{"id":5481,"date":"2024-07-31T21:32:38","date_gmt":"2024-07-31T18:32:38","guid":{"rendered":"https:\/\/en.coeng.uobaghdad.edu.iq\/?p=5481"},"modified":"2024-07-31T21:32:38","modified_gmt":"2024-07-31T18:32:38","slug":"the-college-of-engineering-at-the-university-of-baghdad-discusses-intelligent-computing-techniques-for-network-intrusion-detection","status":"publish","type":"post","link":"https:\/\/en.coeng.uobaghdad.edu.iq\/?p=5481","title":{"rendered":"The College of Engineering at the University of Baghdad Discusses \u201cIntelligent Computing Techniques for Network Intrusion Detection\u201d"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_row][vc_column][vc_column_text]<\/p>\n<p>The College of Engineering at the University of Baghdad witnessed the public discussion of master\u2019s student Marwa Muhammad Obaid from the Department of Electrical Engineering whose thesis was entitled \u201cIntelligent Computing Techniques for Network Intrusion Detection\u201d on Monday, 15<sup>th<\/sup> July 2024, in the discussion room in the Department of Electrical Engineering. The discussion committee was composed of:<\/p>\n<p>&nbsp;<\/p>\n<table>\n<tbody>\n<tr>\n<td width=\"213\">Position status in the committee<\/td>\n<td width=\"213\">Specialty<\/td>\n<td width=\"213\">Name<\/td>\n<\/tr>\n<tr>\n<td width=\"213\">Chairperson<\/td>\n<td width=\"213\">Electrical Engineering \/Control and Computer Engineering<\/td>\n<td width=\"213\">Prof. Dr. Ibraheem Kasim Ibraheem<\/td>\n<\/tr>\n<tr>\n<td width=\"213\">Member<\/td>\n<td width=\"213\">Electrical Engineering \/ Communications and Information Engineering<\/td>\n<td width=\"213\">Prof.Dr. Dheya Jassem Kazem<\/td>\n<\/tr>\n<tr>\n<td width=\"213\">Member<\/td>\n<td width=\"213\">Electrical Engineering\/Computer Engineering<\/td>\n<td width=\"213\">Assist. Prof. Dr. Mahmood Zaki Abdullah<\/td>\n<\/tr>\n<tr>\n<td width=\"213\">Supervisor<\/td>\n<td width=\"213\">Computer Engineering\/Computer Engineering and Information Technology<\/td>\n<td width=\"213\">Assit. Prof. Muna Hadi Saleh<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<p>The research included an intrusion detection system (IDS), as this system has become necessary to secure networks and information from malicious attacks and hackers. In recent years, these systems have evolved significantly thanks to modern technologies such as machine learning (ML) and deep learning (DL). The development of modern intrusion detection systems relies on the use of ML algorithms to analyze large amounts of data and identify anomalous patterns that may indicate the presence of an intrusion. DL can process complex data and extract important features, providing higher accuracy in detecting attacks.<\/p>\n<p>This thesis, used four ML algorithms Naive Bayes (NB), K-Nearest Neighbor (KNN), Adaboost (ADA), Decision Tree (DT), and a Hybrid Deep Learning Intrusion Detection System (HDL-IDS) system for network intrusion detection using a One-Dimensional Convolutional Neural Network (1DCNN) on the UNSW-NB15 dataset and the NLS-KDD dataset. To reduce irrelevant features, three feature selection methods: Analysis of Variance (ANOVA), Mutual Information (MI), and Chi-Square (Ch-2) were used.<\/p>\n<p>The findings from the comparison of the ML algorithms and hybrid deep learning model, using two approaches feature selection and without feature selection, indicate that the HDL-IDS system demonstrates the best performance in terms of accuracy. The accuracy result without feature selection is 99.99 %, precision 0.9999, recall 0.4540, and F1-measure 0.6245 with a time of 67 sec, while with feature selection when using ANOVA and MI, the accuracy is 100%, precision 1.00, recall 0.454, and F1-measure 0.624 with a time of 5sec on binary classification of UNSW-NB15 dataset.<\/p>\n<p>According to the performance metrics and experimental results on multiple classifications on the NSL-KDD dataset, it indicates that the HDL-IDS system shows the best performance in terms of accuracy when compared with the proposed ML algorithms, where the HDL-IDS system achieved an accuracy of 99.99%, precision 0.9999, recall 0.9909. F-measure 0.9909, with a time of 120 sec without feature selection, while with feature selection when using ANOVA achieved an accuracy of 99.89%, precision of 99.15, recall of 0.9915, and F-measure of 0.9916, with a time of 68 sec due to the imbalance in the distribution of categories in the dataset.