Preferred Language
Articles
/
JRbIuIoBVTCNdQwCG6TV
A Novel DNA Sequence Approach for Network Intrusion Detection System Based on Cryptography Encoding Method
...Show More Authors

A novel method for Network Intrusion Detection System (NIDS) has been proposed, based on the concept of how DNA sequence detects disease as both domains have similar conceptual method of detection. Three important steps have been proposed to apply DNA sequence for NIDS: convert the network traffic data into a form of DNA sequence using Cryptography encoding method; discover patterns of Short Tandem Repeats (STR) sequence for each network traffic attack using Teiresias algorithm; and conduct classification process depends upon STR sequence based on Horspool algorithm. 10% KDD Cup 1999 data set is used for training phase. Correct KDD Cup 1999 data set is used for testing phase to evaluate the proposed method. The current experiment results show that the proposed system has obtained good results and these results are equal to 86.36%, 49.69%, and 77.65% for detection rate, false alarm rate and accuracy respectively. These results are considered as a better result when it is compared with the other previous basic algorithms. It is possible to conclude that DNA sequence has potential for NIDS solution and it has potential improvement using a better encoding method.

Scopus Crossref
View Publication
Publication Date
Sun Mar 01 2009
Journal Name
Baghdad Science Journal
ON NAIVE TAYLOR MODEL INTEGRATION METHOD
...Show More Authors

Interval methods for verified integration of initial value problems (IVPs) for ODEs have been used for more than 40 years. For many classes of IVPs, these methods have the ability to compute guaranteed error bounds for the flow of an ODE, where traditional methods provide only approximations to a solution. Overestimation, however, is a potential drawback of verified methods. For some problems, the computed error bounds become overly pessimistic, or integration even breaks down. The dependency problem and the wrapping effect are particular sources of overestimations in interval computations. Berz (see [1]) and his co-workers have developed Taylor model methods, which extend interval arithmetic with symbolic computations. The latter is an ef

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Jun 01 2023
Journal Name
Journal Of Engineering
Evaluating Roads Network Connectivity for Two Municipalities in Baghdad-Iraq
...Show More Authors

The road network serves as a hub for opportunities in production and consumption, resource extraction, and social cohabitation. In turn, this promotes a higher standard of living and the expansion of cities. This research explores the road network's spatial connectedness and its effects on travel and urban form in the Al-Kadhimiya and Al-Adhamiya municipalities. Satellite images and paper maps have been employed to extract information on the existing road network, including their kinds, conditions, density, and lengths. The spatial structure of the road network was then generated using the ArcGIS software environment. The road pattern connectivity was evaluated using graph theory indices. The study demands the abstractio

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Tue Nov 01 2022
Journal Name
Journal Of Engineering
Artificial Neural Network Model for Wastewater Projects Maintenance Management Plan
...Show More Authors

Wastewater projects are one of the most important infrastructure projects, which require developing strategic plans to manage these projects. Most of the wastewater projects in Iraq don’t have a maintenance plan. This research aims to prepare the maintenance management plan (MMP) for wastewater projects. The objective of the research is to predict the cost and time of maintenance projects by building a model using ANN. The research sample included (15) completed projects in Wasit Governorate, where the researcher was able to obtain the data of these projects through the historical information of the Wasit Sewage Directorate. In this research artificial neural networks (ANN) technique was used to build two models (cost

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Sat Jan 01 2022
Journal Name
Webology
Efficient Eye Recognition for Secure Systems Using Convolutional Neural Network
...Show More Authors

AA Abbass, HL Hussein, WA Shukur, J Kaabi, R Tornai, Webology, 2022 Individual’s eye recognition is an important issue in applications such as security systems, credit card control and guilty identification. Using video images cause to destroy the limitation of fixed images and to be able to receive users’ image under any condition as well as doing the eye recognition. There are some challenges in these systems; changes of individual gestures, changes of light, face coverage, low quality of video images and changes of personal characteristics in each frame. There is a need for two phases in order to do the eye recognition using images; revelation and eye recognition which will use in the security systems to identify the persons. The mai

