks performances. The growth was in both quantity and versatility of the attacks. To cope with this, new detection techniques are required especially the ones that use Artificial Intelligence techniques such as machine learning based intrusion detection and prevention systems. Many machine learning models are used to deal with intrusion detection and each has its own pros and cons and this is where this paper falls in, performance analysis of different Machine Learning Models for Intrusion Detection Systems based on supervised machine learning algorithms. Using Python Scikit-Learn library KNN, Support Vector Machine, Naïve Bayes, Decision Tree, Random Forest, Stochastic Gradient Descent, Gradient Boosting and Ada Boosting classifiers were designed. Performance-wise analysis using Confusion Matrix metric carried out and comparisons between the classifiers were a due. As a case study Information Gain, Pearson and F-test feature selection techniques were used and the obtained results compared to models that use all the features. One unique outcome is that the Random Forest classifier achieves the best performance with an accuracy of 99.96% and an error margin of 0.038%, which supersedes other classifiers. Using 80% reduction in features and parameters extraction from the packet header rather than the workload, a big performance advantage is achieved, especially in online environments.
This paper examined accounting information systems (AIS) as a mediator between small and medium-sized enterprises (SMEs) strategies, including (finance source, administrative innovation, organizational culture, developing capabilities levels of SMEs, information source, development of business managers, and technological innovation) and organizational performance. In this quantitative study, 450 self-administered questionnaires were distributed to the managers and owners of SMEs using purposive sampling. Data were analyzed using the structural equation modeling (SEM) method via SmartPLS3 Software. The study offers empirical findings on the importance of AIS as a mediator, considers various factors, a
ABSTRUCT
In This Paper, some semi- parametric spatial models were estimated, these models are, the semi – parametric spatial error model (SPSEM), which suffer from the problem of spatial errors dependence, and the semi – parametric spatial auto regressive model (SPSAR). Where the method of maximum likelihood was used in estimating the parameter of spatial error ( λ ) in the model (SPSEM), estimated the parameter of spatial dependence ( ρ ) in the model ( SPSAR ), and using the non-parametric method in estimating the smoothing function m(x) for these two models, these non-parametric methods are; the local linear estimator (LLE) which require finding the smoo
... Show MoreThe aim of the research is to study the comparison between (ARIMA) Auto Regressive Integrated Moving Average and(ANNs) Artificial Neural Networks models and to select the best one for prediction the monthly relative humidity values depending upon the standard errors between estimated and observe values . It has been noted that both can be used for estimation and the best on among is (ANNs) as the values (MAE,RMSE, R2) is )0.036816,0.0466,0.91) respectively for the best formula for model (ARIMA) (6,0,2)(6,0,1) whereas the values of estimates relative to model (ANNs) for the best formula (5,5,1) is (0.0109, 0.0139 ,0.991) respectively. so that model (ANNs) is superior than (ARIMA) in a such evaluation.
The researcher highlighted in his research on an important subject that people need, which is the excuse of ignorance in Islamic law. , As the flag of light and ignorance of darkness. Then the researcher lameness of the reasons for research in this subject as it is one of the assets that should be practiced by the ruler and the judge and the mufti and the diligent and jurisprudent, but the public should identify the issues that ignore ignorance and issues that are not excused even if claimed ignorance.
Then the researcher concluded the most important results, and recommendations that he wanted to set scientific rules for students of science and Muslims in general, to follow the issues of legitimacy and learn its provisions and i
Deepfake is a type of artificial intelligence used to create convincing images, audio, and video hoaxes and it concerns celebrities and everyone because they are easy to manufacture. Deepfake are hard to recognize by people and current approaches, especially high-quality ones. As a defense against Deepfake techniques, various methods to detect Deepfake in images have been suggested. Most of them had limitations, like only working with one face in an image. The face has to be facing forward, with both eyes and the mouth open, depending on what part of the face they worked on. Other than that, a few focus on the impact of pre-processing steps on the detection accuracy of the models. This paper introduces a framework design focused on this asp
... Show MoreIn wireless broadband communications using single-carrier interleave division multiple access (SC-IDMA) systems, efficient multiuser detection (MUD) classes that make use of joint hybrid decision feedback equalization (HDFE)/ frequency decision-feedback equalization (FDFE) and interference cancellation (IC) techniques, are proposed in conjunction with channel coding to deal with several users accessing the multipath fading channels. In FDFE-IDMA, the feedforward (FF) and feedback (FB) filtering operations of FDFE, which use to remove intersymbol interference (ISI), are implemented by Fast Fourier Transforms (FFTs), while in HDFE-IDMA the only FF filter is implemented by FFTs. Further, the parameters involved in the FDFE/
... Show MoreIn this study, a mathematical model for the kinetics of solute transport in liquid membrane systems (LMSs) has been formulated. This model merged the mechanisms of consecutive and reversible processes with a “semi-derived” diffusion expression, resulting in equations that describe solute concentrations in the three sections (donor, acceptor and membrane). These equations have been refined into linear forms, which are satisfying in the special conditions for simplification obtaining the important kinetic constants of the process experimentally.
There are many studies dealt with handoff management in mobile communication systems and some of these studies presented handoff schemes to manage this important process in cellular network. All previous schemes used relative signal strength (RSS) measurements. In this work, a new proposed handoff scheme had been presented depending not only on the RSS measurements but also used the threshold distance and neighboring BSS power margins in order to improve the handoff management process. We submitted here a threshold RSS as a condition to make a handoff when a mobile station moves from one cell to another this at first, then we submitted also a specified margin between the current received signal and the ongoing BS's received signal must be s
... Show MoreThis article explores the process of VGI collection by assessing the relative usability and accuracy of a range of different methods (Smartphone GPS, Tablet, and analogue maps) for data collection amongst different demographic and educational groups, and in different geographical contexts. Assessments are made of positional accuracy, completeness, and data collectors’ experiences with reference to the official cadastral data and the administration system in a case-study region of Iraq. Ownership data was validated by crowd agreement. The result shows that successful VGI projects have access to varying data collection methods.