Preferred Language
Articles
/
9hdcWZIBVTCNdQwC6azZ
Efficient Intrusion Detection Through the Fusion of AI Algorithms and Feature Selection Methods
...Show More Authors

With the proliferation of both Internet access and data traffic, recent breaches have brought into sharp focus the need for Network Intrusion Detection Systems (NIDS) to protect networks from more complex cyberattacks. To differentiate between normal network processes and possible attacks, Intrusion Detection Systems (IDS) often employ pattern recognition and data mining techniques. Network and host system intrusions, assaults, and policy violations can be automatically detected and classified by an Intrusion Detection System (IDS). Using Python Scikit-Learn the results of this study show that Machine Learning (ML) techniques like Decision Tree (DT), Naïve Bayes (NB), and K-Nearest Neighbor (KNN) can enhance the effectiveness of an Intrusion Detection System (IDS). Success is measured by a variety of metrics, including accuracy, precision, recall, F1-Score, and execution time. Applying feature selection approaches such as Analysis of Variance (ANOVA), Mutual Information (MI), and Chi-Square (Ch-2) reduced execution time, increased detection efficiency and accuracy, and boosted overall performance. All classifiers achieve the greatest performance with 99.99% accuracy and the shortest computation time of 0.0089 seconds while using ANOVA with 10% of features.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Jan 31 2019
Journal Name
Journal Of The College Of Education For Women
The Complaint's Terms and Methods in Statement of Holy Quran
...Show More Authors

This research deals with a unique and innovative topic, that is the study of complaint in the Quranic text. Despite its importance, it has never been studied before, because most of the complaint 's meanings in the Quranic text is: the in explicit complaint. The mentioned complaint's expressions in different contexts overlap with other purposes, in particular call method and its peripherals like mourn , ask for help , exclamation and others.
Moreover, expressions that reveal complaint are related to the complainant's emotional and psychological status, and the complaint's context.
This research deals with the topic into two sections: The first deals with the important expression of complaint such as: iff, ouah, mooing, crying. The

... Show More
View Publication Preview PDF
Publication Date
Sun Mar 05 2017
Journal Name
Baghdad Science Journal
An efficient of Sansevieriatrifasciataplantas biosorbent for the treatment of metal contaminated industrial effluents
...Show More Authors

Sansevieriatrifasciata was studied as a potential biosorbent for chromium, copper and nickel removal in batch process from electroplating and tannery effluents. Different parameters influencing the biosorption process such as pH, contact time, and amount of biosorbent were optimized while using the 80 mm sized particles of the biosorbent. As high as 91.3 % Ni and 92.7 % Cu were removed at pH of 6 and 4.5 respectively, while optimum Cr removal of 91.34 % from electroplating and 94.6 % from tannery effluents was found at pH 6.0 and 4.0 respectively. Pseudo second order model was found to best fit the kinetic data for all the metals as evidenced by their greater R2 values. FTIR characterization of biosorbent revealed the presence of carboxyl a

... Show More
View Publication Preview PDF
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Sat Jul 31 2021
Journal Name
Iraqi Journal Of Science
A Decision Tree-Aware Genetic Algorithm for Botnet Detection
...Show More Authors

     In this paper, the botnet detection problem is defined as a feature selection problem and the genetic algorithm (GA) is used to search for the best significant combination of features from the entire search space of set of features. Furthermore, the Decision Tree (DT) classifier is used as an objective function to direct the ability of the proposed GA to locate the combination of features that can correctly classify the activities into normal traffics and botnet attacks. Two datasets  namely the UNSW-NB15 and the Canadian Institute for Cybersecurity Intrusion Detection System 2017 (CICIDS2017), are used as evaluation datasets. The results reveal that the proposed DT-aware GA can effectively find the relevant

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (1)
Scopus Crossref
Publication Date
Mon Jan 01 2018
Journal Name
Aip Conference Proceedings
Achieving an optimum slowing-down energy distribution functions and corresponding reaction rates for the (D+3He and T+3He) fusion reactions
...Show More Authors

A new results for fusion reactivity and slowing-down energy distribution functions for controlled thermonuclear fusion reactions of the hydrogen isotopes are achieved to reach promising results in calculating the factors that covered the design and construction of a given fusion system or reactor. They are strongly depending upon their operating fuels, the reaction rate, which in turn, reflects the physical behavior of all other parameters characterization of the system design

