Preferred Language
Articles
/
Nxbp4osBVTCNdQwCl-N8
Anomaly Based Intrusion Detection System Using Hierarchical Classification and Clustering Techniques
...Show More Authors

With the rapid development of computers and network technologies, the security of information in the internet becomes compromise and many threats may affect the integrity of such information. Many researches are focused theirs works on providing solution to this threat. Machine learning and data mining are widely used in anomaly-detection schemes to decide whether or not a malicious activity is taking place on a network. In this paper a hierarchical classification for anomaly based intrusion detection system is proposed. Two levels of features selection and classification are used. In the first level, the global feature vector for detection the basic attacks (DoS, U2R, R2L and Probe) is selected. In the second level, four local feature vectors to determine the sub-class of each attack type are selected. Features are evaluated to measure its discrimination ability among classes. K-Means clustering algorithm is then used to cluster each class into two clusters. SFFS and ANN are used in hierarchical basis to select the relevant features and classify the query behavior to proper intrusion type. Experimental evaluation on NSL-KDD, a filtered version of the original KDD99 has shown that the proposed IDS can achieve good performance in terms of intrusions detection and recognition.

Scopus Clarivate Crossref
View Publication
Publication Date
Tue Jan 01 2013
Journal Name
Thesis
User Authentication Based on Keystroke Dynamics Using Artificial Neural Networks
...Show More Authors

Computer systems and networks are being used in almost every aspect of our daily life, the security threats to computers and networks have increased significantly. Usually, password-based user authentication is used to authenticate the legitimate user. However, this method has many gaps such as password sharing, brute force attack, dictionary attack and guessing. Keystroke dynamics is one of the famous and inexpensive behavioral biometric technologies, which authenticate a user based on the analysis of his/her typing rhythm. In this way, intrusion becomes more difficult because the password as well as the typing speed must match with the correct keystroke patterns. This thesis considers static keystroke dynamics as a transparent layer of t

... Show More
Publication Date
Thu Nov 25 2021
Journal Name
Engineering And Technology Journal
Pentacene Based Organic Field Effect Transistor Using Different Gate Dielectric
...Show More Authors

This paper presents the electrical behavior of the top contact/ bottom gate of an organic field-effect transistor (OFET) utilizing Pentacene as a semiconductor layer with two distinctive gate dielectric materials Polyvinylpyrrolidone (PVP) and Zirconium oxide (ZrO2) were chosen. The influence of the monolayer and bilayer gates insulator on OFET performance was investigated. MATLAB software was used to simulate and determine the electrical characteristics of a device. The output and transfer characteristics were studied for ZrO2, PVP and ZrO2/PVP as an organic gate insulator layer. Both characteristics show a high drain current at the gate dielectric ZrO2/PVP equal to -0.0031A and -0.0015A for output and transfer characteristics respectively

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Sun Mar 02 2014
Journal Name
Baghdad Science Journal
Rapid Detection of Aspergillus flavus isolates producing aflatoxin using UV light on different culture media
...Show More Authors

This study included the isolation and identification of Aspergillus flavus isolates associated with imported American rice grains and local corn grains which collected from local markets, using UV light with 365 nm wave length and different media (PDA, YEA, COA, and CDA ). One hundred and seven fungal isolates were identified in rice and 147 isolates in corn.4 genera and 7 species were associated with grains, the genera were Aspergillus ,Fusarium ,Neurospora ,Penicillium . Aspergillus was dominant with occurrence of 0.47% and frequency of 11.75% in rice grains whereas in corn grains the genus Neurospora was dominant with occurrence of 1.09% and frequency 27.25% ,results revealed that 20 isolates out of 50 A. flavus isolates were able

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Nov 01 2021
Journal Name
Journal Of Engineering
Performance Evaluation of Pole Placement and Linear Quadratic Regulator Strategies Designed for Mass-Spring-Damper System Based on Simulated Annealing and Ant Colony Optimization
...Show More Authors

This paper investigates the performance evaluation of two state feedback controllers, Pole Placement (PP) and Linear Quadratic Regulator (LQR). The two controllers are designed for a Mass-Spring-Damper (MSD) system found in numerous applications to stabilize the MSD system performance and minimize the position tracking error of the system output. The state space model of the MSD system is first developed. Then, two meta-heuristic optimizations, Simulated Annealing (SA) optimization and Ant Colony (AC) optimization are utilized to optimize feedback gains matrix K of the PP and the weighting matrices Q and R of the LQR to make the MSD system reach stabilization and reduce the oscillation of the response. The Matlab softwar

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Sun Dec 01 2019
Journal Name
Ieee Xplore
A Hybrid Modified Lightweight Algorithm Combined of Two Cryptography Algorithms PRESENT and Salsa20 Using Chaotic System
...Show More Authors

