Preferred Language
Articles
/
Khc_Po8BVTCNdQwCSWWS
An experimental investigation on PCA based on cosine similarity and correlation for text feature dimensionality reduction
...Show More Authors

Scopus Crossref
View Publication
Publication Date
Wed Mar 01 2023
Journal Name
Journal Of Engineering
A An Authentication and Access Control Model for Healthcare based Cloud Services
...Show More Authors

Electronic Health Record (EHR) systems are used as an efficient and effective method of exchanging patients’ health information with doctors and other key stakeholders in the health sector to obtain improved patient treatment decisions and diagnoses. As a result, questions regarding the security of sensitive user data are highlighted. To encourage people to move their sensitive health records to cloud networks, a secure authentication and access control mechanism that protects users’ data should be established. Furthermore, authentication and access control schemes are essential in the protection of health data, as numerous responsibilities exist to ensure security and privacy in a network. So, the main goal of our s

... Show More
View Publication Preview PDF
Crossref (10)
Crossref
Publication Date
Fri May 17 2019
Journal Name
Lecture Notes In Networks And Systems
Features Selection for Intrusion Detection System Based on DNA Encoding
...Show More Authors

Intrusion detection systems detect attacks inside computers and networks, where the detection of the attacks must be in fast time and high rate. Various methods proposed achieved high detection rate, this was done either by improving the algorithm or hybridizing with another algorithm. However, they are suffering from the time, especially after the improvement of the algorithm and dealing with large traffic data. On the other hand, past researches have been successfully applied to the DNA sequences detection approaches for intrusion detection system; the achieved detection rate results were very low, on other hand, the processing time was fast. Also, feature selection used to reduce the computation and complexity lead to speed up the system

... Show More
Scopus (5)
Scopus
Publication Date
Tue Jan 01 2013
Journal Name
International Journal Of Application Or Innovation In Engineering & Management (ijaiem)
Probabilistic Neural Network for User Authentication Based on Keystroke Dynamics
...Show More Authors

Computer systems and networks are increasingly used for many types of applications; as a result the security threats to computers and networks have also increased significantly. Traditionally, password user authentication is widely used to authenticate legitimate user, but this method has many loopholes such as password sharing, brute force attack, dictionary attack and more. The aim of this paper is to improve the password authentication method using Probabilistic Neural Networks (PNNs) with three types of distance include Euclidean Distance, Manhattan Distance and Euclidean Squared Distance and four features of keystroke dynamics including Dwell Time (DT), Flight Time (FT), mixture of (DT) and (FT), and finally Up-Up Time (UUT). The resul

... Show More
Publication Date
Sat Dec 01 2018
Journal Name
Journal Of Theoretical And Applied Information Technology
Matching Algorithms for Intrusion Detection System based on DNA Encoding
...Show More Authors

Pattern matching algorithms are usually used as detecting process in intrusion detection system. The efficiency of these algorithms is affected by the performance of the intrusion detection system which reflects the requirement of a new investigation in this field. Four matching algorithms and a combined of two algorithms, for intrusion detection system based on new DNA encoding, are applied for evaluation of their achievements. These algorithms are Brute-force algorithm, Boyer-Moore algorithm, Horspool algorithm, Knuth-Morris-Pratt algorithm, and the combined of Boyer-Moore algorithm and Knuth–Morris– Pratt algorithm. The performance of the proposed approach is calculated based on the executed time, where these algorithms are applied o

... Show More
Scopus (4)
Scopus
Publication Date
Mon Jan 02 2017
Journal Name
Al-nahrain Journal For Engineering Sciences (njes)
Experimental Investigation of Forced Convection Heat Transfer and Pressure Drop in Open Cell Aluminum Fins
...Show More Authors

Publication Date
Wed Sep 20 2017
Journal Name
Mechanical Sciences
Comparative experimental investigation and gap flow simulation in electrical discharge drilling using new electrode geometry
...Show More Authors

Abstract. This study presents experimental and numerical investigation on the effectiveness of electrode geometry on flushing and debris removal in Electrical Discharge Drilling (EDD) process. A new electrode geometry, namely side-cut electrode, was designed and manufactured based on circular electrode geometry. Several drilling operations were performed on stainless steel 304 using rotary tubular electrodes with circular and side-cut geometries. Drilling performance was characterized by Material Removal Rate (MRR), Electrode Wear Rate (EWR), and Tool Wear Ratio (TWR). Dimensional features and surface quality of drilled holes were evaluated based on Overcut (OC), Hole Depth (HD), and Surface Roughness (SR). Three-dimensional

... Show More
View Publication
Scopus (7)
Crossref (10)
Scopus Clarivate Crossref
Publication Date
Fri Jul 12 2024
Journal Name
World Water Policy
The effect of natural factors on changing soil uses in the marshes: An experimental study using Landsat satellite data
...Show More Authors

The study aimed to analyze the effect of meteorological factors (rainfall rate and temperature) on the change in land use in the marshes of the Al‐Majar Al‐Kabir region in southern Iraq. Satellite images from Landsat 7 for 2012 and Landsat 8 for 2022 were used to monitor changes in the land coverings, the images taken from the Enhanced Thematic Mapper Plus (ETM+) and Operational Land Imager (OLI) sensors of the Landsat satellite. Geometric correction was used to convert images into a format with precise geographic coordinates using ArcMap 10.5. The maximum likelihood classification method was used to examine satellite image data using a supervised approach, and the data were analyzed statistically. We obtained clear images of the area,

... Show More
View Publication
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Sat Jan 01 2022
Journal Name
Indonesian Journal Of Electrical Engineering And Computer Science
Construct an efficient distributed denial of service attack detection system based on data mining techniques
...Show More Authors

<span>Distributed denial-of-service (DDoS) attack is bluster to network security that purpose at exhausted the networks with malicious traffic. Although several techniques have been designed for DDoS attack detection, intrusion detection system (IDS) It has a great role in protecting the network system and has the ability to collect and analyze data from various network sources to discover any unauthorized access. The goal of IDS is to detect malicious traffic and defend the system against any fraudulent activity or illegal traffic. Therefore, IDS monitors outgoing and incoming network traffic. This paper contains a based intrusion detection system for DDoS attack, and has the ability to detect the attack intelligently, dynami

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (2)
Scopus Crossref
Publication Date
Tue Sep 01 2009
Journal Name
Journal Of Engineering
Experimental Investigation of Reinforced Concrete Flexural Beams Strengthened or Repaired with CFRP
...Show More Authors

Publication Date
Tue Jul 02 2019
Journal Name
Fibers
Experimental Investigation of the Behavior of Self-Form Segmental Concrete Masonry Arches
...Show More Authors

This research aims to introduce a new technique-off-site and self-form segmental concrete masonry arches fabrication, without the need of construction formwork or centering. The innovative construction method in the current study encompasses two construction materials forms the self-form masonry arches, wedge-shape plain concrete voussoirs, and carbon fiber-reinforced polymer (CFRP) composites. The employment of CFRP fabrics was for two main reasons: bonding the voussoirs and forming the masonry arches. In addition, CFRP proved to be efficient for strengthening the extrados of the arch rings under service loadings. An experimental test was conducted on four sophisticated masonry arch specimens. The research parameters were the Keystone thic

... Show More
View Publication Preview PDF
Scopus (15)
Crossref (10)
Scopus Clarivate Crossref