Preferred Language
Articles
/
HBZJu4sBVTCNdQwCsNm4
INTRUSION WINDOWS XP BY BACKDOOR TOOL
...Show More Authors

View Publication
Publication Date
Sat May 24 2025
Journal Name
Iraqi Journal For Computer Science And Mathematics
Intrusion Detection System for IoT Based on Modified Random Forest Algorithm
...Show More Authors

An intrusion detection system (IDS) is key to having a comprehensive cybersecurity solution against any attack, and artificial intelligence techniques have been combined with all the features of the IoT to improve security. In response to this, in this research, an IDS technique driven by a modified random forest algorithm has been formulated to improve the system for IoT. To this end, the target is made as one-hot encoding, bootstrapping with less redundancy, adding a hybrid features selection method into the random forest algorithm, and modifying the ranking stage in the random forest algorithm. Furthermore, three datasets have been used in this research, IoTID20, UNSW-NB15, and IoT-23. The results are compared with the three datasets men

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Thu Sep 01 2011
Journal Name
Journal Of Economics And Administrative Sciences
Target cost tool to achieve competitive advantage
...Show More Authors

Target costing is one of the modern techniques in strategic Management accounting, Is has shown active adoption to changes in current business environments, In addition, is has seen a growth in strategic approach, The goal of using target costing is to build and strengthen competition abilities of economic units through introducing appropriate ways to decrease cost values while maintaining and improving quality of product, So this study is aim to show how can  economic units use target costing to achieve competitive advantages .

 

View Publication Preview PDF
Crossref
Publication Date
Wed Apr 01 2020
Journal Name
Journal Of Construction Engineering And Management
Development of Assessment Tool for Workforce Sustainability
...Show More Authors

View Publication
Scopus (45)
Crossref (41)
Scopus Clarivate Crossref
Publication Date
Sun Dec 06 2009
Journal Name
Baghdad Science Journal
Study of the Porosity of Certain pharmaceutical Tablets using Mercury Intrusion Porosimeter
...Show More Authors

Porosity and pore structure are important characteristics of pharmaceutical tablets, since they influence the physical properties, such as mechanical strength, density and disintegration time. This paper is an attempt to investigate the pore structure of four different paracetamol tablets based on mercury porosimetry. The intrusion volumes of mercury were used to calculate the pore diameter, pore volume and pore size distribution. The result obtained indicate that the variation of the pore volume in the tablets followed the sequence:- S.D.I. Iraq? Pharmacare,Dubai-U.A.E.? Bron and Burk(UK) London?Lark Laboratories(India), while the variation of surface area followed the sequence:- S.D.I. Iraq? Lark Laboratories(India)? Pharmacare,Dubai-U.A

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Thu Dec 01 2011
Journal Name
Aes-atema International Conference Series - Advances And Trends In Engineering Materials And Their Applications
Effect of new tool geometry on weld strength of AA2024 aluminum alloy plates welded by friction stir spot welding process
...Show More Authors

A new tool geometry was used to achieve friction stir spot welding (FSSW) in which the shoulder was designed separately from the rotating pin, and in order to examine weldment strength through the modified tool, a lap joints of AA2024 aluminum alloy plate 1 mm thick were welded successfully by using 6 mm pin diameter and varying process parameters (rotational speeds, tool nose geometry, and depth of tool penetration in the lower welded plate). Experimental tests indicate that the maximum average tensile shear load was 3100 N at the best selected condition. Microstructure examination and micro hardness test along the spot zones were investigated as well as measuring pin penetration load. Visual inspection of the welded spot surface shows a g

... Show More
Scopus
Publication Date
Sat Dec 31 2022
Journal Name
Al-kindy College Medical Journal
Lifestyle Medicine: A Promising tool to Restoring Health
...Show More Authors

Lifestyle Medicine is the application of evidence-based lifestyle approaches for the prevention, treatment, and even the reversal of lifestyle-related chronic diseases such as diabetes, hypertension, heart disease, obesity, polycystic ovarian diseases, dementia, arthritis, and cancers

View Publication Preview PDF
Crossref
Publication Date
Fri Dec 01 2017
Journal Name
2017 12th International Conference For Internet Technology And Secured Transactions (icitst)
A novel multimedia-forensic analysis tool (M-FAT)
...Show More Authors

View Publication
Scopus (3)
Crossref (2)
Scopus Crossref
Publication Date
Sun Jun 20 2021
Journal Name
Baghdad Science Journal
Performance Evaluation of Intrusion Detection System using Selected Features and Machine Learning Classifiers
...Show More Authors

Some of the main challenges in developing an effective network-based intrusion detection system (IDS) include analyzing large network traffic volumes and realizing the decision boundaries between normal and abnormal behaviors. Deploying feature selection together with efficient classifiers in the detection system can overcome these problems.  Feature selection finds the most relevant features, thus reduces the dimensionality and complexity to analyze the network traffic.  Moreover, using the most relevant features to build the predictive model, reduces the complexity of the developed model, thus reducing the building classifier model time and consequently improves the detection performance.  In this study, two different sets of select

... Show More
View Publication Preview PDF
Scopus (26)
Crossref (18)
Scopus Clarivate Crossref
Publication Date
Mon Jul 01 2024
Journal Name
Journal Of Engineering
Efficient Intrusion Detection Through the Fusion of AI Algorithms and Feature Selection Methods
...Show More Authors

With the proliferation of both Internet access and data traffic, recent breaches have brought into sharp focus the need for Network Intrusion Detection Systems (NIDS) to protect networks from more complex cyberattacks. To differentiate between normal network processes and possible attacks, Intrusion Detection Systems (IDS) often employ pattern recognition and data mining techniques. Network and host system intrusions, assaults, and policy violations can be automatically detected and classified by an Intrusion Detection System (IDS). Using Python Scikit-Learn the results of this study show that Machine Learning (ML) techniques like Decision Tree (DT), Naïve Bayes (NB), and K-Nearest Neighbor (KNN) can enhance the effectiveness of an Intrusi

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Thu Jan 20 2022
Journal Name
Webology
Hybrid Intrusion Detection System based on DNA Encoding, Teiresias Algorithm and Clustering Method
...Show More Authors

Until recently, researchers have utilized and applied various techniques for intrusion detection system (IDS), including DNA encoding and clustering that are widely used for this purpose. In addition to the other two major techniques for detection are anomaly and misuse detection, where anomaly detection is done based on user behavior, while misuse detection is done based on known attacks signatures. However, both techniques have some drawbacks, such as a high false alarm rate. Therefore, hybrid IDS takes advantage of combining the strength of both techniques to overcome their limitations. In this paper, a hybrid IDS is proposed based on the DNA encoding and clustering method. The proposed DNA encoding is done based on the UNSW-NB15

... Show More
View Publication
Crossref (3)
Crossref