<\/p>\n<p>After scientific discussion by the members of the discussion committee, listening to the researcher\u2019s defense, and evaluating the thesis, the researcher was awarded a master\u2019s degree in electrical engineering.<\/p>\n<p>&nbsp;<\/p>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column][vc_gallery interval=&#8221;3&#8243; images=&#8221;5483&#8243; img_size=&#8221;large&#8221; css=&#8221;&#8221;][\/vc_column][\/vc_row]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>[vc_row][vc_column][vc_column_text] The College of Engineering at the University of Baghdad witnessed the public discussion of master\u2019s student Marwa Muhammad Obaid &#8230; <a class=\"cz_readmore\" href=\"https:\/\/en.coeng.uobaghdad.edu.iq\/?p=5481\"><i class=\"fa fa-angle-left\" aria-hidden=\"true\"><\/i><span>\u0627\u0644\u0645\u0632\u064a\u062f<\/span><\/a><\/p>\n","protected":false},"author":165,"featured_media":5482,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_lmt_disableupdate":"","_lmt_disable":"","footnotes":""},"categories":[15,31],"tags":[],"class_list":["post-5481","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-electrical-engineering","category-thesis"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.8 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>The College of Engineering at the University of Baghdad Discusses \u201cIntelligent Computing Techniques for Network Intrusion Detection\u201d - College of Engineering<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/en.coeng.uobaghdad.edu.iq\/?p=5481\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The College of Engineering at the University of Baghdad Discusses \u201cIntelligent Computing Techniques for Network Intrusion Detection\u201d - College of Engineering\" \/>\n<meta property=\"og:description\" content=\"[vc_row][vc_column][vc_column_text] The College of Engineering at the University of Baghdad witnessed the public discussion of master\u2019s student Marwa Muhammad Obaid ... \u0627\u0644\u0645\u0632\u064a\u062f\" \/>\n<meta property=\"og:url\" content=\"https:\/\/en.coeng.uobaghdad.edu.iq\/?p=5481\" \/>\n<meta property=\"og:site_name\" content=\"College of Engineering\" \/>\n<meta property=\"article:published_time\" content=\"2024-07-31T18:32:38+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/en.coeng.uobaghdad.edu.iq\/wp-content\/uploads\/sites\/69\/2024\/07\/Picture8.png\" \/>\n\t<meta property=\"og:image:width\" content=\"780\" \/>\n\t<meta property=\"og:image:height\" content=\"585\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"sofia\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"sofia\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/en.coeng.uobaghdad.edu.iq\/?p=5481#article\",\"isPartOf\":{\"@id\":\"https:\/\/en.coeng.uobaghdad.edu.iq\/?p=5481\"},\"author\":{\"name\":\"sofia\",\"@id\":\"https:\/\/en.coeng.uobaghdad.edu.iq\/#\/schema\/person\/deec535872654eef9d1f0ed631b1ac6d\"},\"headline\":\"The College of Engineering at the University of Baghdad Discusses \u201cIntelligent Computing Techniques for Network Intrusion Detection\u201d\",\"datePublished\":\"2024-07-31T18:32:38+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/en.coeng.uobaghdad.edu.iq\/?p=5481\"},\"wordCount\":522,\"publisher\":{\"@id\":\"https:\/\/en.coeng.uobaghdad.edu.iq\/#organization\"},\"image\":{\"@id\":\"https:\/\/en.coeng.uobaghdad.edu.iq\/?p=5481#primaryimage\"},\"thumbnailUrl\":\"https:\/\/en.coeng.uobaghdad.edu.iq\/wp-content\/uploads\/sites\/69\/2024\/07\/Picture8.png\",\"articleSection\":[\"Electrical Engineering\",\"thesis\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/en.coeng.uobaghdad.edu.iq\/?p=5481\",\"url\":\"https:\/\/en.coeng.uobaghdad.edu.iq\/?p=5481\",\"name\":\"The College of Engineering at the University of Baghdad Discusses \u201cIntelligent Computing Techniques for Network Intrusion Detection\u201d - College of