Preferred Language
Articles
/
Nxbp4osBVTCNdQwCl-N8
Anomaly Based Intrusion Detection System Using Hierarchical Classification and Clustering Techniques
...Show More Authors

With the rapid development of computers and network technologies, the security of information in the internet becomes compromise and many threats may affect the integrity of such information. Many researches are focused theirs works on providing solution to this threat. Machine learning and data mining are widely used in anomaly-detection schemes to decide whether or not a malicious activity is taking place on a network. In this paper a hierarchical classification for anomaly based intrusion detection system is proposed. Two levels of features selection and classification are used. In the first level, the global feature vector for detection the basic attacks (DoS, U2R, R2L and Probe) is selected. In the second level, four local feature vectors to determine the sub-class of each attack type are selected. Features are evaluated to measure its discrimination ability among classes. K-Means clustering algorithm is then used to cluster each class into two clusters. SFFS and ANN are used in hierarchical basis to select the relevant features and classify the query behavior to proper intrusion type. Experimental evaluation on NSL-KDD, a filtered version of the original KDD99 has shown that the proposed IDS can achieve good performance in terms of intrusions detection and recognition.

Scopus Clarivate Crossref
View Publication
Publication Date
Mon Dec 05 2022
Journal Name
Journal Of Production And Industrial Engineering
The Use of Quantitative Techniques and Their Role in The Administrative Decision-Making Process in Organizations
...Show More Authors

Due to the developments taking place in the field of communications, informatics systems and knowledge management in the current century, and the obligations and burdens imposed on the business organization to keep pace with these developments, the traditional methods of administrative decision-making are no longer feasible, as recent trends have emerged in management that focus on the need to rely on quantitative methods such as operations research.. The latter is one of the results of World War II, which appeared for the first time in Britain to manage war operations. The first method used in this field is the linear programming method. The use of operations research has developed greatly in the past years, and the methods of analysis in

... Show More
Publication Date
Fri Sep 15 2023
Journal Name
Al-academy
Contemporary Iraqi arts techniques and their reflection on the products of the students of Art Education
...Show More Authors

The techniques of contemporary Iraqi painting and their reflection on the productions of students of art education is an important subject in the field of painting at the theoretical and practical levels in academic study, whether theoretical or practical. Al-Iraqi is one of the arts with historical roots and a distinguished position among other artistic genres. Painting has received a sufficient level of development through the use of various contemporary techniques to advance it for the better.
The methodological framework included the problem of research and the need for it, and then the importance of research came in shedding light on the techniques of contemporary Iraqi painting, and the impact of these techniques on the producti

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Aug 19 2024
Journal Name
Scientific Reports
An in-vitro evaluation of residual dentin retained after using novel enzymatic-based chemomechanical caries removal agents
...Show More Authors

To assess the biochemical, mechanical and structural characteristics of retained dentin after applying three novel bromelain‑contained chemomechanical caries removal (CMCR) formulations in comparison to the conventional excavation methods (hand and rotary) and a commercial papain‑contained gel (Brix 3000). Seventy‑two extracted permanent molars with natural occlusal carious lesions (score > 4 following the International Caries Detection and Assessment System (ICDAS‑II)) were randomly allocated into six groups (n = 12) according to the excavation methods: hand excavation, rotary excavation, Brix 3000, bromelain‑contained gel (F1), bromelain‑chloramine‑T (F2), and bromelain chlorhexidine gel (F3). The superficial and deepe

... Show More
View Publication
Scopus (2)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Sat May 01 2021
Journal Name
Journal Of Physics: Conference Series
Operational assessment of biological wastewater treatment using advanced return-mass reactors based on principal component cluster analysis
...Show More Authors
Abstract<p>In this study, field results data were conducted, implemented in 64 biofilm reactors to analyses extract organic matter nutrients from wastewater through a laboratory level nutrient removal process, biofilm layer moving process using anaerobic aerobic units. The kinetic layer biofilm reactors were continuously operating in Turbo 4BIO for BOD COD with nitrogen phosphorous. The Barakia plant is designed to serve 200,000 resident works on biological treatment through merge two process (activated sludge process, moving bed bio reactio MBBR) with an average wastewater flow of 50,000 m3/day the data were collected annually from 2017-2020. The water samples were analysis in the central labor</p> ... Show More
View Publication
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Mon Jul 01 2019
Journal Name
Biocatalysis And Agricultural Biotechnology
Determination of Diazinon in fruit samples using electrochemical sensor based on carbon nanotubes modified carbon paste electrode
...Show More Authors

View Publication
Scopus (50)
Crossref (45)
Scopus Crossref
Publication Date
Tue Dec 05 2023
Journal Name
Baghdad Science Journal
Robust Color Image Encryption Scheme Based on RSA via DCT by Using an Advanced Logic Design Approach
...Show More Authors

Information security in data storage and transmission is increasingly important. On the other hand, images are used in many procedures. Therefore, preventing unauthorized access to image data is crucial by encrypting images to protect sensitive data or privacy. The methods and algorithms for masking or encoding images vary from simple spatial-domain methods to frequency-domain methods, which are the most complex and reliable. In this paper, a new cryptographic system based on the random key generator hybridization methodology by taking advantage of the properties of Discrete Cosine Transform (DCT) to generate an indefinite set of random keys and taking advantage of the low-frequency region coefficients after the DCT stage to pass them to

... Show More
View Publication Preview PDF
Scopus (5)
Crossref (1)
Scopus Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Ieee Access
A Direct Solution Scheme for Wide-Angle Electromagnetic Scattering Problems Using Compressive Sensing-Based Method of Moments
...Show More Authors

View Publication
Scopus Clarivate Crossref
Publication Date
Thu Mar 29 2018
Journal Name
Construction Research Congress 2018
Consideration of Worker Safety in the Design Process: A Statistical-Based Approach Using Analysis of Variance (ANOVA)
...Show More Authors

View Publication
Scopus (1)
Crossref (3)
Scopus Crossref
Publication Date
Thu Feb 24 2022
Journal Name
Journal Of Educational And Psychological Researches
The Effect of using Project - Based Learning method in development intensive reading skills at middle school students
...Show More Authors

The purpose of this research is to identify the effect of the use of project-based learning in the development of intensive reading skills at middle school students. The experimental design was chosen from one group to suit the nature of the research and its objectives. The research group consisted of 35 students. For the purpose of the research, the following materials and tools were prepared: (List of intensive reading skills, intensive reading skills test, teacher's guide, student book). The results of the study showed that there were statistically significant differences at (0.05) in favor of the post-test performance of intensive reading skills. The statistical analysis also showed that the project-based learning approach has a high

... Show More
View Publication Preview PDF
Publication Date
Mon Sep 13 2021
Journal Name
Al-khwarizmi Engineering Journal
Optimization of Cutting Parameters for Milling Process of (4032) Al-Alloy using Taguchi-Based Grey Relational Analysis
...Show More Authors

The objective of this work is to study the influence of end milling cutting process parameters, tool material and geometry on multi-response outputs for 4032 Al-alloy. This can be done by proposing an approach that combines Taguchi method with grey relational analysis. Three cutting parameters have been selected (spindle speed, feed rate and cut depth) with three levels for each parameter. Three tools with different materials and geometry have been also used to design the experimental tests and runs based on matrix L9. The end milling process with several output characteristics is solved using a grey relational analysis. The results of analysis of variance (ANOVA) showed that the major influencing parameters on multi-objective response w

... Show More
View Publication Preview PDF
Scopus (1)
Crossref (1)
Scopus Crossref