Nowadays, internet security is a critical concern; the One of the most difficult study issues in network security is "intrusion detection". Fight against external threats. Intrusion detection is a novel method of securing computers and data networks that are already in use. To boost the efficacy of intrusion detection systems, machine learning and deep learning are widely deployed. While work on intrusion detection systems is already underway, based on data mining and machine learning is effective, it requires to detect intrusions by training static batch classifiers regardless considering the time-varying features of a regular data stream. Real-world problems, on the other hand, rarely fit into models that have such constraints. Furthermore, various uses in the real world, Data distributions in intrusion detection systems, for example, are non-stationary, which produce concept drift over time or non-stationary learning. The word "concept drift" is used to describe the process of changing one's mind about something in an online-supervised learning scenario, the connection between the input data and the target variable changes over time. We define adaptive learning, classify existing concept drift strategies, evaluate the most typical, distinct, and widely used approaches and algorithms, describe adaptive algorithm assessment methodology, and show a collection of examples, all of this is based on the assumption that you have a basic understanding of supervised learning. The survey examines the various aspects of concept drift in a comprehensive manner in order to think about the current fragmented "state-of-the-art". As a result, which intends to give scholars, industry analysts, and practitioners a comprehensive introduction to idea drift adaptability.
Praise be to God alone, and prayers and peace be upon the one after whom there is no prophet, and after:
This is a regular judicial search for the issuance, validity, and cancellation of regulations in the Saudi system. It came in an introduction and four demands and a conclusion of the most important results, then a list of the most important sources and references, in which I presented: A brief study on the issuance of regulations in the Kingdom of Saudi Arabia and the stages that they pass through, their validity and application, and the rules that govern this system in terms of people, places and times, then canceling and amending regulations And its rulings, I referred to it to the original sources approved in this section,
... Show MoreThe current article focuses on studying the social organization reality of the Iraqi society; it aims to construct an Iraqi organized personality that believe in the principles of Islamic religion by making use of the sociology thoughts in explaining the strength of social organization, and the causes of social deviance in attempt of decreasing the deviance and strengthening the cohesion of Iraqi character.
The researchers put forward some questions: to what extent the western theoretical pattern can succeed in explaining the social organization of the Iraqi society? What is the more appropriate western theory for diagnosing the cohesion and deviance of the society? What is the s
... Show MoreThis study compared in vitro the microleakage of a new low shrink silorane-based posterior composite (Filtek™ P90) and two methacrylate-based composites: a packable posterior composite (Filtek™ P60) and a nanofill composite (Filtek™ Supreme XT) through dye penetration test. Thirty sound human upper premolars were used in this study. Standardized class V cavities were prepared at the buccal surface of each tooth. The teeth were then divided into three groups of ten teeth each: (Group 1: restored with Filtek™ P90, Group 2: restored with Filtek™ P60, and Group 3: restored with Filtek™ Supreme XT). Each composite system was used according to the manufacturer's instructions with their corresponding adhesive systems. The teeth were th
... Show MoreThis paper presents an approach to license plate localization and recognition. A proposed method is designed to control the opening of door gate based on the recognition of the license plates number in Iraq. In general the system consists of four stages; Image capturing, License plate cropping, character segmentation and character recognition. In the first stage, the vehicle photo is taken from standard camera placed on the door gate with a specific distance from the front of vehicle to be processed by our system. Then, the detection method searches for the matching of the license plate in the image with a standard plate. The segmentation stage is performed by is using edge detection. Then character recognition, done by comparing with templ
... Show MoreIntroduction: Carrier-based gutta-percha is an effective method of root canal obturation creating a 3-dimensional filling; however, retrieval of the plastic carrier is relatively difficult, particularly with smaller sizes. The purpose of this study was to develop composite carriers consisting of polyethylene (PE), hydroxyapatite (HA), and strontium oxide (SrO) for carrier-based root canal obturation. Methods: Composite fibers of HA, PE, and SrO were fabricated in the shape of a carrier for delivering gutta-percha (GP) using a melt-extrusion process. The fibers were characterized using infrared spectroscopy and the thermal properties determined using differential scanning calorimetry. The elastic modulus and tensile strength tests were dete
... Show MoreThe work in this paper focuses on the system quality of direct and coherent communication system for two computers. A system quality is represented by Signal to Noise ratio (SNR) and Bit Error Rate (BER). First part of the work includes implementation of direct optical fiber communication system and measure the system quality .The second part of the work include implementation both the( homodyne and heterodyne)coherent optical fiber communication system and measure the system quality . Laser diode 1310 nm wavelength with its drive circuit used in the transmitter circuit . A single mode of 62.11 km optical fiber is selected as transmission medium . A PIN photo detector is used in the receiver circuit. The optical D-coupler was u
... Show MorePortable devices such as smartphones, tablet PCs, and PDAs are a useful combination of hardware and software turned toward the mobile workers. While they present the ability to review documents, communicate via electronic mail, appointments management, meetings, etc. They usually lack a variety of essential security features. To address the security concerns of sensitive data, many individuals and organizations, knowing the associated threats mitigate them through improving authentication of users, encryption of content, protection from malware, firewalls, intrusion prevention, etc. However, no standards have been developed yet to determine whether such mobile data management systems adequately provide the fu
... Show More