Preferred Language
Articles
/
GRZZgYcBVTCNdQwCHFQg
Reducing False Notification in Identifying Malicious Application Programming Interface (API) to Detect Malwares Using Artificial Neural Network with Discriminant Analysis

Publication Date
Fri Jan 20 2023
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Block Ciphers Analysis Based on a Fully Connected Neural Network

With the development of high-speed network technologies, there has been a recent rise in the transfer of significant amounts of sensitive data across the Internet and other open channels. The data will be encrypted using the same key for both Triple Data Encryption Standard (TDES) and Advanced Encryption Standard (AES), with block cipher modes called cipher Block Chaining (CBC) and Electronic CodeBook (ECB). Block ciphers are often used for secure data storage in fixed hard drives, portable devices, and safe network data transport. Therefore, to assess the security of the encryption method, it is necessary to become familiar with and evaluate the algorithms of cryptographic systems. Block cipher users need to be sure that the ciphers the

... Show More
Crossref (2)
Crossref
View Publication Preview PDF
Publication Date
Sat Apr 01 2023
Journal Name
Heliyon
A comprehensive review on modelling the adsorption process for heavy metal removal from waste water using artificial neural network technique

Scopus (24)
Crossref (21)
Scopus Clarivate Crossref
View Publication Preview PDF
Publication Date
Thu Feb 07 2019
Journal Name
Journal Of The College Of Education For Women
SPEECH RECOGNITION OF ARABIC WORDS USING ARTIFICIAL NEURAL NETWORKS

The speech recognition system has been widely used by many researchers using different
methods to fulfill a fast and accurate system. Speech signal recognition is a typical
classification problem, which generally includes two main parts: feature extraction and
classification. In this paper, a new approach to achieve speech recognition task is proposed by
using transformation techniques for feature extraction methods; namely, slantlet transform
(SLT), discrete wavelet transforms (DWT) type Daubechies Db1 and Db4. Furthermore, a
modified artificial neural network (ANN) with dynamic time warping (DTW) algorithm is
developed to train a speech recognition system to be used for classification and recognition
purposes. T

... Show More
View Publication Preview PDF
Publication Date
Thu May 28 2020
Journal Name
Iraqi Journal Of Science
An Artificial Neural Network for Predicting Rate of Penetration in AL- Khasib Formation – Ahdeb Oil Field

The main objective of this study is to develop a rate of penetration (ROP) model for Khasib formation in Ahdab oil field and determine the drilling parameters controlling the prediction of ROP values by using artificial neural network (ANN).

     An Interactive Petrophysical software was used to convert the raw dataset of transit time (LAS Readings) from parts of meter-to-meter reading with depth. The IBM SPSS statistics software version 22 was used to create an interconnection between the drilling variables and the rate of penetration, detection of outliers of input parameters, and regression modeling. While a JMP Version 11 software from SAS Institute Inc. was used for artificial neural modeling.

&nb

... Show More
Scopus (3)
Crossref (2)
Scopus Crossref
View Publication Preview PDF
Publication Date
Sat Jun 06 2020
Journal Name
Journal Of The College Of Education For Women
Image classification with Deep Convolutional Neural Network Using Tensorflow and Transfer of Learning

The deep learning algorithm has recently achieved a lot of success, especially in the field of computer vision. This research aims to describe the classification method applied to the dataset of multiple types of images (Synthetic Aperture Radar (SAR) images and non-SAR images). In such a classification, transfer learning was used followed by fine-tuning methods. Besides, pre-trained architectures were used on the known image database ImageNet. The model VGG16 was indeed used as a feature extractor and a new classifier was trained based on extracted features.The input data mainly focused on the dataset consist of five classes including the SAR images class (houses) and the non-SAR images classes (Cats, Dogs, Horses, and Humans). The Conv

... Show More
Crossref
View Publication Preview PDF
Publication Date
Sat Jun 03 2023
Journal Name
Iraqi Journal Of Science
Face Recognition Using Stationary wavelet transform and Neural Network with Support Vector Machine

Face recognition is a type of biometric software application that can identify a specific
individual in a digital image by analyzing and comparing patterns. It is the process of
identifying an individual using their facial features and expressions.
In this paper we proposed a face recognition system using Stationary Wavelet Transform
(SWT) with Neural Network, the SWT are applied into five levels for feature facial
extraction with probabilistic Neural Network (PNN) , the system produced good results
and then we improved the system by using two manner in Neural Network (PNN) and
Support Vector Machine(SVM) so we find that the system performance is more better
after using SVM where the result shows the performance o

... Show More
View Publication Preview PDF
Publication Date
Sat Feb 09 2019
Journal Name
Journal Of The College Of Education For Women
Key Exchange Management by using Neural Network Synchronization

The paper presents a neural synchronization into intensive study in order to address challenges preventing from adopting it as an alternative key exchange algorithm. The results obtained from the implementation of neural synchronization with this proposed system address two challenges: namely the verification of establishing the synchronization between the two neural networks, and the public initiation of the input vector for each party. Solutions are presented and mathematical model is developed and presented, and as this proposed system focuses on stream cipher; a system of LFSRs (linear feedback shift registers) has been used with a balanced memory to generate the key. The initializations of these LFSRs are neural weights after achiev

... Show More
View Publication Preview PDF
Publication Date
Mon Nov 01 2021
Journal Name
Iop Conference Series: Earth And Environmental Science
Treatability influence of municipal sewage effluent on surface water quality assessment based on Nemerow pollution index using an artificial neural network
Abstract<p>Assessing water quality provides a scientific foundation for the development and management of water resources. The objective of the research is to evaluate the impact treated effluent from North Rustumiyia wastewater treatment plant (WWTP) on the quality of Diyala river. The model of the artificial neural network (ANN) and factor analysis (FA) based on Nemerow pollution index (NPI). To define important water quality parameters for North Al-Rustumiyia for the line(F2), the Nemerow Pollution Index was introduced. The most important parameters of assessment of water variation quality of wastewater were the parameter used in the model: biochemical oxygen demand (BOD), chemical oxygen dem</p> ... Show More
Scopus (5)
Crossref (3)
Scopus Crossref
View Publication
Publication Date
Sat Dec 01 2012
Journal Name
Journal Of Economics And Administrative Sciences
Using Benford’s Law to detect Financial Fraud

Fraud Includes acts involving the exercise of deception by multiple parties inside and outside companies in order to obtain economic benefits against the harm to those companies, as they are to commit fraud upon the availability of three factors which represented by the existence of opportunities, motivation, and rationalization. Fraud detecting require necessity of indications the possibility of its existence. Here, Benford’s law can play an important role in direct the light towards the possibility of the existence of financial fraud in the accounting records of the company, which provides the required effort and time for detect fraud and prevent it.

Crossref
View Publication Preview PDF
Publication Date
Tue Jan 01 2013
Journal Name
Thesis
User Authentication Based on Keystroke Dynamics Using Artificial Neural Networks

Computer systems and networks are being used in almost every aspect of our daily life, the security threats to computers and networks have increased significantly. Usually, password-based user authentication is used to authenticate the legitimate user. However, this method has many gaps such as password sharing, brute force attack, dictionary attack and guessing. Keystroke dynamics is one of the famous and inexpensive behavioral biometric technologies, which authenticate a user based on the analysis of his/her typing rhythm. In this way, intrusion becomes more difficult because the password as well as the typing speed must match with the correct keystroke patterns. This thesis considers static keystroke dynamics as a transparent layer of t

... Show More