Preferred Language
Articles
/
9hdcWZIBVTCNdQwC6azZ
Efficient Intrusion Detection Through the Fusion of AI Algorithms and Feature Selection Methods
...Show More Authors

With the proliferation of both Internet access and data traffic, recent breaches have brought into sharp focus the need for Network Intrusion Detection Systems (NIDS) to protect networks from more complex cyberattacks. To differentiate between normal network processes and possible attacks, Intrusion Detection Systems (IDS) often employ pattern recognition and data mining techniques. Network and host system intrusions, assaults, and policy violations can be automatically detected and classified by an Intrusion Detection System (IDS). Using Python Scikit-Learn the results of this study show that Machine Learning (ML) techniques like Decision Tree (DT), Naïve Bayes (NB), and K-Nearest Neighbor (KNN) can enhance the effectiveness of an Intrusion Detection System (IDS). Success is measured by a variety of metrics, including accuracy, precision, recall, F1-Score, and execution time. Applying feature selection approaches such as Analysis of Variance (ANOVA), Mutual Information (MI), and Chi-Square (Ch-2) reduced execution time, increased detection efficiency and accuracy, and boosted overall performance. All classifiers achieve the greatest performance with 99.99% accuracy and the shortest computation time of 0.0089 seconds while using ANOVA with 10% of features.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Jan 01 2020
Journal Name
Technologies And Materials For Renewable Energy, Environment And Sustainability: Tmrees20
Theoretical estimation of the trapping reaction rate for deuteron-deuteron fusion in nickel metal using Bose-Einstein condensates phenomena
...Show More Authors

A mathematical model has been introduced to investigate the effect of nuclear reaction constant ( A ), probability of the BEC ground state occupation Ω i, nD is the number density of deuteron (d) and the overall number of nuclei ND on the total nuclear d-d fusion rate (R). Under steady-state of the condensates of Bose-Einstein, the postulate of quantum theory and Bose-Einstein theory were applied to evaluate the total nuclear (d-d) fusion rate trapping in Nickel-metal The total nuclear fusion rate trapping predicts a strong relationship between astrophysical S-factor and masses of Nickel. The reaction rate trapping model was tested on three reaction d(d,p)T, d(d, n)3He and d(d, 4He)Q = 23.8MeV respectively. The reaction rate has described

... Show More
View Publication Preview PDF
Scopus Clarivate Crossref
Publication Date
Sun Feb 03 2019
Journal Name
Iraqi Journal Of Physics
Study the variation of synodic month for the moon through 2000-2100
...Show More Authors

In this research study the synodic month for the moon and their
relationship with the mean anomaly for the moon orbit and date A.D
and for long periods of time (100 years), we was design a computer
program that calculates the period of synodic months, and the
coordinates of the moon at the moment of the new moon with high
accuracy. During the 100 year, there are 1236 period of synodic
months.
We found that the when New Moon occurs near perigee (mean
anomaly = 0°), the length of the synodic month at a minimum.
Similarly, when New Moon occurs near apogee (mean anomaly =
180°), the length of the synodic month reaches a maximum. The
shortest synodic month on 2053 /1/ 16 and lasted (29.27436) days.
The lo

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Feb 03 2016
Journal Name
Iraqi Journal Of Physics
Study the variation of synodic month for the moon through 2000-2100
...Show More Authors

In this research study the synodic month for the moon and theirrelationship with the mean anomaly for the moon orbit and date A.Dand for long periods of time (100 years), we was design a computerprogram that calculates the period of synodic months, and thecoordinates of the moon at the moment of the new moon with highaccuracy. During the 100 year, there are 1236 period of synodicmonths.We found that the when New Moon occurs near perigee (meananomaly = 0°), the length of the synodic month at a minimum.Similarly, when New Moon occurs near apogee (mean anomaly =180°), the length of the synodic month reaches a maximum. Theshortest synodic month on 2053 /1/ 16 and lasted (29.27436) days.The longest synodic month began on 2008 /11/ 27 a

