Preferred Language
Articles
/
Nxbp4osBVTCNdQwCl-N8
Anomaly Based Intrusion Detection System Using Hierarchical Classification and Clustering Techniques
...Show More Authors

With the rapid development of computers and network technologies, the security of information in the internet becomes compromise and many threats may affect the integrity of such information. Many researches are focused theirs works on providing solution to this threat. Machine learning and data mining are widely used in anomaly-detection schemes to decide whether or not a malicious activity is taking place on a network. In this paper a hierarchical classification for anomaly based intrusion detection system is proposed. Two levels of features selection and classification are used. In the first level, the global feature vector for detection the basic attacks (DoS, U2R, R2L and Probe) is selected. In the second level, four local feature vectors to determine the sub-class of each attack type are selected. Features are evaluated to measure its discrimination ability among classes. K-Means clustering algorithm is then used to cluster each class into two clusters. SFFS and ANN are used in hierarchical basis to select the relevant features and classify the query behavior to proper intrusion type. Experimental evaluation on NSL-KDD, a filtered version of the original KDD99 has shown that the proposed IDS can achieve good performance in terms of intrusions detection and recognition.

Scopus Clarivate Crossref
View Publication
Publication Date
Sun Dec 07 2014
Journal Name
Baghdad Science Journal
Studying Association between Thyroid Disorders and Helicobacter pylori infection in Iraqi Patients
...Show More Authors

This study was aimed to investigate the association between thyroid disorder and Helicobacter pylori infection in 122 patients (100 females and 22 males )and for comparison, 60 healthy individuals (31females and 29 males),who had no thyroid disorder, were also included in the study. Blood samples were collected from both patients and the healthier individuals. Enzyme Linked Fluorescent Assay (ELFA) technique through using Vitek Immuno Diagnostic Assay System (VIDAS) was applied to measure levels of the thyroid hormones (tri-iodothyronine T3, tetra-iodothyroxine T4) and thyroid stimulating hormone (TSH). From the results obtained, patients were classified into three groups: 40 were

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Thu Aug 31 2023
Journal Name
Materials
Comparative Analysis of Reinforced Asphalt Concrete Overlays: Effects of Thickness and Temperature
...Show More Authors

Reflection cracking in asphalt concrete (AC) overlays is a common form of pavement deterioration that occurs when underlying cracks and joints in the pavement structure propagate through an overlay due to thermal and traffic-induced movement, ultimately degrading the pavement’s lifespan and performance. This study aims to determine how alterations in overlay thickness and temperature conditions, the incorporation of chopped fibers, and the use of geotextiles influence the overlay’s capacity to postpone the occurrence of reflection cracking. To achieve the above objective, a total of 36 prism specimens were prepared and tested using an overlay testing machine (OTM). The variables considered in this study were the thickness of the

... Show More
Scopus (6)
Crossref (7)
Scopus Clarivate Crossref
Publication Date
Fri Jun 23 2023
Journal Name
Communications In Mathematical Biology And Neuroscience
The dynamic of an eco-epidemiological model involving fear and hunting cooperation
...Show More Authors

In the present paper, an eco-epidemiological model consisting of diseased prey consumed by a predator with fear cost, and hunting cooperation property is formulated and studied. It is assumed that the predator doesn’t distinguish between the healthy prey and sick prey and hence it consumed both. The solution’s properties such as existence, uniqueness, positivity, and bounded are discussed. The existence and stability conditions of all possible equilibrium points are studied. The persistence requirements of the proposed system are established. The bifurcation analysis near the non-hyperbolic equilibrium points is investigated. Numerically, some simulations are carried out to validate the main findings and obtain the critical values of th

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Sun Sep 01 2013
Journal Name
Baghdad Science Journal
Antioxidant and free radical scavenging effects of Iraqi sumac ( Rhus coriaria L)
...Show More Authors

