Preferred Language
Articles
/
-xape4cBVTCNdQwCNFM6
Static Analysis Based Behavioral API for Malware Detection using Markov Chain
...Show More Authors

Researchers employ behavior based malware detection models that depend on API tracking and analyzing features to identify suspected PE applications. Those malware behavior models become more efficient than the signature based malware detection systems for detecting unknown malwares. This is because a simple polymorphic or metamorphic malware can defeat signature based detection systems easily. The growing number of computer malwares and the detection of malware have been the concern for security researchers for a large period of time. The use of logic formulae to model the malware behaviors is one of the most encouraging recent developments in malware research, which provides alternatives to classic virus detection methods. To address the limitation of traditional AVs, we proposed a virus detection system based on extracting Application Program Interface (API) calls from virus behaviors. The proposed research uses static analysis of behavior-based detection mechanism without executing of software to detect viruses at user mod by using Markov Chain.

Publication Date
Thu Aug 31 2023
Journal Name
Journal Européen Des Systèmes Automatisés​
An IoT and Machine Learning-Based Predictive Maintenance System for Electrical Motors
...Show More Authors

The rise of Industry 4.0 and smart manufacturing has highlighted the importance of utilizing intelligent manufacturing techniques, tools, and methods, including predictive maintenance. This feature allows for the early identification of potential issues with machinery, preventing them from reaching critical stages. This paper proposes an intelligent predictive maintenance system for industrial equipment monitoring. The system integrates Industrial IoT, MQTT messaging and machine learning algorithms. Vibration, current and temperature sensors collect real-time data from electrical motors which is analyzed using five ML models to detect anomalies and predict failures, enabling proactive maintenance. The MQTT protocol is used for efficient com

... Show More
View Publication
Scopus (36)
Crossref (25)
Scopus Crossref
Publication Date
Sun Oct 01 2023
Journal Name
Ieee Transactions On Industrial Electronics
Singular Perturbation-Based Adaptive Integral Sliding Mode Control for Flexible Joint Robots
...Show More Authors

The flexible joint robot (FJR) typically experiences parametric variations, nonlinearities, underactuation, noise propagation, and external disturbances which seriously degrade the FJR tracking. This article proposes an adaptive integral sliding mode controller (AISMC) based on a singular perturbation method and two state observers for the FJR to achieve high performance. First, the underactuated FJR is modeled into two simple second-order fast and slow subsystems by using Olfati transformation and singular perturbation method, which handles underactuation while reducing noise amplification. Then, the AISMC is proposed to effectively accomplish the desired tracking performance, in which the integral sliding surface is designed to reduce cha

... Show More
View Publication
Scopus (68)
Crossref (62)
Scopus Clarivate Crossref
Publication Date
Wed Mar 01 2023
Journal Name
Journal Of Engineering
A An Authentication and Access Control Model for Healthcare based Cloud Services
...Show More Authors

Electronic Health Record (EHR) systems are used as an efficient and effective method of exchanging patients’ health information with doctors and other key stakeholders in the health sector to obtain improved patient treatment decisions and diagnoses. As a result, questions regarding the security of sensitive user data are highlighted. To encourage people to move their sensitive health records to cloud networks, a secure authentication and access control mechanism that protects users’ data should be established. Furthermore, authentication and access control schemes are essential in the protection of health data, as numerous responsibilities exist to ensure security and privacy in a network. So, the main goal of our s

... Show More
View Publication Preview PDF
Crossref (10)
Crossref
Publication Date
Thu Nov 21 2019
Journal Name
Journal Of Engineering
Comparative Permeability Estimation Method and Identification of Rock Types using Cluster Analysis from Well Logs and Core Analysis Data in Tertiary Carbonate Reservoir-Khabaz Oil Field
...Show More Authors

Characterization of the heterogonous reservoir is complex representation and evaluation of petrophysical properties and application of the relationships between porosity-permeability within the framework of hydraulic flow units is used to estimate permeability in un-cored wells. Techniques of flow unit or hydraulic flow unit (HFU) divided the reservoir into zones laterally and vertically which can be managed and control fluid flow within flow unit and considerably is entirely different with other flow units through reservoir. Each flow unit can be distinguished by applying the relationships of flow zone indicator (FZI) method. Supporting the relationship between porosity and permeability by using flow zone indictor is ca