View Publication Preview PDF
Scopus (2)
Scopus Clarivate Crossref
Publication Date
Thu Feb 07 2019
Journal Name
Iraqi Journal Of Laser
Design High Efficient Reflectivity of Distributed Bragg Reflectors
...Show More Authors

Bragg Reflectors consist of periodic dielectric layers having an optical path length of quarter wavelength for each layer giving them important properties and makes them suitable for optoelectronics applications. The reflectivity can be increased by increasing the number of layers of the mirror to get the required value. For example for an 8 layers Bragg mirror (two layers for each dielectric pair), the contrast of the refractive index has to be equal to 0.275 for reaching reflectivity > 99%. Doubling the number of layers results in a reflectivity of 99.99%. The high reflectivity is purely caused by multiple-interference effects. It can be analyzed by using different matrix methods such as the transfer matrix method (TMM) which is the

... Show More
View Publication Preview PDF
Publication Date
Mon Oct 30 2023
Journal Name
Iraqi Journal Of Science
The Defensive Methods Against Deepfake: Review
...Show More Authors

     Due to the spread of “Deepfake” in our society and the impact of this phenomenon on politicians, celebrities, and the privacy of individuals in particular, as well as, on the other hand, its impact on the electoral process as well as financial fraud, all these reasons prompted us to present a research paper dealing with this phenomenon. This paper presents a comprehensive review of Deepfake, how it is created, and who has produced it. This paper can be used as a reference and information source for the methods used to limit deepfake by detecting forgeries and minimizing its impact on society by preventing it. This paper reviews the results of much research in the field of deepfake, as well as the advantages of each method, a

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Tue Aug 15 2023
Journal Name
Al-academy
Reading beauty through the views of philosophers and its reflection in graphic design
...Show More Authors

The creative production of the philosophy of beauty in artistic works constitutes a step towards development and progress by meeting the growing and changing needs of humanity according to various factors, including those related to the human situation and others related to technical outputs, as well as the multiplicity of the field for the emergence of new artistic currents and movements concerned with graphic production and communication and communication processes that It is associated with imagination and freedom from social and cultural constraints, in which the design production seeks to link more realistic intellectual contents with the achievements of the creative artwork as a communication system to involve the recipient (the vi

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Feb 28 2023
Journal Name
Iraqi Journal Of Science
Comparison of Performance Metrics Level of Restricted Boltzmann Machine and Backpropagation Algorithms in Detecting Diabetes Mellitus Disease
...Show More Authors

Diabetes is a disease caused by high sugar levels. Currently, diabetes is one of the most common diseases in the number of people with diabetes worldwide. The increase in diabetes is caused by the delay in establishing the diagnosis of the disease. Therefore, an initial action is needed as a solution that requires the most appropriate and accurate data mining to manage diabetes mellitus. The algorithms used are artificial neural network algorithms, namely Restricted Boltzmann Machine and Backpropagation. This research aims to compare the two algorithms to find which algorithm can produce high accuracy, and determine which algorithm is more accurate in detecting diabetes mellitus. Several stages were involved in this research, including d

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Thu Feb 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
Developing the investment budgeting through evaluation of investment projects
...Show More Authors

The aim of the research is to determine the impact of evaluating the investment projects in the development and preparation of investment budgets prepared by the economic units, since the investment projects are of an important and vital nature of the economic units, because these projects include the length of time for preparation and implementation and the accompanying period of this risk and uncertainties as well as need To the many funds to complete the project , The process of evaluating the implemented projects, which have been prepared an investment budget previously will contribute to the extent of matching the estimated data with the actual results or deviations, which is a step to avoid these errors in future p

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Dec 03 2017
Journal Name
Baghdad Science Journal
Bayes and Non-Bayes Estimation Methods for the Parameter of Maxwell-Boltzmann Distribution
...Show More Authors

In this paper, point estimation for parameter ? of Maxwell-Boltzmann distribution has been investigated by using simulation technique, to estimate the parameter by two sections methods; the first section includes Non-Bayesian estimation methods, such as (Maximum Likelihood estimator method, and Moment estimator method), while the second section includes standard Bayesian estimation method, using two different priors (Inverse Chi-Square and Jeffrey) such as (standard Bayes estimator, and Bayes estimator based on Jeffrey's prior). Comparisons among these methods were made by employing mean square error measure. Simulation technique for different sample sizes has been used to compare between these methods.

View Publication Preview PDF
Scopus (5)
Crossref (1)
Scopus Crossref