660 research outputs found

    A COMPARISON OF MACHINE LEARNING TECHNIQUES: E-MAIL SPAM FILTERING FROM COMBINED SWAHILI AND ENGLISH EMAIL MESSAGES

    Get PDF
    The speed of technology change is faster now compared to the past ten to fifteen years. It changes the way people live and force them to use the latest devices to match with the speed. In communication perspectives nowadays, use of electronic mail (e-mail) for people who want to communicate with friends, companies or even the universities cannot be avoided. This makes it to be the most targeted by the spammer and hackers and other bad people who want to get the benefit by sending spam emails. The report shows that the amount of emails sent through the internet in a day can be more than 10 billion among these 45% are spams. The amount is not constant as sometimes it goes higher than what is noted here. This indicates clearly the magnitude of the problem and calls for the need for more efforts to be applied to reduce this amount and also minimize the effects from the spam messages. Various measures have been taken to eliminate this problem. Once people used social methods, that is legislative means of control and now they are using technological methods which are more effective and timely in catching spams as these work by analyzing the messages content. In this paper we compare the performance of machine learning algorithms by doing the experiment for testing English language dataset, Swahili language dataset individual and combined two dataset to form one, and results from combined dataset compared them with the Gmail classifier. The classifiers which the researcher used are Naïve Bayes (NB), Sequential Minimal Optimization (SMO) and k-Nearest Neighbour (k-NN). The results for combined dataset shows that SMO classifier lead the others by achieve 98.60% of accuracy, followed by k-NN classifier which has 97.20% accuracy, and Naïve Bayes classifier has 92.89% accuracy. From this result the researcher concludes that SMO classifier can work better in dataset that combined English and Swahili languages. In English dataset shows that SMO classifier leads other algorism, it achieved 97.51% of accuracy, followed by k-NN with average accuracy of 93.52% and the last but also good accuracy is Naïve Bayes that come with 87.78%. Swahili dataset Naïve Bayes lead others by getting 99.12% accuracy followed by SMO which has 98.69% and the last was k-NN which has 98.47%

    Retracing a Historical Waterway and its Impact on the Community Life of Tangail City, Bangladesh

    Get PDF
    Modern urbanism is consuming significant features of the land comprehensively to accommodate the massive population to accelerate economic growth. The navigation system of the Bengal Delta is one of the most affluent and beneficiary features in Bangladesh. Tangail is a city near the capital of Bangladesh (Dhaka) situated on the bank of the Louhojong River. In the colonial period, there was an essential canal through the town, which inspired and shaped the core layout of the city. Several historically important pieces of architecture were also built on both sides of the canal. This study traces the lost navigation and only historically important riparian landscape, architecture, and community spaces, which was spatially connected by the water source. The study emphasizes social and urban interaction with landscape and architecture. It takes the help of mapping and qualitative research to simulate the community activities of the colonial city. The research illustrates the impact of a water source on a community-responsive city. An analysis of how the city consumed the most important historical evidence can be visualized through illustrations based on the demonstrations of a local history-conserving organization and the evidences collected from local inhabitants

    Investigating EFL Teachers' Attitudes Towards the Use of Authentic Materials in Teaching English in Iraqi Kurdistan Region

    Get PDF
    Thisstudy investigates Kurdish EFL teachers' attitudestowardsthe use of authentic materials in EFL classroom. To achieve the goals of this study, a questionnaire is used to elicit the required data. The participants of the study consist of 40 EFL teachers (males and females) from different secondary schools in Akre town, Kurdistan Region of Iraq. The findings of the study reveal that Kurdish EFL teachers have a positive attitude towards introducing and applying authentic materials to learners. Moreover, the findings show that the Kurdish EFL teachers' preferences of using authentic materials in their classes do not differ according to their teaching experience. Finally, the findings of the study are discussed and recommendations for further research are provided

    Spatial variations of rain intensity over a short length propagation for 5G links based on a rain gauge network

    Get PDF
    Millimeter-wave (mm-wave) frequency range is among operating bands designated for terrestrial 5G networks. A critical challenge of link-budgeting in mm-wave 5G networks is the precise estimation of rain attenuation for short-path links. The difficulties are further amplified in tropical and subtropical regions where the rainfall rate has a higher intensity. Different models have been proposed to predict rain attenuation. The distance factor is an important parameter in predicting total attenuation from specific rain attenuation. This study investigates the distance factor based on rain gauge networks and measured rain attenuation at 26 GHz for a 300 m link in Malaysia. Considerable discrepancies between available models were observed especially when applied for shorter path links. Also, significant variability of rain intensity is observed from the rain gauge network. This study recommends further investigation of the distance factor for a shorter link. Hence, a measurement campaign incorporating rain gauge networks was established to examine spatial variations of rain intensity over a less than 1 km link. The motivation is to develop a suitable distance factor model for 5G mm-wave propagation

    Brand perceptions among school children

    Get PDF
    This paper aims to explore the perception of children towards brand consciousness by using drawings and open-ended questions. A total of 20 primary school were requested to draw what they think about two statements given related to a person with branded materials and a person without branded materials. After drawing, respondents were personally interviewed regarding belongings of branded goods with cheerfulness, friendship, behaviour characters and desire for belongings. Results from the analysis of the drawings and interviews indicate that that there are significant differences in the children perception of someone with or without branded materials. Based on these findings, one hypothesis was proposed about perception of children with regard the knowledge of brand awareness

