Preferred Language
Articles
/
9hdcWZIBVTCNdQwC6azZ
Efficient Intrusion Detection Through the Fusion of AI Algorithms and Feature Selection Methods
...Show More Authors

With the proliferation of both Internet access and data traffic, recent breaches have brought into sharp focus the need for Network Intrusion Detection Systems (NIDS) to protect networks from more complex cyberattacks. To differentiate between normal network processes and possible attacks, Intrusion Detection Systems (IDS) often employ pattern recognition and data mining techniques. Network and host system intrusions, assaults, and policy violations can be automatically detected and classified by an Intrusion Detection System (IDS). Using Python Scikit-Learn the results of this study show that Machine Learning (ML) techniques like Decision Tree (DT), Naïve Bayes (NB), and K-Nearest Neighbor (KNN) can enhance the effectiveness of an Intrusion Detection System (IDS). Success is measured by a variety of metrics, including accuracy, precision, recall, F1-Score, and execution time. Applying feature selection approaches such as Analysis of Variance (ANOVA), Mutual Information (MI), and Chi-Square (Ch-2) reduced execution time, increased detection efficiency and accuracy, and boosted overall performance. All classifiers achieve the greatest performance with 99.99% accuracy and the shortest computation time of 0.0089 seconds while using ANOVA with 10% of features.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Aug 31 2022
Journal Name
Iraqi Journal Of Science
Data Mining Methods for Extracting Rumors Using Social Analysis Tools
...Show More Authors

       Rumors are typically described as remarks whose true value is unknown. A rumor on social media has the potential to spread erroneous information to a large group of individuals. Those false facts will influence decision-making in a variety of societies. In online social media, where enormous amounts of information are simply distributed over a large network of sources with unverified authority, detecting rumors is critical. This research proposes that rumor detection be done using Natural Language Processing (NLP) tools as well as six distinct Machine Learning (ML) methods (Nave Bayes (NB), random forest (RF), K-nearest neighbor (KNN), Logistic Regression (LR), Stochastic Gradient Descent (SGD) and Decision Tree (

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Sun Dec 07 2014
Journal Name
Baghdad Science Journal
Baysian and NonBaysian Methods to Estimate the two parameters of Logistic Distribution
...Show More Authors

In this paper ,the problem of point estimation for the two parameters of logistic distribution has been investigated using simulation technique. The rank sampling set estimator method which is one of the Non_Baysian procedure and Lindley approximation estimator method which is one of the Baysian method were used to estimate the parameters of logistic distribution. Comparing between these two mentioned methods by employing mean square error measure and mean absolute percentage error measure .At last simulation technique used to generate many number of samples sizes to compare between these methods.

View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sun Nov 27 2022
Journal Name
Al–bahith Al–a'alami
Municipality of Baghdad’s communication means and methods during imposing the law operations
...Show More Authors

This study aims at  identifying  how Baghdad Municipality employs public relations in law enforcement operations and the role played by the Municipality in communication and communicating with the public, raising their awareness and educating them to not  abuse public property.  As for the research tools, the researcher used the questionnaire as a data  collection tool in addition to an analytical description of the means and methods of communication for public relations on  Baghdad Municipality Facebook page.

The research comes out with a set of result; the most important of which are:
The means through which citizens learned about the existence of campaigns to impose the law an eliminate violati

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Mon Jan 27 2020
Journal Name
Iraqi Journal Of Science
A Framework of APT Detection Based on Packets Analysis and Host Destination
...Show More Authors

So far, APT (Advanced Persistent Threats) is a constant concern for information security. Despite that, many approaches have been used in order to detect APT attacks, such as change controlling, sandboxing and network traffic analysis. However, success of 100% couldn’t be achieved. Current studies have illustrated that APTs adopt many complex techniques to evade all detection types. This paper describes and analyzes APT problems by analyzing the most common techniques, tools and pathways used by attackers. In addition, it highlights the weaknesses and strengths of the existing security solutions that have been used since the threat was identified in 2006 until 2019. Furthermore, this research proposes a new framework that can be u

... Show More
View Publication Preview PDF
Scopus (5)
Crossref (4)
Scopus Crossref
Publication Date
Tue Aug 01 2023
Journal Name
Baghdad Science Journal
Digital Data Encryption Using a Proposed W-Method Based on AES and DES Algorithms
...Show More Authors

