With the proliferation of both Internet access and data traffic, recent breaches have brought into sharp focus the need for Network Intrusion Detection Systems (NIDS) to protect networks from more complex cyberattacks. To differentiate between normal network processes and possible attacks, Intrusion Detection Systems (IDS) often employ pattern recognition and data mining techniques. Network and host system intrusions, assaults, and policy violations can be automatically detected and classified by an Intrusion Detection System (IDS). Using Python Scikit-Learn the results of this study show that Machine Learning (ML) techniques like Decision Tree (DT), Naïve Bayes (NB), and K-Nearest Neighbor (KNN) can enhance the effectiveness of an Intrusi
... Show MoreThis current research aims to reveal the difference between the levels of teaching expertise of physics teachers according to the years of service by answering the following question: does the educational skill level of physics teachers work according to the service? The sample of the study consisted of (225) physics teachers by (125) females (56%), and (100) males (44%), distributed on (4) education directorates in Baghdad governorate on both sides of al-Karkh and al-Rusafa. In order to achieve the aim of the study, the researcher prepared a note card for expertise teaching, consisting of (39) paragraphs distributed into (5) fields. The apparent validity and reliability of the card were verified through an agreement (the researcher hers
... Show MoreThis paper proposes two hybrid feature subset selection approaches based on the combination (union or intersection) of both supervised and unsupervised filter approaches before using a wrapper, aiming to obtain low-dimensional features with high accuracy and interpretability and low time consumption. Experiments with the proposed hybrid approaches have been conducted on seven high-dimensional feature datasets. The classifiers adopted are support vector machine (SVM), linear discriminant analysis (LDA), and K-nearest neighbour (KNN). Experimental results have demonstrated the advantages and usefulness of the proposed methods in feature subset selection in high-dimensional space in terms of the number of selected features and time spe
... Show MoreFive levels of Zn-EDTA fertilizer and foliar application of boron were used to study the local rice response through studying of some vegetative and reproductive growth characters, by conducting two field experiments at Kanipanka Agricultural Research Station during the summer season of 2004 by using RCBD with three replications. Significant differences were found in studied characters, there were increase in the number of days from seeding to 50% flowering (94.330-96.233) days, from 50% flowering to physiological maturity (37.50-38.28) days, plant height (82.50-91.423) cm and LAI (5.441-7.525). Reproductive characters such as number of grains panicle-1 (74.11-85.88), number of panicles m-2 (321.00-426.083), biological yield (8166.166-11082
... Show MoreA simple, economic, rapid, reliable, and stability-indicating high-performance liquid chromatography (HPLC) method has been developed and validated for the simultaneous determination of paracetamol (PCM) and caffeine (CF) in solid dosage form. The chromatographic separations were achieved with a Waters Symmetry® C18 column (5 μm, 4.6 × 150 mm), using a mixture of methanol and water (40:60, v/v) as a mobile phase, under isocratic elution mode with a flow rate of 0.8 mL/min, and ultraviolet (UV) detection was set at 264 nm. The oven temperature for the column was set and maintained at 35 °C. The method was validated according to International Conference on Harmonization (ICH) guidelines, and it demonstrated excellent linearity, wi
... Show MoreBackground: Oral health represents an important base for human well-being; the heath of the body begins from oral cavity. Great deal has been applied to increase knowledge in the field of oral health in order to develop appropriate preventive program. This study was conducted in order to estimate the percentage and severity of dental caries and gingivitis among children attending Preventive Department in Collage of Dentistry, University of Baghdad and to determine dental treatment need for those patients, further more to study the relation of these variables with dental knowledge. Materials and Methods: The study group consists of 163 children with an age ranged from 6 to 14 years, who attended the preventive clinic for the first time to be
... Show MoreMental disorders (MDs) are a common problem in Primary Health Care Centers (PHCCs). Many people with serious MDs are challenged by symptoms and disabilities that result from the disease and by stereotypes and prejudice due to misconceptions about mental illness. This study aims at evaluating the knowledge, and attitude toward mental health concepts and services and causes of the reluctance to seek those services among people attending PHCCs. A descriptive cross-sectional study was conducted. The random sampling technique was used to include (10) of Directorates of Health (DoHs) coverage north, middle, and south of Iraq. The study was executed in (50) selected PHCs, (5) PHCCs in each DoH involved randomly selected (30) people attending th
... Show MoreABSTRACT Background: Polycystic ovary syndrome (PCOS) is one of the most common endocrine disorders affecting women in their reproductive age.It is characterized by anovulation or oligo-ovulation and hyperandrogensim.Androgen excess is the central defect in polycystic ovary syndrome. It is a complex disorder affects general health in addition to oral health.This study aimed to assess the gingival health status among a group of women with polycystic ovary syndrome as well as to estimate the levels of salivaryfree testosterone in unstimulated saliva in relation to gingival health condition. Materials and methods: Sixty two women with an age range 20-25 years old and with a body mass index range18.5-24.9 (normal weight) were included in this s
... Show MoreThe Internet of Things (IoT) has significantly transformed modern systems through extensive connectivity but has also concurrently introduced considerable cybersecurity risks. Traditional rule-based methods are becoming increasingly insufficient in the face of evolving cyber threats. This study proposes an enhanced methodology utilizing a hybrid machine-learning framework for IoT cyber-attack detection. The framework integrates a Grey Wolf Optimizer (GWO) for optimal feature selection, a customized synthetic minority oversampling technique (SMOTE) for data balancing, and a systematic approach to hyperparameter tuning of ensemble algorithms: Random Forest (RF), XGBoost, and CatBoost. Evaluations on the RT-IoT2022 dataset demonstrat
... Show More