Nowadays, internet security is a critical concern; the One of the most difficult study issues in network security is "intrusion detection". Fight against external threats. Intrusion detection is a novel method of securing computers and data networks that are already in use. To boost the efficacy of intrusion detection systems, machine learning and deep learning are widely deployed. While work on intrusion detection systems is already underway, based on data mining and machine learning is effective, it requires to detect intrusions by training static batch classifiers regardless considering the time-varying features of a regular data stream. Real-world problems, on the other hand, rarely fit into models that have such constraints. Furthermore, various uses in the real world, Data distributions in intrusion detection systems, for example, are non-stationary, which produce concept drift over time or non-stationary learning. The word "concept drift" is used to describe the process of changing one's mind about something in an online-supervised learning scenario, the connection between the input data and the target variable changes over time. We define adaptive learning, classify existing concept drift strategies, evaluate the most typical, distinct, and widely used approaches and algorithms, describe adaptive algorithm assessment methodology, and show a collection of examples, all of this is based on the assumption that you have a basic understanding of supervised learning. The survey examines the various aspects of concept drift in a comprehensive manner in order to think about the current fragmented "state-of-the-art". As a result, which intends to give scholars, industry analysts, and practitioners a comprehensive introduction to idea drift adaptability.
The current research is summarized by studying and understanding the imagination and what resulted from it in postmodern arts, specifically Pop Art. The research was focused spatially (America) between the year 1950-1975 AD and it defined the research problem by asking about what factors and variables that established the social imagination in culture Al-Gharbia, which in turn crystallized the Western cultural product to appear in its form, which is historically called "pop art". Two studies were adopted in the second chapter. The first one was the cultural structure of the social imagination. The second topic was concerned with the stylistic diversity of pop art, and the third chapter included research and accreditation procedures. Ther
... Show MoreBackground: Periodontal diseases (PD) are inflammatory conditions of the tissues supporting the teeth, most often gingivitis and periodontitis. Maxillary chronic rhinosinusitis (MCRS) is the inflammation of the maxillary sinuses which is last for at least 12 consecutive weeks duration. Aims of study: Distribution of periodontal diseases among patients with Maxillary chronic rhinosinusitis according to gender and age. Materials and methods: Males and females subjects (25-45 years), divided into two groups; 150 patients suffer from MCRS and 130 subjects without MCRS. Clinical periodontal parameters; Plaque Index (PL.I), Gingival Index (G.I), Probing Pocket Depth (PPD), Clinical Attachment Level (CAL) and Bleeding On Probing (BOP) recorded f
... Show MoreBackground: Oral health is a mirror of general health. During pregnancy, oral health is affected by changes in saliva and oral hygiene measures which may lead to more dental caries.
Objective: Assess oral health status in relation to salivary antimicrobial peptides in pregnant women.
Subjects and Method: This cross sectional study was carried out in different primary health care centers in Rusafa sectors/ Baghdad city. The total sample included was 80 women (their age range from 21-30). The study group consisted of 40 pregnant women: half of them were in the first trimester and others were in third trimester, while the control group included 40 non-pregnant married fem
... Show MoreThe Internet of Things (IoT) has significantly transformed modern systems through extensive connectivity but has also concurrently introduced considerable cybersecurity risks. Traditional rule-based methods are becoming increasingly insufficient in the face of evolving cyber threats. This study proposes an enhanced methodology utilizing a hybrid machine-learning framework for IoT cyber-attack detection. The framework integrates a Grey Wolf Optimizer (GWO) for optimal feature selection, a customized synthetic minority oversampling technique (SMOTE) for data balancing, and a systematic approach to hyperparameter tuning of ensemble algorithms: Random Forest (RF), XGBoost, and CatBoost. Evaluations on the RT-IoT2022 dataset demonstrat
... Show Morein this paper we adopted ways for detecting edges locally classical prewitt operators and modification it are adopted to perform the edge detection and comparing then with sobel opreators the study shows that using a prewitt opreators
Most Internet-tomography problems such as shared congestion detection depend on network measurements. Usually, such measurements are carried out in multiple locations inside the network and relied on local clocks. These clocks usually skewed with time making these measurements unsynchronized and thereby degrading the performance of most techniques. Recently, shared congestion detection has become an important issue in many computer networked applications such as multimedia streaming and
peer-to-peer file sharing. One of the most powerful techniques that employed in literature is based on Discrete Wavelet Transform (DWT) with cross-correlation operation to determine the state of the congestion. Wavelet transform is used as a de-noisin
This research after financial ratios in the detection of fraud to the financial statements published which enables specialists from the work of their studies and their conclusions to obtain the information they seek on the activities of the entity. Has provided researchers what these relics They then field study to test the validity and sincerity of the findings of the suggestions that have been upheld the need to study all financial ratios extracted in general, organized and used in decision-making processes necessary administrative.And that the financial management attention more financial analysis and extraction of financial ratios and compare them with industry standards taken from historical norms
Educational services in Iraq face many problems that have reduced the efficiency of the educational process, as a result of the difficult conditions experienced by educational services in Iraq. This led to the accumulation of these problems and their exacerbation significantly over the years, as there was no fundamental solution to these problems. The study proposes a planning method for managing the educational system in Iraq, especially for the primary and secondary levels, where these negative phenomena are very prominent, especially the deficit in school buildings and the phenomenon of overcrowding in classrooms. &am
... Show MoreThe importance of research is to be considered by highlighting the tax policy in Iraq which extended for successive measurement of the amount of tax receipts for respective periods, the research problem represents security, economic and political issues that Iraq suffered which were very difficult since Nineties of the last century until now that led to a lake of clarity in tax policy trends, volatility in it and finally reflected on the tax revenues increase or decrease. One of the main recommendations of the research is: (The necessity to develop a deliberate strategy for tax policy in Iraq which should take into account financial, economic, and social goals in appropriate way).