... Show More
View Publication
Publication Date
Tue Feb 01 2022
Journal Name
Webology
Efficient Eye Recognition for Secure Systems using Convolutional Neural Network
...Show More Authors

Preview PDF
Publication Date
Thu Jun 01 2023
Journal Name
Journal Of Engineering
Evaluating Roads Network Connectivity for Two Municipalities in Baghdad-Iraq
...Show More Authors

The road network serves as a hub for opportunities in production and consumption, resource extraction, and social cohabitation. In turn, this promotes a higher standard of living and the expansion of cities. This research explores the road network's spatial connectedness and its effects on travel and urban form in the Al-Kadhimiya and Al-Adhamiya municipalities. Satellite images and paper maps have been employed to extract information on the existing road network, including their kinds, conditions, density, and lengths. The spatial structure of the road network was then generated using the ArcGIS software environment. The road pattern connectivity was evaluated using graph theory indices. The study demands the abstraction and examin

... Show More
Crossref (2)
Crossref
Publication Date
Sat Aug 01 2015
Journal Name
Journal Of Engineering
Development of a Blueprint Impact System of the risks on construction projects Implementation
...Show More Authors

In Production and Operations Management the specialists  have  tried to develop a strategy to counter the risks arising from the activities of the organization and of waste of various types and therefore the risk management in the contemporary framework represents a phenomenon of new quality, and can not be this phenomenon to take practical dimensions, but the development of culture of the organization towards the risks and deal with all aspects and paint ways to address them within an integrated program, and requires new skills and systems provide accurate information capable of coordination between the various parties within the organization.

     The research aims to develop a blu

... Show More
View Publication Preview PDF
Publication Date
Fri Nov 15 2024
Journal Name
Scientific Reports
Ag@WO3 core–shell nanocomposite for wide range photo detection
...Show More Authors

This study successfully synthesized high-performance photodetectors based on Ag-WO3 core–shell heterostructures using a simple and economical two-step pulsed laser ablation in water method and has investigated the electrical characteristics of the Ag@WO3 nanocomposite heterojunction. The Hall effect tests indicate that the synthesized Ag@WO3 exhibits n-type conduction with a Hall mobility of 1.25 × 103 cm2V-1S-1. Dark current–voltage properties indicated that the created heterojunctions displayed rectification capabilities, with the highest rectification factor of around 1.71 seen at a 5 V bias. A photodetector’s responsivity reveals the existence of two response peaks, which are situated in the ultraviolet and visible region. The ph

... Show More
View Publication
Scopus (1)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Sun Sep 01 2019
Journal Name
Al-khwarizmi Engineering Journal
Pneumatic Control System of Automatic Production Line Using Two Method of SCADA/HMI Implement PLC
...Show More Authors

This study focuses on the implementation of interfaces for human machine interaction (HMI) control and monitor automatic production line. The automatic production line can performance feeding, transportation, sorting functions. The objectives of this study are implemented two SCADA/HMI system using two different software. TIA portal software is used to build HMI, alarm, and trends in touch panel which is helped an operator to control and monitor the production line. LabVIEW software is used to build HMI and trends in the computer screen and is linked with Microsoft Excel (ME) to generate information table helped to monitor the performance of the pneumatic equipment. The production line can do performance feeding, transportation, sorting fun

... Show More
View Publication Preview PDF
Publication Date
Sun Sep 01 2019
Journal Name
Al-khwarizmi Engineering Journal
Pneumatic Control System of Automatic Production Line Using Two Method of SCADA/HMI Implement PLC
...Show More Authors

 

       This work focuses on the implementation of interfaces for human machine interaction (HMI) for control and monitor of automatic production line. The automatic production line which can performance feeding, transportation, sorting functions.      

            The objectives of this work are implemented two SCADA/HMI system using two different software. TIA portal software was used to build HMI, alarm, and trends in touch panel which are helped the operator to control and monitor the production line. LabVIEW software was used to build HMI and trends on the computer screen and was linked with Micros

... Show More
View Publication Preview PDF
Crossref (1)
Crossref