Engineering\",\"isPartOf\":{\"@id\":\"https:\/\/en.coeng.uobaghdad.edu.iq\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/en.coeng.uobaghdad.edu.iq\/?p=5481#primaryimage\"},\"image\":{\"@id\":\"https:\/\/en.coeng.uobaghdad.edu.iq\/?p=5481#primaryimage\"},\"thumbnailUrl\":\"https:\/\/en.coeng.uobaghdad.edu.iq\/wp-content\/uploads\/sites\/69\/2024\/07\/Picture8.png\",\"datePublished\":\"2024-07-31T18:32:38+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/en.coeng.uobaghdad.edu.iq\/?p=5481#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/en.coeng.uobaghdad.edu.iq\/?p=5481\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/en.coeng.uobaghdad.edu.iq\/?p=5481#primaryimage\",\"url\":\"https:\/\/en.coeng.uobaghdad.edu.iq\/wp-content\/uploads\/sites\/69\/2024\/07\/Picture8.png\",\"contentUrl\":\"https:\/\/en.coeng.uobaghdad.edu.iq\/wp-content\/uploads\/sites\/69\/2024\/07\/Picture8.png\",\"width\":780,\"height\":585},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/en.coeng.uobaghdad.edu.iq\/?p=5481#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/en.coeng.uobaghdad.edu.iq\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The College of Engineering at the University of Baghdad Discusses \u201cIntelligent Computing Techniques for Network Intrusion Detection\u201d\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/en.coeng.uobaghdad.edu.iq\/#website\",\"url\":\"https:\/\/en.coeng.uobaghdad.edu.iq\/\",\"name\":\"College of Engineering\",\"description\":\"University of Baghdad\",\"publisher\":{\"@id\":\"https:\/\/en.coeng.uobaghdad.edu.iq\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/en.coeng.uobaghdad.edu.iq\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/en.coeng.uobaghdad.edu.iq\/#organization\",\"name\":\"College of Engineering\",\"url\":\"https:\/\/en.coeng.uobaghdad.edu.iq\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/en.coeng.uobaghdad.edu.iq\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/en.coeng.uobaghdad.edu.iq\/wp-content\/uploads\/sites\/69\/2023\/05\/en-logo.png\",\"contentUrl\":\"https:\/\/en.coeng.uobaghdad.edu.iq\/wp-content\/uploads\/sites\/69\/2023\/05\/en-logo.png\",\"width\":500,\"height\":500,\"caption\":\"College of Engineering\"},\"image\":{\"@id\":\"https:\/\/en.coeng.uobaghdad.edu.iq\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.youtube.com\/channel\/UCzbvMdjzsywGIuwY8bhfoWA\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/en.coeng.uobaghdad.edu.iq\/#\/schema\/person\/deec535872654eef9d1f0ed631b1ac6d\",\"name\":\"sofia\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/en.coeng.uobaghdad.edu.iq\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/a17e4b216001de7061fdedda4e7fb71c180292ac8252adc52b77c5e19054eb51?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/a17e4b216001de7061fdedda4e7fb71c180292ac8252adc52b77c5e19054eb51?s=96&d=mm&r=g\",\"caption\":\"sofia\"},\"url\":\"https:\/\/en.coeng.uobaghdad.edu.iq\/?author=165\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The College of Engineering at the University of Baghdad Discusses \u201cIntelligent Computing Techniques for Network Intrusion Detection\u201d - College of Engineering","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/en.coeng.uobaghdad.edu.iq\/?p=5481","og_locale":"en_US","og_type":"article","og_title":"The College of Engineering at the University of Baghdad Discusses \u201cIntelligent Computing Techniques for Network Intrusion Detection\u201d - College of Engineering","og_description":"[vc_row][vc_column][vc_column_text] The College of Engineering at the University of Baghdad witnessed the public discussion of master\u2019s student Marwa Muhammad Obaid ... \u0627\u0644\u0645\u0632\u064a\u062f","og_url":"https:\/\/en.coeng.uobaghdad.edu.iq\/?p=5481","og_site_name":"College of Engineering","article_published_time":"2024-07-31T18:32:38+00:00","og_image":[{"width":780,"height":585,"url":"https:\/\/en.coeng.uobaghdad.edu.iq\/wp-content\/uploads\/sites\/69\/2024\/07\/Picture8.png","type":"image\/png"}],"author":"sofia","twitter_card":"summary_large_image","twitter_misc":{"Written by":"sofia","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/en.coeng.uobaghdad.edu.iq\/?p=5481#article","isPartOf":{"@id":"https:\/\/en.coeng.uobaghdad.edu.iq\/?p=5481"},"author":{"name":"sofia","@id":"https:\/\/en.coeng.uobaghdad.edu.iq\/#\/schema\/person\/deec535872654eef9d1f0ed631b1ac6d"},"headline":"The College of Engineering at the University of Baghdad Discusses \u201cIntelligent Computing Techniques for Network Intrusion Detection\u201d","datePublished":"2024-07-31T18:32:38+00:00","mainEntityOfPage":{"@id":"https:\/\/en.coeng.uobaghdad.edu.iq\/?p=5481"},"wordCount":522,"publisher":{"@id":"https:\/\/en.coeng.uobaghdad.edu.iq\/#organization"},"image":{"@id":"https:\/\/en.coeng.uobaghdad.edu.iq\/?p=5481#primaryimage"},"thumbnailUrl":"https:\/\/en.coeng.uobaghdad.edu.iq\/wp-content\/uploads\/sites\/69\/2024\/07\/Picture8.png","articleSection":["Electrical