Classification of imbalanced data is an important issue. Many algorithms have been developed for classification, such as Back Propagation (BP) neural networks, decision tree, Bayesian networks etc., and have been used repeatedly in many fields. These algorithms speak of the problem of imbalanced data, where there are situations that belong to more classes than others. Imbalanced data result in poor performance and bias to a class without other classes. In this paper, we proposed three techniques based on the Over-Sampling (O.S.) technique for processing imbalanced dataset and redistributing it and converting it into balanced dataset. These techniques are (Improved Synthetic Minority Over-Sampling Technique (Improved SMOTE), Borderline-SMOTE + Imbalanced Ratio(IR), Adaptive Synthetic Sampling (ADASYN) +IR) Algorithm, where the work these techniques are generate the synthetic samples for the minority class to achieve balance between minority and majority classes and then calculate the IR between classes of minority and majority. Experimental results show ImprovedSMOTE algorithm outperform the Borderline-SMOTE + IR and ADASYN + IR algorithms because it achieves a high balance between minority and majority classes.
Computer systems and networks are increasingly used for many types of applications; as a result the security threats to computers and networks have also increased significantly. Traditionally, password user authentication is widely used to authenticate legitimate user, but this method has many loopholes such as password sharing, brute force attack, dictionary attack and more. The aim of this paper is to improve the password authentication method using Probabilistic Neural Networks (PNNs) with three types of distance include Euclidean Distance, Manhattan Distance and Euclidean Squared Distance and four features of keystroke dynamics including Dwell Time (DT), Flight Time (FT), mixture of (DT) and (FT), and finally Up-Up Time (UUT). The resul
... Show MoreIntrusion detection systems detect attacks inside computers and networks, where the detection of the attacks must be in fast time and high rate. Various methods proposed achieved high detection rate, this was done either by improving the algorithm or hybridizing with another algorithm. However, they are suffering from the time, especially after the improvement of the algorithm and dealing with large traffic data. On the other hand, past researches have been successfully applied to the DNA sequences detection approaches for intrusion detection system; the achieved detection rate results were very low, on other hand, the processing time was fast. Also, feature selection used to reduce the computation and complexity lead to speed up the system
... Show MoreHiding technique for dynamic encryption text using encoding table and symmetric encryption method (AES algorithm) is presented in this paper. The encoding table is generated dynamically from MSB of the cover image points that used as the first phase of encryption. The Harris corner point algorithm is applied on cover image to generate the corner points which are used to generate dynamic AES key to second phase of text encryption. The embedded process in the LSB for the image pixels except the Harris corner points for more robust. Experimental results have demonstrated that the proposed scheme have embedding quality, error-free text recovery, and high value in PSNR.
Pattern matching algorithms are usually used as detecting process in intrusion detection system. The efficiency of these algorithms is affected by the performance of the intrusion detection system which reflects the requirement of a new investigation in this field. Four matching algorithms and a combined of two algorithms, for intrusion detection system based on new DNA encoding, are applied for evaluation of their achievements. These algorithms are Brute-force algorithm, Boyer-Moore algorithm, Horspool algorithm, Knuth-Morris-Pratt algorithm, and the combined of Boyer-Moore algorithm and Knuth–Morris– Pratt algorithm. The performance of the proposed approach is calculated based on the executed time, where these algorithms are applied o
... Show Moreabstract
the research discussed a stage of strategic management. The strategic of the evaluation of the proposed strategy through feedback is to ensure that it is implemented with the least possible variation. The research aims at evaluation a proposed strategy for the Ministry of Planning for the years 2018-2022 in line with the orientations of the state, taking into account the surrounding environmental conditions. It relies on scientific bases and steps to formulate the strategy The extent of the strategy suitability was tested through a set of statistical means and its objectivity was verified through a survey of a number of specialized experts who were selected in accordance with the principle
... Show MoreThe goal of the research is to develop a sustainable rating system for roadway projects in Iraq for all of the life cycle stages of the projects which are (planning, design, construction and operation and maintenance). This paper investigates the criteria and its weightings of the suggested roadway rating system depending on sustainable planning activities. The methodology started in suggesting a group of sustainable criteria for planning stage and then suggesting weights from (1-5) points for each one of it. After that data were collected by using a closed questionnaire directed to the roadway experts group in order to verify the criteria weightings based on the relative importance of the roadway related impacts
... Show MoreAbstract:
The research aims to clarify the impact of adopting the IFRS16 financial reporting standard on lease contracts in insurance companies on audit procedures. The change in the classification of lease contracts in the case of adopting the IFRS16 financial reporting standard necessarily requires audit procedures that are compatible with this change. A proposed audit program was prepared, guided by international auditing standards, based on the study of the client's environment and analysis of external and internal risks in the light of financial and non-financial indicators. The researchers reached a set of concl
... Show MoreSub-threshold operation has received a lot of attention in limited performance applications.However, energy optimization of sub-threshold circuits should be performed with the concern of the performance limitation of such circuit. In this paper, a dual size design is proposed for energy minimization of sub-threshold CMOS circuits. The optimal downsizing factor is determined and assigned for some gates on the off-critical paths to minimize the energy at the maximum allowable performance. This assignment is performed using the proposed slack based genetic algorithm which is a heuristic-mixed evolutionary algorithm. Some gates are heuristically assigned to the original and the downsized design based on their slack time determined by static tim
... Show MoreThe design of reinforced concrete spread foundations mainly depends on soil bearing capacity, loading value, and column size. So for each design case, tiresome calculations and time consumption are needed. In this paper, generalized design charts are presented and plotted according to derivations based on the ACI 318 M-2019 Code. These charts could be used directly by the structural designers to estimate the column size, foundation thickness, and dimensions as well as the foundation reinforcement under a certain given concentric load assuming a uniformly distributed contact pressure underneath the foundation. Of noteworthy, these charts are oriented to deal with square isolated footings with a square concentric column, covering reasonable r
... Show MoreFor many years, the construction industry damages have been overlooked such as unreasonable consumption of resources in addition to producing a lot of construction waste but with global awareness growth towards the sustainable development issues, the sustainable construction practices have been adopted, taking into account the environment and human safety. The research aims to propose a management system for construction practices which could be adopted during constructing different types of sustainable buildings besides formulating flowcharts which clarify the required whole phases of sustainable buildings life cycle. The research includes two parts: theoretical part which generally ,handles the sustainability concepts at construction i
... Show More