Preferred Language
Articles
/
Nxbp4osBVTCNdQwCl-N8
Anomaly Based Intrusion Detection System Using Hierarchical Classification and Clustering Techniques
...Show More Authors

With the rapid development of computers and network technologies, the security of information in the internet becomes compromise and many threats may affect the integrity of such information. Many researches are focused theirs works on providing solution to this threat. Machine learning and data mining are widely used in anomaly-detection schemes to decide whether or not a malicious activity is taking place on a network. In this paper a hierarchical classification for anomaly based intrusion detection system is proposed. Two levels of features selection and classification are used. In the first level, the global feature vector for detection the basic attacks (DoS, U2R, R2L and Probe) is selected. In the second level, four local feature vectors to determine the sub-class of each attack type are selected. Features are evaluated to measure its discrimination ability among classes. K-Means clustering algorithm is then used to cluster each class into two clusters. SFFS and ANN are used in hierarchical basis to select the relevant features and classify the query behavior to proper intrusion type. Experimental evaluation on NSL-KDD, a filtered version of the original KDD99 has shown that the proposed IDS can achieve good performance in terms of intrusions detection and recognition.

Scopus Clarivate Crossref
View Publication
Publication Date
Mon Jan 01 2018
Journal Name
Aip Conference Proceedings
Indoor 222Rn measurement and hazards indices in houses of Al-Najaf province – Iraq
...Show More Authors

View Publication
Scopus (4)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Tue Dec 30 2008
Journal Name
Al-kindy College Medical Journal
Left Ventricular Hypertrophy in Diabetic Patients and Its Relation to Other Diabetic Complications
...Show More Authors

Background: left ventricular hypertrophy is independent risk factor for cardiovascular morbidity and mortality. The presence of diabetic complications such as autonomic neuropathy and retinopathy may predict cardiac structural changes in diabetic patients. Objective: To explore the chance of occurrence of left ventricular hypertrophy in diabetic patients and whether it is related to the presence of other diabetic complications. Methods: ninty seven (97) normotensive diabetic patients (57) type II with mean duration of diabetes of (12±6 y) and forty (40) type I with mean duration of (8±6 y) were studied by echocardiography and compared with 41 patients as control. Results: The LVMI was significantly higher in type II diabetics compared

... Show More
View Publication Preview PDF
Publication Date
Fri Jul 21 2023
Journal Name
Journal Of Engineering
Comparison Study between Iraqi Conditions of Contract and FIDIC Conditions- The Red Book
...Show More Authors

Reconstruction in Iraq requires coherent legitimate frameworks that are able to detail obligations, rights and responsibilities of the parties participating in reconstruction projects, regardless their type or delivery system.
Conditions of Contract can be considered an important component of these frameworks. This paper investigates flexibility and appropriateness of the application of Iraqi conditions of contract in reconstruction projects. These conditions were compared to FIDIC Conditions. The objective wasn't comparing individual clauses, but rather exploring the principles and philosophy laying behind each conditions, and to what extent each conditions care about realizing equity between main contract parties. Validity of applic

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Dec 15 2018
Journal Name
Journal Of The College Of Education For Women
Camille Ben Ziad and his Place in the Arab-Islamic Heritage (Historical Study)
...Show More Authors

In a quick reading of the character of Camille Ben Ziad al-Nekha al-Kufi al-Taabi, one of the most sincere companions of Imam Ali (peace be upon him), he enjoyed great status and status because he was one of the people of his people who lived alongside Imam Ali (peace be upon him) since his tribe migrated from Yemen to Kufa To this end, he became loyal during the reign of Imam Ali (peace be upon him), who is also a member of the delegation coming from Kufa to protest against the actions of the Wali of Kufa during the reign of Caliph Uthman ibn Affan. After the death of Caliph Uthman bin Affan, (Peace and blessings of Allaah be upon him) (Duaa kamil), one of the most famous and important supplications in Islamic history, and each one of u

... Show More
View Publication Preview PDF
Publication Date
Mon Jun 19 2023
Journal Name
Journal Of Engineering
Some Properties of Superplasticized and Retarding Concrete Under Effect of Accelerated Curing Methods
...Show More Authors

In recent decades, tremendous success has been achieved in the advancement of chemical admixtures for Portland cement concrete. Most efforts have concentrated on improving the properties of concrete and studying the factors that influence on these properties. Since the compressive strength is considered a valuable property and is invariably a vital element of the structural design, especially high early strength development which can be provide more benefits in concrete production, such as reducing construction time and labor and saving the formwork and energy. As a matter of fact, it is influenced as a most properties of concrete by several factors including water-cement ratio, cement type and curing methods employed.
Because of acce

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jul 18 2025
Journal Name
Al-anbar Journal Of Veterinary Sciences
The relation between sex and Ectoparasites intestation of Albushlumbo Pseudapocrypte dentatus in Iraq
...Show More Authors

View Publication
Publication Date
Wed Sep 15 2021
Journal Name
Al-academy
Poster design and its role in drug control: باسم محمد صالح مهدي الخالدي
...Show More Authors

Our dear country faces many and varied challenges aimed at its history, civilization, its people, the scourge of drugs and psychotropic substances and their misuse. Therefore, we have a historical, ethical and professional responsibility to coordinate efforts and cooperation between all concerned to protect the Iraqi society from the threat of this scourge. Creative sources have varied in the variety of expressive means in politics, literature and the arts, in their style and technical treatment of various topics with innovative manifestations and intuitive interactive with visions as well as influences Psychological expressive descriptions of visual scene, it is one of the media and propaganda that contribute to the raising and developm

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Jul 10 2018
Journal Name
Journal Of Global Pharma Technology
Synthesis, Spectral Studies and Biological Activity of Azo dye Complexes with Some MetalIons
...Show More Authors

2-(2-amino-5-nitro-phenylazo),-phenol was ready by grouping the diazonium salt of 2-aminophenol with 4-nitroaniline.Thegeometry of azo ligand(HL)was resolved on the origin of (C.H.N) analysis,1H and 13CNMR spectra, infrared spectra and UV–vis electronic absorption spectra. Dealing with the azo ligand produced with Rh+3 and La+3ataqueous ethanol for a 1:3 metal: ligand rate, and in perfect ph. The formation for compounds have been described by utilizing flame atomic, absorption,(C.H.N),Analyses, conductivity, infrared spectra and UV–vis spectral procedures. Nature in the produced compounds, have been studied, obey the ratio of mole and continuous, variance, manners, Beer's law, yielded up a concentration, rate (1×10-4- 3×10-4M),. High

... Show More
Preview PDF
Publication Date
Fri Jul 18 2025
Journal Name
Iraqi Journal Of Agricultural Sciences
EFFECT OF TILLAGE WITH CHISEL PLOW ON SOIL MEAN WEIGHT DIAMETER AND POROSITY
...Show More Authors

View Publication
Publication Date
Wed May 01 2013
Journal Name
Journal Of Computer Science
PROTOCOLS FOR SECURE ROUTING AND TRANSMISSION IN MOBILE AD HOC NETWORK: A REVIEW
...Show More Authors

Mobile ad hoc network security is a new area for research that it has been faced many difficulties to implement. These difficulties are due to the absence of central authentication server, the dynamically movement of the nodes (mobility), limited capacity of the wireless medium and the various types of vulnerability attacks. All these factor combine to make mobile ad hoc a great challenge to the researcher. Mobile ad hoc has been used in different applications networks range from military operations and emergency disaster relief to community networking and interaction among meeting attendees or students during a lecture. In these and other ad hoc networking applications, security in the routing protocol is necessary to protect against malic

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (5)
Scopus Crossref