Engineering","thesis"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/en.coeng.uobaghdad.edu.iq\/?p=5481","url":"https:\/\/en.coeng.uobaghdad.edu.iq\/?p=5481","name":"The College of Engineering at the University of Baghdad Discusses \u201cIntelligent Computing Techniques for Network Intrusion Detection\u201d - College of Engineering","isPartOf":{"@id":"https:\/\/en.coeng.uobaghdad.edu.iq\/#website"},"primaryImageOfPage":{"@id":"https:\/\/en.coeng.uobaghdad.edu.iq\/?p=5481#primaryimage"},"image":{"@id":"https:\/\/en.coeng.uobaghdad.edu.iq\/?p=5481#primaryimage"},"thumbnailUrl":"https:\/\/en.coeng.uobaghdad.edu.iq\/wp-content\/uploads\/sites\/69\/2024\/07\/Picture8.png","datePublished":"2024-07-31T18:32:38+00:00","breadcrumb":{"@id":"https:\/\/en.coeng.uobaghdad.edu.iq\/?p=5481#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/en.coeng.uobaghdad.edu.iq\/?p=5481"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/en.coeng.uobaghdad.edu.iq\/?p=5481#primaryimage","url":"https:\/\/en.coeng.uobaghdad.edu.iq\/wp-content\/uploads\/sites\/69\/2024\/07\/Picture8.png","contentUrl":"https:\/\/en.coeng.uobaghdad.edu.iq\/wp-content\/uploads\/sites\/69\/2024\/07\/Picture8.png","width":780,"height":585},{"@type":"BreadcrumbList","@id":"https:\/\/en.coeng.uobaghdad.edu.iq\/?p=5481#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/en.coeng.uobaghdad.edu.iq\/"},{"@type":"ListItem","position":2,"name":"The College of Engineering at the University of Baghdad Discusses \u201cIntelligent Computing Techniques for Network Intrusion Detection\u201d"}]},{"@type":"WebSite","@id":"https:\/\/en.coeng.uobaghdad.edu.iq\/#website","url":"https:\/\/en.coeng.uobaghdad.edu.iq\/","name":"College of Engineering","description":"University of Baghdad","publisher":{"@id":"https:\/\/en.coeng.uobaghdad.edu.iq\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/en.coeng.uobaghdad.edu.iq\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/en.coeng.uobaghdad.edu.iq\/#organization","name":"College of Engineering","url":"https:\/\/en.coeng.uobaghdad.edu.iq\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/en.coeng.uobaghdad.edu.iq\/#\/schema\/logo\/image\/","url":"https:\/\/en.coeng.uobaghdad.edu.iq\/wp-content\/uploads\/sites\/69\/2023\/05\/en-logo.png","contentUrl":"https:\/\/en.coeng.uobaghdad.edu.iq\/wp-content\/uploads\/sites\/69\/2023\/05\/en-logo.png","width":500,"height":500,"caption":"College of Engineering"},"image":{"@id":"https:\/\/en.coeng.uobaghdad.edu.iq\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.youtube.com\/channel\/UCzbvMdjzsywGIuwY8bhfoWA"]},{"@type":"Person","@id":"https:\/\/en.coeng.uobaghdad.edu.iq\/#\/schema\/person\/deec535872654eef9d1f0ed631b1ac6d","name":"sofia","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/en.coeng.uobaghdad.edu.iq\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/a17e4b216001de7061fdedda4e7fb71c180292ac8252adc52b77c5e19054eb51?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/a17e4b216001de7061fdedda4e7fb71c180292ac8252adc52b77c5e19054eb51?s=96&d=mm&r=g","caption":"sofia"},"url":"https:\/\/en.coeng.uobaghdad.edu.iq\/?author=165"}]}},"modified_by":"sofia","_links":{"self":[{"href":"https:\/\/en.coeng.uobaghdad.edu.iq\/index.php?rest_route=\/wp\/v2\/posts\/5481","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/en.coeng.uobaghdad.edu.iq\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/en.coeng.uobaghdad.edu.iq\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/en.coeng.uobaghdad.edu.iq\/index.php?rest_route=\/wp\/v2\/users\/165"}],"replies":[{"embeddable":true,"href":"https:\/\/en.coeng.uobaghdad.edu.iq\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=5481"}],"version-history":[{"count":0,"href":"https:\/\/en.coeng.uobaghdad.edu.iq\/index.php?rest_route=\/wp\/v2\/posts\/5481\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/en.coeng.uobaghdad.edu.iq\/index.php?rest_route=\/wp\/v2\/media\/5482"}],"wp:attachment":[{"href":"https:\/\/en.coeng.uobaghdad.edu.iq\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=5481"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/en.coeng.uobaghdad.edu.iq\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=5481"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/en.coeng.uobaghdad.edu.iq\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=5481"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}