    Auto-Configuration of ACL Policy in Case of Topology Change in Hybrid SDN

    Get PDF
    © 2016 IEEE. Software-defined networking (SDN) has emerged as a new network architecture, which decouples both the control and management planes from data plane at forwarding devices. However, SDN deployment is not widely adopted due to the budget constraints of organizations. This is because organizations are always reluctant to invest too much budget to establish a new network infrastructure from scratch. One feasible solution is to deploy a limited number of SDN-enabled devices along with traditional (legacy) network devices in the network of an organization by incrementally replacing traditional network by SDN, which is called hybrid SDN (Hybrid SDN) architecture. Network management and control in Hybrid SDN are vital tasks that require significant effort and resources. Manual handling of these tasks is error prone. Whenever network topology changes, network policies (e.g., access control list) configured at the interfaces of forwarding devices (switches/routers) may be violated. That creates severe security threats for the whole network and degrades the network performance. In this paper, we propose a new approach for Hybrid SDN that auto-detects the interfaces of forwarding devices and network policies that are affected due to change in network topology. In the proposed approach, we model network-wide policy and local policy at forwarding device using a three-tuple and a six-tuple, respectively. We compute graph to represent the topology of the network. By using graph difference technique, we detect a possible change in topology. In the case of topology change, we verify policy for updated topology by traversing tree using six-tuple. If there is any violation in policy implementation, then affected interfaces are indicated and policies that need to be configured are also indicated. Then, policies are configured on the updated topology according to specification in an improved way. Simulation results show that our proposed approach enhances the network efficiency in term of successful packet delivery ratio, the ratio of packets that violated the policy and normalized overhead

    A Novel DNA Sequence Approach for Network Intrusion Detection System Based on Cryptography Encoding Method

    Get PDF
    Abstract— A novel method for Network Intrusion Detection System (NIDS) has been proposed, based on the concept of how DNA sequence detects disease as both domains have similar conceptual method of detection. Three important steps have been proposed to apply DNA sequence for NIDS: convert the network traffic data into a form of DNA sequence using Cryptography encoding method; discover patterns of Short Tandem Repeats (STR) sequence for each network traffic attack using Teiresias algorithm; and conduct classification process depends upon STR sequence based on Horspool algorithm. 10% KDD Cup 1999 data set is used for training phase. Correct KDD Cup 1999 data set is used for testing phase to evaluate the proposed method. The current experiment results show that the proposed system has obtained good results and these results are equal to 86.36%, 49.69%, and 77.65% for detection rate, false alarm rate and accuracy respectively. These results are considered as a better result when it is compared with the other previous basic algorithms. It is possible to conclude that DNA sequence has potential for NIDS solution and it has potential improvement using a better encoding method

    E-Learning Management System for Secondary School in Malaysia.

    Get PDF
    With the advancement of Information communication Technology in Malaysia, teachers should take advantage to upgrade their teaching techniques. Students should be allowed to learn anytime. anywhere and at their own peace. Teachers should be able to keep a collection of test/tutorial questions online

    Antibiotic Susceptibility Pattern, Molecular Characterization of Virulence Genes among Pseudomonas Aeruginosa Isolated from Burn Patients

    Get PDF
    Abstract In this research a total of 150 samples were obtained from burn and wound patients admitted to the West Erbil Emergence Hospital during period from September 2020 to January 2021. Through cultural, morphological features, biochemical testing and Vitek’s 2 compact systems, 40 isolates of P. aeruginosa have been identified. P. aeruginosa produced various pigments, including blue / green, and yellow / green. The iso1ates of P. aeruginosa were subjected to 14 different antibiotics. Impenim was the most effective antimicrobial agents against all P. aerugionsa isolates, and most of isolates showed high resistance degree to Ampicillin 100%, Chloramphenicol 100%, amoxicillin-clavulanic acid 100%, Cefotaxime 100% and Penicillin 100% while for Aztreonam 32.5%, Meropenem 42.5%, Tobramycin 45%, Gentamycin 45%, Amikacin 45%, Ciprofloxacillin 62.5%, ceftazidime 67.5, % Tetracycline 80%. All Psudomonas aeruginosa isolates were screened using Multiplex polymerase chain reaction (PCR) to check for the presence of (Pvda, LasB, Protease, exoA, exoT, exoU and plch) on its genomic DNA. The findings have shown that (Pvda was 55%, LasB 75%, Protease 65%, exoA 60%, exoT 75%, exoU 60% and, plch 55%) of isolates harbored these genes as a virulence genes

    El tratamiento jurídico y legal de la libertad e indemnidad sexual en el Código Penal peruano

    Get PDF
    En la presente tesis se abarca el tema polémico referido al tema de “Cual sería la edad idónea conforme a los lineamientos doctrinales referidos en que la persona que ejerza su libertad sexual debe hacerlo en plena capacidad física y psíquica, es decir que aquella persona pueda comprender lo que implica el desenvolvimiento sexual. A pesar de que el legislador ha considerado que la edad de 14 años seria el nivel o tope limite, además abarcándose en la sociología como ciencia auxiliar, ya que también vemos este rezago configurado en el antiguo código de Murcia, siendo base para ir construyendo el derecho penal como ciencia jurídica. No obstante, los estudios psicológicos que vendrían a ser otra ciencia auxiliadora para la dogmática penal, han demostrado que una persona a los 14 años alcanza un desarrollo físico completo o madurez sexual física más no culmen en el ámbito psíquico y psicológico, y por lo tanto cierta carencia en este requisito primordial. La adolescencia intermedia es en donde se copula tanto el ámbito físico como el psicológico, por lo que pretendemos el regreso al art 173 193 in 3 en base a la edad idónea de los 16 años (adolescencia intermedia) basándonos en el voto del Magistrado Vergara Gotelli. Finalmente se efectuará un análisis del voto de discordia del Magistrado Vergara Gotelli a fin de entender por qué es importante el regreso del artículo 173 inc. 3 del Código Penal. En base a la edad propuesta
    corecore