Preferred Language
Articles
/
Nxbp4osBVTCNdQwCl-N8
Anomaly Based Intrusion Detection System Using Hierarchical Classification and Clustering Techniques
...Show More Authors

With the rapid development of computers and network technologies, the security of information in the internet becomes compromise and many threats may affect the integrity of such information. Many researches are focused theirs works on providing solution to this threat. Machine learning and data mining are widely used in anomaly-detection schemes to decide whether or not a malicious activity is taking place on a network. In this paper a hierarchical classification for anomaly based intrusion detection system is proposed. Two levels of features selection and classification are used. In the first level, the global feature vector for detection the basic attacks (DoS, U2R, R2L and Probe) is selected. In the second level, four local feature vectors to determine the sub-class of each attack type are selected. Features are evaluated to measure its discrimination ability among classes. K-Means clustering algorithm is then used to cluster each class into two clusters. SFFS and ANN are used in hierarchical basis to select the relevant features and classify the query behavior to proper intrusion type. Experimental evaluation on NSL-KDD, a filtered version of the original KDD99 has shown that the proposed IDS can achieve good performance in terms of intrusions detection and recognition.

Scopus Clarivate Crossref
View Publication
Publication Date
Tue Sep 01 2020
Journal Name
Baghdad Science Journal
Using Dates Leaves Midribs to Prepare Hierarchical Structures Incorporating Porous Carbon and Zeolite A Composites for Cesium137Cs Ion Exchange
...Show More Authors

This study synthesized zeolite 4A, and hierarchical composite structure consisting of zeolite 4A- carbon were successfully prepared. Hydrothermal method was used to grow a layer of zeolite 4A over porous carbon surfaces to enhance mass transfer and increase surface area of zeolite. The products then were used to remove radioactive cesium137Cs from liquid wastewater. Iraqi dates leaves midribs (DM) were used as locally available agricultural waste to prepare low- cost porous carbon, using carbonization method in tubular furnace at 900C for two hours. Hierarchical porous structures including zeolite are prepared by mechanically activating the carbon surface via Ultrasonicating nanoparticles suspension of ground zeolite type 4A.F

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (6)
Scopus Clarivate Crossref
Publication Date
Fri Jan 01 2016
Journal Name
Middle-east Journal Of Scientific Research
Question Classification Using Different Approach: A Whole Review
...Show More Authors

Preview PDF
Publication Date
Sat Dec 01 2018
Journal Name
Al-nahrain Journal Of Science
Image Classification Using Bag of Visual Words (BoVW)
...Show More Authors

In this paper two main stages for image classification has been presented. Training stage consists of collecting images of interest, and apply BOVW on these images (features extraction and description using SIFT, and vocabulary generation), while testing stage classifies a new unlabeled image using nearest neighbor classification method for features descriptor. Supervised bag of visual words gives good result that are present clearly in the experimental part where unlabeled images are classified although small number of images are used in the training process.

View Publication Preview PDF
Crossref (23)
Crossref
Publication Date
Sun Aug 28 2022
Journal Name
Geodesy And Cartography
OBJECT-BASED APPROACHES FOR LAND USE-LAND COVER CLASSIFICATION USING HIGH RESOLUTION QUICK BIRD SATELLITE IMAGERY (A CASE STUDY: KERBELA, IRAQ)
...Show More Authors

Land Use / Land Cover (LULC) classification is considered one of the basic tasks that decision makers and map makers rely on to evaluate the infrastructure, using different types of satellite data, despite the large spectral difference or overlap in the spectra in the same land cover in addition to the problem of aberration and the degree of inclination of the images that may be negatively affect rating performance. The main objective of this study is to develop a working method for classifying the land cover using high-resolution satellite images using object based method. Maximum likelihood pixel based supervised as well as object approaches were examined on QuickBird satellite image in Karbala, Iraq. This study illustrated that

... Show More
View Publication
Scopus (10)
Crossref (4)
Scopus Crossref
Publication Date
Wed Nov 05 2025
Journal Name
Al-nahrain Journal Of Science
INTRUSION WINDOWS XP BY BACKDOOR TOOL
...Show More Authors

View Publication
Publication Date
Mon Feb 04 2019
Journal Name
Journal Of The College Of Education For Women
Use digital classification to follow change detection of al Razzazah sebkha For the period(1976-2013)
...Show More Authors

The Sebkha is considered the evaporative geomorphological features, where climate plays an active role. It forms part of the surface features in Mesopotamia plain of Iraqi, which is the most fertile lands, and because of complimentary natural and human factors turned most of the arable land to the territory of Sebkha lands. The use satellite image (Raw Data), Landsat 30M Mss for the year 1976 Landsat 7 ETM, and the Landsat 8 for year 2013 (LDCM) for the summer Landsat Data Continuity Mission and perform geometric correction, enhancements, and Subset image And a visual analysis Space visuals based on the analysis of spectral fingerprints earth's This study has shown that the best in the discrimination of Sebkha Remote sensing techniques a

... Show More
View Publication Preview PDF
Publication Date
Tue Jan 01 2019
Journal Name
Science International
USING CRYPTOANALYSIS POLICIES AND TECHNIQUES TO CREATE STRONG PASSWORD
...Show More Authors

Publication Date
Tue May 01 2018
Journal Name
Journal Of Physics: Conference Series
Hiding Techniques for Dynamic Encryption Text based on Corner Point
...Show More Authors

Hiding technique for dynamic encryption text using encoding table and symmetric encryption method (AES algorithm) is presented in this paper. The encoding table is generated dynamically from MSB of the cover image points that used as the first phase of encryption. The Harris corner point algorithm is applied on cover image to generate the corner points which are used to generate dynamic AES key to second phase of text encryption. The embedded process in the LSB for the image pixels except the Harris corner points for more robust. Experimental results have demonstrated that the proposed scheme have embedding quality, error-free text recovery, and high value in PSNR.

View Publication Preview PDF
Scopus (11)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Mon Jun 01 2020
Journal Name
Journal Of Engineering
Pilot Based Channel Estimation and Synchronization in OFDM System
...Show More Authors

Channel estimation and synchronization are considered the most challenging issues in Orthogonal Frequency Division Multiplexing (OFDM) system. OFDM is highly affected by synchronization errors that cause reduction in subcarriers orthogonality, leading to significant performance degradation. The synchronization errors cause two issues: Symbol Time Offset (STO), which produces inter symbol interference (ISI) and Carrier Frequency Offset (CFO), which results in inter carrier interference (ICI). The aim of the research is to simulate Comb type pilot based channel estimation for OFDM system showing the effect of pilot numbers on the channel estimation performance and propose a modified estimation method for STO with less numb

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Sun Dec 25 2022
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Detection of Epicatechin in Camellia sinensis Leaves by Thin Layer Chromatography and High Performance Liquid Chromatography Techniques
...Show More Authors

    The current study performed in order to detect and quantify epicatechin in two tea samples of Camellia sinensis (black and green tea) by thin layer chromatography (TLC) and high performance liquid chromatography (HPLC). Extraction of epicatechin from black and green tea was done by using two different methods: maceration (cold extraction method) and decoction (hot extraction method) involved using three different solvents which are  absolute ethanol, 50% aqueous ethanol and water  for both extraction methods using room temperature and direct heat respectively. Crude extracts of two tea samples that obtained from two methods were fractionated by using two solvents with different polarity (chloroform and

... Show More
View Publication Preview PDF
Scopus (2)
Scopus Crossref