This study was carried out to evaluate the antioxidant activity of Iraqi sumac seeds (Rhus coriaria. L) (Anacardiaceae). Total phenolic compounds and flavoniods were determined in three different sumac seed extracts (SSE) (aqueous,ethanolic and methanolic extract). For extraction Antioxidant activity of SSE were evaluated by various antioxidant assays, including total antioxidant capacity, reducing power,by using 1,1-diphenyl-2-picryl hydrazyl (DPPH) radical scavenging, nitric oxide scavenging, Hydroxyl radical scavenging, and metal ion chelating activities. These various antioxidant activities were compared with ascorbic acid as a standard antioxidant.The results showed that the three(SSE), contained large amounts of phenolic and flavonio

... Show More
View Publication Preview PDF
Crossref (9)
Crossref
Publication Date
Mon Aug 01 2022
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
A survey of deepfakes in terms of deep learning and multimedia forensics
...Show More Authors

Artificial intelligence techniques are reaching us in several forms, some of which are useful but can be exploited in a way that harms us. One of these forms is called deepfakes. Deepfakes is used to completely modify video (or image) content to display something that was not in it originally. The danger of deepfake technology impact on society through the loss of confidence in everything is published. Therefore, in this paper, we focus on deepfakedetection technology from the view of two concepts which are deep learning and forensic tools. The purpose of this survey is to give the reader a deeper overview of i) the environment of deepfake creation and detection, ii) how deep learning and forensic tools contributed to the detection

... Show More
View Publication
Scopus (3)
Crossref (2)
Scopus Crossref
Publication Date
Sun Jan 01 2017
Journal Name
Journal Of Epidemiology And Global Health
Incidence and prevalence rates of diabetes mellitus in Saudi Arabia: An overview
...Show More Authors

View Publication
Scopus (213)
Crossref (220)
Scopus Clarivate Crossref
Publication Date
Thu Jun 01 2017
Journal Name
Karbala International Journal Of Modern Science
The prevalence of Giardia lamblia and Entamoeba histolytica/dispar among Iraqi provinces
...Show More Authors

View Publication Preview PDF
Scopus (21)
Crossref (8)
Scopus Crossref
Publication Date
Sun Jun 01 2025
Journal Name
Methodsx
How mathematical models might predict desertification from global warming and dust pollutants
...Show More Authors

View Publication
Scopus (6)
Crossref (7)
Scopus Clarivate Crossref
Publication Date
Sat Apr 23 2022
Journal Name
Research Journal Of Pharmacy And Technology
Synthesis, and Antimicrobial Evaluation of New hydrazone Derivatives of (2,4-dinitrophenyl) hydrazine
...Show More Authors

In this work, novel compounds of hydrazones derived from (2,4-dinitrophenyl) hydrazine were synthesized. Benzamides derivatives and sulfonamides derivatives were prepared from p-amino benzaldehyde. Then these compounds were condensed with (2,4-dinitrophenyl) hydrazine through Imine bond formation to give hydrazones compounds. The compounds were characterized using FT-IR (IR Affinity-1) spectrometer, and 1HNMR analyses. The majority of the compounds have a moderate antimicrobial activity against “Gram-positive bacteria staphylococcus Aureus, and staphylococcus epidermidis, Gram-negative bacteria Escherichia coli, and Klebsiella pneumoniae, and fungi species Candida albicans” using concentrations of 250 µg\ml.

View Publication Preview PDF
Scopus (8)
Crossref (2)
Scopus Crossref
Publication Date
Sun Oct 05 2025
Journal Name
Mesopotamian Journal Of Computer Science
DGEN: A Dynamic Generative Encryption Network for Adaptive and Secure Image Processing
...Show More Authors

Cyber-attacks keep growing. Because of that, we need stronger ways to protect pictures. This paper talks about DGEN, a Dynamic Generative Encryption Network. It mixes Generative Adversarial Networks with a key system that can change with context. The method may potentially mean it can adjust itself when new threats appear, instead of a fixed lock like AES. It tries to block brute‑force, statistical tricks, or quantum attacks. The design adds randomness, uses learning, and makes keys that depend on each image. That should give very good security, some flexibility, and keep compute cost low. Tests still ran on several public image sets. Results show DGEN beats AES, chaos tricks, and other GAN ideas. Entropy reached 7.99 bits per pix

... Show More
View Publication
Crossref