Preferred Language
Articles
/
Nxbp4osBVTCNdQwCl-N8
Anomaly Based Intrusion Detection System Using Hierarchical Classification and Clustering Techniques
...Show More Authors

With the rapid development of computers and network technologies, the security of information in the internet becomes compromise and many threats may affect the integrity of such information. Many researches are focused theirs works on providing solution to this threat. Machine learning and data mining are widely used in anomaly-detection schemes to decide whether or not a malicious activity is taking place on a network. In this paper a hierarchical classification for anomaly based intrusion detection system is proposed. Two levels of features selection and classification are used. In the first level, the global feature vector for detection the basic attacks (DoS, U2R, R2L and Probe) is selected. In the second level, four local feature vectors to determine the sub-class of each attack type are selected. Features are evaluated to measure its discrimination ability among classes. K-Means clustering algorithm is then used to cluster each class into two clusters. SFFS and ANN are used in hierarchical basis to select the relevant features and classify the query behavior to proper intrusion type. Experimental evaluation on NSL-KDD, a filtered version of the original KDD99 has shown that the proposed IDS can achieve good performance in terms of intrusions detection and recognition.

Scopus Clarivate Crossref
View Publication
Publication Date
Wed Aug 31 2022
Journal Name
International Journal Of Intelligent Engineering And Systems
Performance Evaluation Based on Multi-UAV in Airborne Computer Network System
...Show More Authors

View Publication
Scopus (5)
Crossref (1)
Scopus Crossref
Publication Date
Sun Jan 01 2023
Journal Name
Computers, Materials & Continua
Severity Based Light-Weight Encryption Model for Secure Medical Information System
...Show More Authors

View Publication
Scopus (21)
Crossref (35)
Scopus Clarivate Crossref
Publication Date
Wed Jul 12 2023
Journal Name
Energies
Finite Time Disturbance Observer Based on Air Conditioning System Control Scheme
...Show More Authors

A novel robust finite time disturbance observer (RFTDO) based on an independent output-finite time composite control (FTCC) scheme is proposed for an air conditioning-system temperature and humidity regulation. The variable air volume (VAV) of the system is represented by two first-order mathematical models for the temperature and humidity dynamics. In the temperature loop dynamics, a RFTDO temperature (RFTDO-T) and an FTCC temperature (FTCC-T) are designed to estimate and reject the lumped disturbances of the temperature subsystem. In the humidity loop, a robust output of the FTCC humidity (FTCC-H) and RFTDO humidity (RFTDO-H) are also designed to estimate and reject the lumped disturbances of the humidity subsystem. Based on Lyapunov theo

... Show More
View Publication
Scopus (13)
Crossref (13)
Scopus Clarivate Crossref
Publication Date
Sun Jan 01 2012
Journal Name
International Journal Of Reasoning-based Intelligent Systems
SLMS: a smart library management system based on an RFID technology
...Show More Authors

View Publication
Scopus (23)
Crossref (13)
Scopus Crossref
Publication Date
Tue Jan 01 2019
Journal Name
Cogent Engineering
IEC 60909 and ANSI standards comparison with ASCC based fault calculations of Iraqi power system
...Show More Authors

View Publication
Scopus (5)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Tue Nov 13 2012
Journal Name
Wireless Personal Communications
Design and Implementation of a Scalable RFID-Based Attendance System with an Intelligent Scheduling Technique
...Show More Authors

View Publication
Scopus (17)
Crossref (8)
Scopus Clarivate Crossref
Publication Date
Fri Dec 25 2020
Journal Name
Al-nahrain Journal For Engineering Sciences
Comparison Sequences of Pick and Place System Controlled Using PLC
...Show More Authors

Pick and place system is one of the significant employments of modern robots utilized in industrial environments. The objective of this research is to make a comparison of time sequences by combining multiple axes of sequences. A pick-place system implemented with pneumatic linear double-acting cylinders to applicator in automated systems processes for manufacturing. The challenge of 3-axes movement control was achieved using the PLC (Programmable Logic Controller) controller such that the merging between two or three axes was achieved according to the selected sequence of the program. The outcomes show the contrasted sequences and the reference in a constant velocity. The main variable parameter is the number of steps for each sequ

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Sun Dec 01 2019
Journal Name
Al-khwarizmi Engineering Journal
Evaluation and Improvement of Manufacturing System Using Computer Software Arena
...Show More Authors

The main purpose of the paper is to identify the controllability of an existing production system; yogurt production line in Abu Ghraib Dairy Factory which has several machines of food processing and packing that has been studied. Through the starting of analysis, instability in production has been found in the factory. The analysis is built depending on experimental observation and data collection for different processing time of the machines, and statistical analysis has been conducted to model the production system. Arena Software is applied for simulating and analyzing the current state of the production system, and results are expanded to improve the system production and efficiency. Research method is applied to contribute in knowi

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Sat Mar 19 2022
Journal Name
Al-khwarizmi Engineering Journal
Enhancement of System Security by Using LSB and RSA Algorithms
...Show More Authors

A steganography hides information within other information, such as file, message, picture, or video. A cryptography is the science of converting the information from a readable form to an unreadable form for unauthorized person. The main problem in the stenographic system is embedding in cover-data without providing information that would facilitate its removal. In this research, a method for embedding data into images is suggested which employs least significant bit Steganography (LSB) and ciphering (RSA algorithm) to protect the data. System security will be enhanced by this collaboration between steganography and cryptography.

View Publication Preview PDF
Scopus (4)
Crossref (3)
Scopus Crossref
Publication Date
Tue Nov 01 2016
Journal Name
2016 International Conference On Advanced Mechatronic Systems (icamechs)
Hierarchical sliding mode control applied to a single-link flexible joint robot manipulator
...Show More Authors

Trajectory tracking and vibration suppression are essential objectives in a flexible joint manipulator control. The flexible joint manipulator is an under-actuated system, in which the number of control actions is less than the degree of freedom to be controlled. It is very challenging to control the underactuated nonlinear system with two degree of freedom. This paper presents a hierarchical sliding mode control (HSMC) for a rotary flexible joint manipulator (RFJM). Firstly, the rotary flexible joint manipulator is modeled by two subsystems. Secondly, the sliding surfaces for both subsystems are constructed. Finally, the control action is designed based on the Lyapunov function. Computer simulation results demonstrate the effectiveness of

... Show More
View Publication
Scopus (28)
Crossref (16)
Scopus Crossref