Preferred Language
Articles
/
NEJ72ZkBMeyNPGM3Wbmt
Enhanced IOT Cyber-Attack Detection Using Grey Wolf Optimized Feature Selection and Adaptive SMOTE
...Show More Authors

The Internet of Things (IoT) has significantly transformed modern systems through extensive connectivity but has also concurrently introduced considerable cybersecurity risks. Traditional rule-based methods are becoming increasingly insufficient in the face of evolving cyber threats.  This study proposes an enhanced methodology utilizing a hybrid machine-learning framework for IoT cyber-attack detection. The framework integrates a Grey Wolf Optimizer (GWO) for optimal feature selection, a customized synthetic minority oversampling technique (SMOTE) for data balancing, and a systematic approach to hyperparameter tuning of ensemble algorithms: Random Forest (RF), XGBoost, and CatBoost. Evaluations on the RT-IoT2022 dataset demonstrate that GWO reduces features from 32 to 21, thereby enhancing computational efficiency and interpretability without compromising accuracy, while customized SMOTE addresses class imbalance and enhances minority-class detection. The optimized RF and XGBoost models were assessed using accuracy, precision, recall, and F1-score metrics, and achieved 100% accuracy with strong generalization. These results highlight the effectiveness of optimization-based feature selection and data balancing in improving IoT security that is extensible to deep learning and ensemble-based approaches.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Nov 02 2023
Journal Name
Journal Of Engineering
An Improved Adaptive Spiral Dynamic Algorithm for Global Optimization
...Show More Authors

This paper proposes a new strategy to enhance the performance and accuracy of the Spiral dynamic algorithm (SDA) for use in solving real-world problems by hybridizing the SDA with the Bacterial Foraging optimization algorithm (BFA). The dynamic step size of SDA makes it a useful exploitation approach. However, it has limited exploration throughout the diversification phase, which results in getting trapped at local optima. The optimal initialization position for the SDA algorithm has been determined with the help of the chemotactic strategy of the BFA optimization algorithm, which has been utilized to improve the exploration approach of the SDA. The proposed Hybrid Adaptive Spiral Dynamic Bacterial Foraging (HASDBF)

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Mar 01 2019
Journal Name
Al-khwarizmi Engineering Journal
Feature - Based Approach to Automatic Fixturing System Planning For Uniform Polyhedra Workpiece
...Show More Authors

This paper demonstrates the design of an algorithm to represent the design stages of fixturing system that serve in increasing the flexibility and automation of fixturing system planning for uniform polyhedral part. This system requires building a manufacturing feature recognition algorithm to present or describe inputs such as (configuration of workpiece) and built database system to represents (production plan and fixturing system exiting) to this algorithm. Also knowledge – base system was building or developed to find the best fixturing analysis (workpiece setup, constraints of workpiece and arrangement the contact on this workpiece) to workpiece.

View Publication Preview PDF
Publication Date
Thu Oct 01 2020
Journal Name
Ieee Transactions On Artificial Intelligence
Recursive Multi-Signal Temporal Fusions With Attention Mechanism Improves EMG Feature Extraction
...Show More Authors

View Publication
Scopus (33)
Crossref (28)
Scopus Crossref
Publication Date
Mon Dec 01 2014
Journal Name
2014 Ieee Student Conference On Research And Development
Feature extraction for co-occurrence-based cosine similarity score of text documents
...Show More Authors

View Publication
Scopus (10)
Crossref (10)
Scopus Crossref
Publication Date
Mon Dec 20 2021
Journal Name
Baghdad Science Journal
User Quality of Experience (QoE) Satisfaction for Video Content Selection (VCS) Framework in Smartphone Devices
...Show More Authors

Video streaming is widely available nowadays. Moreover, since the pandemic hit all across the globe, many people stayed home and used streaming services for news, education,  and entertainment. However,   when streaming in session, user Quality of Experience (QoE) is unsatisfied with the video content selection while streaming on smartphone devices. Users are often irritated by unpredictable video quality format displays on their smartphone devices. In this paper, we proposed a framework video selection scheme that targets to increase QoE user satisfaction. We used a video content selection algorithm to map the video selection that satisfies the user the most regarding streaming quality. Video Content Selection (VCS) are classified in

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Clarivate Crossref
Publication Date
Tue Jun 30 2015
Journal Name
College Of Islamic Sciences
· Bug selection for names                   In the interpretation of the long sea
...Show More Authors

Whoever contemplates the Qur'an and recites its texts finds that the Qur'an did not invent or invent words that were unknown before it. Rather, it is the language of the Qur'an which deals with all the matters of the saying. He chose the most honorable of the materials and connected them to the meaning. And in the places of prosperity or sweetness, we find his words easy, to go into the midst of the ills for which it is The Holy Quran chose vocabulary and structures without The son of Ajeeba was one of those distinguished by high taste and linguistic sciences. This ability helped him to analyze and draw, and to explain the ills for which he influenced the singular On the other, and installed on another, and to show the efforts of Ibn Aje

... Show More
View Publication Preview PDF
Publication Date
Sat Oct 18 2025
Journal Name
Journal Of Physical Education
Comparing Angiotensin Gene polymorphisms According to Mechanical Ability for Weightlifter Selection
...Show More Authors

View Publication
Publication Date
Sat Jan 01 2022
Journal Name
Journal Of The Mechanical Behavior Of Materials
Identifying the selection criteria of design consultant for Iraqi construction projects
...Show More Authors
Abstract<p>The quality and cost of constructed buildings are heavily influenced by the performance of design/auditing consultants. Thus, selecting the right design consultant and design auditing consultants is of utmost importance and not an easy task for any construction client. so, the client should specify the efficiency criteria and assess the performance levels of the design and design auditing consultant firm. The study aims to identify the selection criteria of the design consultant in construction projects and also identify the selection criteria of the design auditing consultant for the construction projects by using the Delphi survey with applying the principal components analysis (PCA</p> ... Show More
View Publication
Scopus (1)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Wed Mar 01 2017
Journal Name
Superlattices And Microstructures
Enhanced photoelectrochemical performance of ZnO nanorod arrays decorated with CdS shell and Ag2S quantum dots
...Show More Authors

View Publication
Scopus (21)
Crossref (19)
Scopus Clarivate Crossref
Publication Date
Wed Jan 01 2025
Journal Name
Iv. International Rimar Congress Of Pure, Applied Sciences
A New Intrusion Detection Approach Based on RNA Encoding and K-Means Clustering Algorithm Using KDD-Cup99 Dataset
...Show More Authors

Intrusion detection systems (IDS) are useful tools that help security administrators in the developing task to secure the network and alert in any possible harmful event. IDS can be classified either as misuse or anomaly, depending on the detection methodology. Where Misuse IDS can recognize the known attack based on their signatures, the main disadvantage of these systems is that they cannot detect new attacks. At the same time, the anomaly IDS depends on normal behaviour, where the main advantage of this system is its ability to discover new attacks. On the other hand, the main drawback of anomaly IDS is high false alarm rate results. Therefore, a hybrid IDS is a combination of misuse and anomaly and acts as a solution to overcome the dis

... Show More
Preview PDF