This paper proposes a new encryption method. It combines two cipher algorithms, i.e., DES and AES, to generate hybrid keys. This combination strengthens the proposed W-method by generating high randomized keys. Two points can represent the reliability of any encryption technique. Firstly, is the key generation; therefore, our approach merges 64 bits of DES with 64 bits of AES to produce 128 bits as a root key for all remaining keys that are 15. This complexity increases the level of the ciphering process. Moreover, it shifts the operation one bit only to the right. Secondly is the nature of the encryption process. It includes two keys and mixes one round of DES with one round of AES to reduce the performance time. The W-method deals with

... Show More
View Publication Preview PDF
Scopus (5)
Scopus Crossref
Publication Date
Wed Feb 19 2020
Journal Name
International Journal Of Innovation, Creativity And Change
Secure Image Steganography Through Multilevel Security
...Show More Authors

The concealment of data has emerged as an area of deep and wide interest in research that endeavours to conceal data in a covert and stealth manner, to avoid detection through the embedment of the secret data into cover images that appear inconspicuous. These cover images may be in the format of images or videos used for concealment of the messages, yet still retaining the quality visually. Over the past ten years, there have been numerous researches on varying steganographic methods related to images, that emphasised on payload and the quality of the image. Nevertheless, a compromise exists between the two indicators and to mediate a more favourable reconciliation for this duo is a daunting and problematic task. Additionally, the current

... Show More
Publication Date
Wed Aug 30 2023
Journal Name
Iraqi Journal Of Science
Computational Study of the Flow of Newtonian Fluid Through A Straight Channel and Lid-Driven Cavity
...Show More Authors

     This article aims to introducenumerical study of two different incompressible Newtonian fluid flows. The first type of flow is through the straight channel, while the second flow is enclosed within a square cavity and the fluid is moved by the upper plate at a specific velocity. Numerically, a Taylor-Galerkin\ pressure-correction finite element method (TGPCFEM) is chosen to address the relevant governing equations. The Naiver-Stoke partial differential equations are usually used to describe the activity of fluids. These equations consist of the continuity equation (conservation of mass) and the time-dependent conservation of momentum, which are preserved in Cartesian coordinates. In this study, the effect of Reynolds number (

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Mon Nov 01 2010
Journal Name
Iraqi Journal Of Physics
Calculation the mass attenuation coefficient of beta-particles through Polyvinyl chloride
...Show More Authors

The mass attenuation coefficient for beta particles through pure Polyvinyl chloride (PVC) and flax fibers- reinforced PVC composite were investigated as a function of the absorber thickness and the absorber to source distance. The beta particles mass attenuation coefficients were obtained using a NaI(Tl) energy selective scintillation counter with 90Sr/ 90Y beta source having an energy range from (0.546-2.275) MeV. Pure PVC polymer samples were prepared by compacting the PVC powder in a mould at high pressure (10bar) and temperature about 140°C for 30 minutes. A hot press system was used for this process. The experimentally obtained values of mass attenuation coefficients for 90Sr and 90Y were found to be 7.72 cm2.g-1and 0.842 cm2.g-1 r

... Show More
View Publication Preview PDF
Publication Date
Sun Dec 31 2023
Journal Name
The College Of Law And Political Science Jornal
Compensation through guarantee funds in the field of promoting extremist ideas
...Show More Authors

Compensation is one of the most discussed topics in the arena of civil law that requires research About solutions to the damages that arise from the promotion of extremist ideas, which were imposed by the developments taking place in society and the increasing escalation of accidents and their increasing risks, which now threaten individuals and their property on a daily basis in large numbers, as the injured party always seeks to require quick compensation from the person responsible for the damage that satisfies his desires and removes the effects of the damage caused, The importance of compensation increases if the violation affects a person’s physical integrity or his right to life, which is the highest right recognized for humans in

... Show More
View Publication
Publication Date
Tue Dec 31 2019
Journal Name
Journal Of Engineering
Assessment of Pedestrian Walking Speed Through the Religious Occasions in Iraq
...Show More Authors

The design of safe pedestrian facilities usually depends on the assessment of pedestrian characteristics and behavior. In this investigation, pedestrian walking speed through the religious occasion have been monitored at three locations, Al- Kadhimiya (Imam AL-Kadim), Najaf and Karbala (Imam AL-Husain) holy shrines. Video captures of the pedestrian through their walking to the two holy shrines have been prepared and analyzed for walking speed, gender, age groups, and clothing tradition. The pedestrian sample size is 468, 501, and 447 for Al- Kadhimiya, Karbala, and Najaf respectively. When the gender is taken into consideration, it can be noted that the walking speed of male and female pedestrian is (0.97, 1.68, and 1.63

... Show More
View Publication Preview PDF
Crossref (1)
Crossref