Cryptography algorithms play a critical role in information technology against various attacks witnessed in the digital era. Many studies and algorithms are done to achieve security issues for information systems. The high complexity of computational operations characterizes the traditional cryptography algorithms. On the other hand, lightweight algorithms are the way to solve most of the security issues that encounter applying traditional cryptography in constrained devices. However, a symmetric cipher is widely applied for ensuring the security of data communication in constraint devices. In this study, we proposed a hybrid algorithm based on two cryptography algorithms PRESENT and Salsa20. Also, a 2D logistic map of a chaotic system is a

... Show More
Scopus (30)
Crossref (16)
Scopus Crossref
Publication Date
Mon Oct 23 2023
Journal Name
Journal Of Optics
Single mode optical fiber sensor based on surface plasmon resonance for the detection of the oil aging for the electrical transformers
...Show More Authors

This work presents a novel technique for the detection of oil aging in electrical transformers using a single mode optical fiber sensor based on surface plasmon resonance (SPR). The aging of insulating oil is a critical issue in the maintenance and performance of electrical transformers, as it can lead to reduce insulation properties, increase risk of electrical breakdown, and decrease operational lifespan. Many parameters are calculated in this study in order to examine the efficiency of this sensor like sensitivity (S), signal to noise ratio (SNR), resolution (refractive index unit) and figure of merit (FOM) and the values are for figure of merit is 11.05, the signal to noise ratio is 20.3, the sensitivity is 6.63, and the resolution is 3

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Thu Jul 01 2021
Journal Name
Indonesian Journal Of Electrical Engineering And Computer Science
Blood donors appointment booking and managing system using PC and mobile web browsers in current pandemic (COVID-19)
...Show More Authors

<span>Blood donation is the main source of blood resources in the blood banks which is required in the hospitals for everyday operations and blood compensation for the patients. In special cases, the patients require fresh blood for compensation such as in the case of major operations and similar situations. Moreover, plasma transfusions are vital in the current pandemic of coronavirus disease (COVID-19). In this paper, we have proposed a donation system that manages the appointments between the donors and the patient in the case of fresh blood donation is required. The website is designed using the Bootstrap technology to provide suitable access using the PC or the smart phones web browser. The website contains large database

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (1)
Scopus Crossref
Publication Date
Thu May 05 2022
Journal Name
Karbala International Journal Of Modern Science
Heterogeneous catalytic degradation of dye by Fenton-like oxidation over a continuous system based on Box–Behnken design and traditional batch experiments
...Show More Authors

In this study, iron was coupled with copper to form a bimetallic compound through a biosynthetic method, which was then used as a catalyst in the Fenton-like processes for removing direct Blue 15 dye (DB15) from aqueous solution. Characterization techniques were applied on the resultant nanoparticles such as SEM, BET, EDAX, FT-IR, XRD, and zeta potential. Specifically, the rounded and shaped as spherical nanoparticles were found for green synthesized iron/copper nanoparticles (G-Fe/Cu NPs) with the size ranging from 32-59 nm, and the surface area was 4.452 m2/g. The effect of different experimental factors was studied in both batch and continuous experiments. These factors were H2O2 concentration, G-Fe/CuNPs amount, pH, initial DB15

... Show More
View Publication
Scopus (11)
Crossref (8)
Scopus Crossref
Publication Date
Sat Dec 30 2023
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Evaluating Filtration and Thermal Stability of Water-Based Mud Using Green Synthesized Zinc Oxide Nanoparticles
...Show More Authors

   Nanoparticles (NPs) have unique capabilities that make them an eye-opener opportunity for the upstream oil industry. Their nano-size allows them to flow within reservoir rocks without the fear of retention between micro-sized pores. Incorporating NPs with drilling and completion fluids has proved to be an effective additive that improves various properties such as mud rheology, filtration, thermal conductivity, and wellbore stability. However, the biodegradability of drilling fluid chemicals is becoming a global issue as the discharged wetted cuttings raise toxicity concerns and environmental hazards. Therefore, it is urged to utilize chemicals that tend to break down and susceptible to biodegradation. This research presents the pra

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Thu Jul 31 2025
Journal Name
Computers, Materials &amp; Continua
A Secure Audio Encryption Method Using Tent-Controlled Permutation and Logistic Map-Based Key Generation
...Show More Authors

The exponential growth of audio data shared over the internet and communication channels has raised significant concerns about the security and privacy of transmitted information. Due to high processing requirements, traditional encryption algorithms demand considerable computational effort for real-time audio encryption. To address these challenges, this paper presents a permutation for secure audio encryption using a combination of Tent and 1D logistic maps. The audio data is first shuffled using Tent map for the random permutation. The high random secret key with a length equal to the size of the audio data is then generated using a 1D logistic map. Finally, the Exclusive OR (XOR) operation is applied between the generated key and the sh

... Show More
View Publication
Crossref (1)
Scopus Clarivate Crossref