Preferred Language
Articles
/
9hdcWZIBVTCNdQwC6azZ
Efficient Intrusion Detection Through the Fusion of AI Algorithms and Feature Selection Methods
...Show More Authors

With the proliferation of both Internet access and data traffic, recent breaches have brought into sharp focus the need for Network Intrusion Detection Systems (NIDS) to protect networks from more complex cyberattacks. To differentiate between normal network processes and possible attacks, Intrusion Detection Systems (IDS) often employ pattern recognition and data mining techniques. Network and host system intrusions, assaults, and policy violations can be automatically detected and classified by an Intrusion Detection System (IDS). Using Python Scikit-Learn the results of this study show that Machine Learning (ML) techniques like Decision Tree (DT), Naïve Bayes (NB), and K-Nearest Neighbor (KNN) can enhance the effectiveness of an Intrusion Detection System (IDS). Success is measured by a variety of metrics, including accuracy, precision, recall, F1-Score, and execution time. Applying feature selection approaches such as Analysis of Variance (ANOVA), Mutual Information (MI), and Chi-Square (Ch-2) reduced execution time, increased detection efficiency and accuracy, and boosted overall performance. All classifiers achieve the greatest performance with 99.99% accuracy and the shortest computation time of 0.0089 seconds while using ANOVA with 10% of features.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Jan 05 2025
Journal Name
Science Journal Of University Of Zakho
DETECTION AND RECOGNITION OF IRAQI LICENSE PLATES USING CONVOLUTIONAL NEURAL NETWORKS
...Show More Authors

Due to the large population of motorway users in the country of Iraq, various approaches have been adopted to manage queues such as implementation of traffic lights, avoidance of illegal parking, amongst others. However, defaulters are recorded daily, hence the need to develop a mean of identifying these defaulters and bring them to book. This article discusses the development of an approach of recognizing Iraqi licence plates such that defaulters of queue management systems are identified. Multiple agencies worldwide have quickly and widely adopted the recognition of a vehicle license plate technology to expand their ability in investigative and security matters. License plate helps detect the vehicle's information automatically ra

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Feb 19 2020
Journal Name
International Journal Of Innovation, Creativity And Change
Secure Image Steganography Through Multilevel Security
...Show More Authors

The concealment of data has emerged as an area of deep and wide interest in research that endeavours to conceal data in a covert and stealth manner, to avoid detection through the embedment of the secret data into cover images that appear inconspicuous. These cover images may be in the format of images or videos used for concealment of the messages, yet still retaining the quality visually. Over the past ten years, there have been numerous researches on varying steganographic methods related to images, that emphasised on payload and the quality of the image. Nevertheless, a compromise exists between the two indicators and to mediate a more favourable reconciliation for this duo is a daunting and problematic task. Additionally, the current

... Show More
Publication Date
Thu May 01 1997
Journal Name
Polymer-plastics Technology And Engineering
An Efficient Method for Real Gas Pseudopressure Calculation
...Show More Authors

View Publication
Scopus (2)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Thu Mar 01 2018
Journal Name
Journal Of Engineering
Permeability Estimation by Using the Modified and Conventional FZI Methods
...Show More Authors

There many methods for estimation of permeability. In this Paper, permeability has been estimated by two methods. The conventional and modified methods are used to calculate flow zone indicator (FZI). The hydraulic flow unit (HU) was identified by FZI technique. This technique is effective in predicting the permeability in un-cored intervals/wells. HU is related with FZI and rock quality index (RQI). All available cores from 7 wells (Su -4, Su -5, Su -7, Su -8, Su -9, Su -12, and Su -14) were used to be database for HU classification. The plot of probability cumulative of FZI is used. The plot of core-derived probability FZI for both modified and conventional method which indicates 4 Hu (A, B, C and D) for Nahr Umr forma

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jan 01 2017
Journal Name
Pertanika Journal Of Science & Technology
Modified Kohonen network algorithm for selection of the initial centres of Gustafson-Kessel algorithm in credit scoring
...Show More Authors

Credit risk assessment has become an important topic in financial risk administration. Fuzzy clustering analysis has been applied in credit scoring. Gustafson-Kessel (GK) algorithm has been utilised to cluster creditworthy customers as against non-creditworthy ones. A good clustering analysis implemented by good Initial Centres of clusters should be selected. To overcome this problem of Gustafson-Kessel (GK) algorithm, we proposed a modified version of Kohonen Network (KN) algorithm to select the initial centres. Utilising similar degree between points to get similarity density, and then by means of maximum density points selecting; the modified Kohonen Network method generate clustering initial centres to get more reasonable clustering res