... Show More
View Publication
Crossref
Publication Date
Tue Jan 14 2020
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The role of the Internal Audit Department in detecting corruption through accountability
...Show More Authors

Internal Audit  is one of the most important backers of corporate governance, the researcher expanded his interest in this subject to examine the efficiency of Internal Auditors at the Arab Bank and its branches in Jordan to achieve Accountability which enhances the Corporate Governance and to identify the effect of the International Internal Audit  Standards in strengthening the role of Internal Auditors in Accountability, and the effect of Attribute and Performance Standards in Accountability. The researcher applied descriptive analysis method to define the role of Internal Audit in the Arab Bank in achieving one of the basic principles of Corporate Governance assimilated in Accountability. The researcher’s sources include

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Mon Nov 30 2020
Journal Name
Journal Of Economics And Administrative Sciences
Analysis of women's job offer through entrepreneurship The case of Algeria
...Show More Authors

The aim of this scientific paper is to highlight the effective role of women working in economic development, especially those working in the entrepreneurial sector, which we see as encouraging at the macro-economic level and at the personal level, by highlighting their potential to help them enter the private labour market, value them and empower their role in the economic arena in order to win this bet to become productive and effective workers at all levels.

Through this paper, we will try to highlight the role of Algerian women's contribution to economic development through access to the world of entrepreneurship, and we will also try to find statistics on their success levels at the local and interna

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Dec 20 2021
Journal Name
Baghdad Science Journal
User Quality of Experience (QoE) Satisfaction for Video Content Selection (VCS) Framework in Smartphone Devices
...Show More Authors

Video streaming is widely available nowadays. Moreover, since the pandemic hit all across the globe, many people stayed home and used streaming services for news, education,  and entertainment. However,   when streaming in session, user Quality of Experience (QoE) is unsatisfied with the video content selection while streaming on smartphone devices. Users are often irritated by unpredictable video quality format displays on their smartphone devices. In this paper, we proposed a framework video selection scheme that targets to increase QoE user satisfaction. We used a video content selection algorithm to map the video selection that satisfies the user the most regarding streaming quality. Video Content Selection (VCS) are classified in

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Clarivate Crossref
Publication Date
Mon Dec 01 2014
Journal Name
2014 Ieee Student Conference On Research And Development
Feature extraction for co-occurrence-based cosine similarity score of text documents
...Show More Authors

View Publication
Scopus (10)
Crossref (9)
Scopus Crossref
Publication Date
Thu Dec 01 2022
Journal Name
Ieee Transactions On Human-machine Systems
Myoelectric Control With Fixed Convolution-Based Time-Domain Feature Extraction: Exploring the Spatio–Temporal Interaction
...Show More Authors

View Publication
Scopus (27)
Crossref (25)
Scopus Clarivate Crossref
Publication Date
Wed Sep 01 2021
Journal Name
Baghdad Science Journal
An Efficient Image Encryption Using a Dynamic, Nonlinear and Secret Diffusion Scheme
...Show More Authors

The growing use of tele

This paper presents a new secret diffusion scheme called Round Key Permutation (RKP) based on the nonlinear, dynamic and pseudorandom permutation for encrypting images by block, since images are considered particular data because of their size and their information, which are two-dimensional nature and characterized by high redundancy and strong correlation. Firstly, the permutation table is calculated according to the master key and sub-keys. Secondly, scrambling pixels for each block to be encrypted will be done according the permutation table. Thereafter the AES encryption algorithm is used in the proposed cryptosystem by replacing the linear permutation of ShiftRows step with the nonlinear and secret pe

... Show More
View Publication Preview PDF
Scopus (3)
Scopus Clarivate Crossref
Publication Date
Sun Jan 01 2023
Journal Name
Computers, Materials & Continua
An Efficient Method for Heat Recovery Process and燭emperature燨ptimization
...Show More Authors

View Publication
Scopus Clarivate Crossref