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Mon Nov 01 2021
Journal Name
Review Of International Geographical Education
Analysis of the agricultural insurance portfolio for the Iraqi National Insurance Company
...Show More Authors

The agricultural sector suffers from many risks and natural disasters, such as droughts and heavy rains that cause floods, as well as hail and agricultural pests, etc., that threaten agricultural activity and reduce it, which leads to the failure of farmers and peasants for fear of being subjected to continuous losses. Nevertheless, we notice almost complete reluctance to move towards agricultural insurance, due to the dependence of farmers on the government, which adopts the principle of compensation instead of agricultural insurance when natural disasters happen despite the difficulties and financial hardship as well as the suspicion of corruption that haunt the compensation process and this represents the most important problem for resea

... Show More
Publication Date
Thu Sep 22 2016
Journal Name
Applied Sciences
Analysis and Evaluation of Performance Gains and Tradeoffs for Massive MIMO Systems
...Show More Authors

View Publication
Scopus (16)
Crossref (15)
Scopus Clarivate Crossref
Publication Date
Tue Sep 21 2021
Journal Name
Jmerd
stress and strain analysis for the prosthetic hand design actuated by links
...Show More Authors

Prosthetic hands are compensatory devices for the hand amputees as a result of injury, various accidents or birth deformities, types of prosthetic hand vary depending on the mechanism they operate and how they perform. There are common types in use that are characterized by their complex mechanisms, which are difficult for the amputee to use or exclude use because of their high cost, therefore the aim of this research is to design an artificial hand that is suitable in terms of simplicity of use and low cost and similar to a natural hand with regard to dimensions and shape that operated in the mechanism of links. This research involves Stress and strain analysis of the prosthetic hand and its fingers that modelled from (Petg CR)

... Show More
View Publication Preview PDF
Publication Date
Wed Nov 28 2018
Journal Name
International Journal Of Engineering & Technology
Finite Element Analysis for The Response of URM Walls Supporting RC Slab
...Show More Authors

The aim for this research is to investigate the effect of inclusion of crack incidence into the 2D numerical model of the masonry units and bonding mortar on the behavior of unreinforced masonry walls supporting a loaded reinforced concrete slab. The finite element method was implemented for the modeling and analysis of unreinforced masonry walls. In this paper, ABAQUS, FE software with implicit solver was used to model and analyze unreinforced masonry walls which are subjected to a vertical load. Detailed Micro Modeling technique was used to model the masonry units, mortar and unit-mortar interface separately. It was found that considering potential pure tensional cracks located vertically in the middle of the mortar and units show

... Show More
Crossref (1)
Crossref
Publication Date
Sat Jul 01 2023
Journal Name
Industrial Laboratory. Materials Diagnostics
OPTIMIZATION OF PLASMA-ASSISTED DESORPTION/IONIZATIONMASS SPECTROMETRY FOR ANALYSIS OF IBUPROFEN
...Show More Authors

In medical practice, nonsteroidal anti-inflammatory drugs (NSAIDs) are often used to treat osteoarthritis and rheumatoid arthritis. Ibuprofen is a well-known NSAID, analgesic, and antipyretic medication. This chemical is an active ingredient of several oral medications that are offered in tablet, gel pellet, and syrup forms and has higher efficacy, tolerance, and side effect rates than other compounds, including pyrazolone derivatives. We present a unique plasma-assisted desorption/ionization mass spectrometry (PADI-MS) approach for improving pharmaceutically important solids using an ibuprofen tablet as a model solid sample. The goal of the study is to create an innovative mass spectrometric method that could be used for quick and accur

... Show More
Preview PDF
Publication Date
Mon Dec 05 2022
Journal Name
Baghdad Science Journal
K-Nearest Neighbor Method with Principal Component Analysis for Functional Nonparametric Regression
...Show More Authors

This paper proposed a new  method to study functional non-parametric regression data analysis with conditional expectation in the case that the covariates  are functional and the Principal Component Analysis was utilized to de-correlate the multivariate response variables. It  utilized the formula of the Nadaraya Watson estimator (K-Nearest Neighbour (KNN)) for prediction with different types of the semi-metrics, (which are based on Second Derivative and Functional Principal Component Analysis (FPCA))  for measureing the closeness between curves.  Root Mean Square Errors is used for the  implementation of this model which is then compared to the independent response method. R program is used for analysing data. Then, when  the cov

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (1)
Scopus Crossref