... Show More
Scopus (9)
Scopus
Publication Date
Wed Mar 30 2022
Journal Name
Journal Of Educational And Psychological Researches
Skills and Standards of Selection and Use of Assistive Technology among Saudi Teachers of Students with Intellectual and Developmental Disabilities
...Show More Authors

The purpose of the current study was to explore the standards that teachers take into consideration when selecting and using assistive technology (AT), in addition to their knowledge and skills in this area. A quantitative, descriptive survey design was used and a convenience sample of 79 teachers of students with intellectual disabilities and autism spectrum disorder (ASD) participated in the current study. Based on the four main areas of the SETT Framework—student, environment, tasks, and tools—, teachers reported a lack consideration for most of the standards in each area. Among other findings, statistically significant differences were found between teachers’ standards of the SETT Framework, with teachers who had previous profe

... Show More
View Publication Preview PDF
Publication Date
Sun Dec 31 2023
Journal Name
The College Of Law And Political Science Jornal
Compensation through guarantee funds in the field of promoting extremist ideas
...Show More Authors

Compensation is one of the most discussed topics in the arena of civil law that requires research About solutions to the damages that arise from the promotion of extremist ideas, which were imposed by the developments taking place in society and the increasing escalation of accidents and their increasing risks, which now threaten individuals and their property on a daily basis in large numbers, as the injured party always seeks to require quick compensation from the person responsible for the damage that satisfies his desires and removes the effects of the damage caused, The importance of compensation increases if the violation affects a person’s physical integrity or his right to life, which is the highest right recognized for humans in

... Show More
View Publication
Publication Date
Mon Nov 01 2010
Journal Name
Iraqi Journal Of Physics
Calculation the mass attenuation coefficient of beta-particles through Polyvinyl chloride
...Show More Authors

The mass attenuation coefficient for beta particles through pure Polyvinyl chloride (PVC) and flax fibers- reinforced PVC composite were investigated as a function of the absorber thickness and the absorber to source distance. The beta particles mass attenuation coefficients were obtained using a NaI(Tl) energy selective scintillation counter with 90Sr/ 90Y beta source having an energy range from (0.546-2.275) MeV. Pure PVC polymer samples were prepared by compacting the PVC powder in a mould at high pressure (10bar) and temperature about 140°C for 30 minutes. A hot press system was used for this process. The experimentally obtained values of mass attenuation coefficients for 90Sr and 90Y were found to be 7.72 cm2.g-1and 0.842 cm2.g-1 r

... Show More
View Publication Preview PDF
Publication Date
Tue Dec 31 2019
Journal Name
Journal Of Engineering
Assessment of Pedestrian Walking Speed Through the Religious Occasions in Iraq
...Show More Authors

The design of safe pedestrian facilities usually depends on the assessment of pedestrian characteristics and behavior. In this investigation, pedestrian walking speed through the religious occasion have been monitored at three locations, Al- Kadhimiya (Imam AL-Kadim), Najaf and Karbala (Imam AL-Husain) holy shrines. Video captures of the pedestrian through their walking to the two holy shrines have been prepared and analyzed for walking speed, gender, age groups, and clothing tradition. The pedestrian sample size is 468, 501, and 447 for Al- Kadhimiya, Karbala, and Najaf respectively. When the gender is taken into consideration, it can be noted that the walking speed of male and female pedestrian is (0.97, 1.68, and 1.63

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sun Feb 02 2025
Journal Name
Engineering, Technology & Applied Science Research
Automated Glaucoma Detection Techniques: A Literature Review
...Show More Authors

Significant advances in the automated glaucoma detection techniques have been made through the employment of the Machine Learning (ML) and Deep Learning (DL) methods, an overview of which will be provided in this paper. What sets the current literature review apart is its exclusive focus on the aforementioned techniques for glaucoma detection using the Preferred Reporting Items for Systematic Reviews and Meta-Analysis (PRISMA) guidelines for filtering the selected papers. To achieve this, an advanced search was conducted in the Scopus database, specifically looking for research papers published in 2023, with the keywords "glaucoma detection", "machine learning", and "deep learning". Among the multiple found papers, the ones focusing

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (1)
Scopus Crossref