Preferred Language
Articles
/
Nxe8NI8BVTCNdQwC4GHE
An Evolutionary Algorithm for Community Detection Using an Improved Mutation Operator
...Show More Authors

Scopus Clarivate Crossref
View Publication
Publication Date
Fri Mar 01 2019
Journal Name
Al-khwarizmi Engineering Journal
Reverse Engineering Representation Using an Image Processing Modification
...Show More Authors

In the reverse engineering approach, a massive amount of point data is gathered together during data acquisition and this leads to larger file sizes and longer information data handling time. In addition, fitting of surfaces of these data point is time-consuming and demands particular skills. In the present work a method for getting the control points of any profile has been presented. Where, many process for an image modification was explained using Solid Work program, and a parametric equation of the profile that proposed has been derived using Bezier technique with the control points that adopted. Finally, the proposed profile was machined using 3-aixs CNC milling machine and a compression in dimensions process has been occurred betwe

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sun Jul 09 2023
Journal Name
Journal Of Engineering
Compression of an ECG Signal Using Mixed Transforms
...Show More Authors

Electrocardiogram (ECG) is an important physiological signal for cardiac disease diagnosis. With the increasing use of modern electrocardiogram monitoring devices that generate vast amount of data requiring huge storage capacity. In order to decrease storage costs or make ECG signals suitable and ready for transmission through common communication channels, the ECG data
volume must be reduced. So an effective data compression method is required. This paper presents an efficient technique for the compression of ECG signals. In this technique, different transforms have been used to compress the ECG signals. At first, a 1-D ECG data was segmented and aligned to a 2-D data array, then 2-D mixed transform was implemented to compress the

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Wed Jan 01 2025
Journal Name
Iv. International Rimar Congress Of Pure, Applied Sciences
A New Intrusion Detection Approach Based on RNA Encoding and K-Means Clustering Algorithm Using KDD-Cup99 Dataset
...Show More Authors

Intrusion detection systems (IDS) are useful tools that help security administrators in the developing task to secure the network and alert in any possible harmful event. IDS can be classified either as misuse or anomaly, depending on the detection methodology. Where Misuse IDS can recognize the known attack based on their signatures, the main disadvantage of these systems is that they cannot detect new attacks. At the same time, the anomaly IDS depends on normal behaviour, where the main advantage of this system is its ability to discover new attacks. On the other hand, the main drawback of anomaly IDS is high false alarm rate results. Therefore, a hybrid IDS is a combination of misuse and anomaly and acts as a solution to overcome the dis

... Show More
Preview PDF
Publication Date
Sat Jan 01 2022
Journal Name
Indonesian Journal Of Electrical Engineering And Computer Science
Construct an efficient distributed denial of service attack detection system based on data mining techniques
...Show More Authors

<span>Distributed denial-of-service (DDoS) attack is bluster to network security that purpose at exhausted the networks with malicious traffic. Although several techniques have been designed for DDoS attack detection, intrusion detection system (IDS) It has a great role in protecting the network system and has the ability to collect and analyze data from various network sources to discover any unauthorized access. The goal of IDS is to detect malicious traffic and defend the system against any fraudulent activity or illegal traffic. Therefore, IDS monitors outgoing and incoming network traffic. This paper contains a based intrusion detection system for DDoS attack, and has the ability to detect the attack intelligently, dynami

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (2)
Scopus Crossref
Publication Date
Fri Jan 01 2021
Journal Name
Indonesian Journal Of Electrical Engineering And Computer Science
BotDetectorFW: an optimized botnet detection framework based on five features-distance measures supported by comparisons of four machine learning classifiers using CICIDS2017 dataset
...Show More Authors

<p><span>A Botnet is one of many attacks that can execute malicious tasks and develop continuously. Therefore, current research introduces a comparison framework, called BotDetectorFW, with classification and complexity improvements for the detection of Botnet attack using CICIDS2017 dataset. It is a free online dataset consist of several attacks with high-dimensions features. The process of feature selection is a significant step to obtain the least features by eliminating irrelated features and consequently reduces the detection time. This process implemented inside BotDetectorFW using two steps; data clustering and five distance measure formulas (cosine, dice, driver &amp; kroeber, overlap, and pearson correlation

... Show More
View Publication
Scopus (7)
Crossref (2)
Scopus Crossref
Publication Date
Mon Dec 30 2024
Journal Name
Wasit Journal For Pure Sciences
A New Class of Higher Derivatives for Harmonic Univalent Functions Established using a Generalized Fractional Integral Operator
...Show More Authors

A new class of higher derivatives  for harmonic univalent functions defined by a generalized fractional integral operator inside an open unit disk E is the aim of this paper.

View Publication
Crossref
Publication Date
Sat May 19 2012
Journal Name
Wireless Personal Communications
Stable-Aware Evolutionary Routing Protocol for Wireless Sensor Networks
...Show More Authors

Scopus (36)
Crossref (28)
Scopus Clarivate Crossref
Publication Date
Wed Jun 30 2021
Journal Name
Journal Of Economics And Administrative Sciences
Estimating Stock Returns Using Rough Set Theory: An Exploratory study With An Evidence From Iraq Stock Exchange
...Show More Authors

‎ This research aims to estimate stock returns, according to the ‎Rough Set Theory ‎approach, ‎test ‎its effectiveness and accuracy in predicting stock returns and their potential in the ‎field of ‎financial ‎markets, and rationalize investor decisions. The research sample is totaling (10) ‎companies traded at Iraq Stock Exchange. The results showed a remarkable ‎ ‎Rough Set Theory application in data reduction, contributing to the rationalization of ‎investment ‎decisions. The most prominent conclusions are the capability of rough set theory ‎in ‎dealing with financial data and applying it for forecasting stock ‎returns.‎The ‎research provides those interested in investing stocks in financial

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Feb 04 2019
Journal Name
Journal Of The College Of Education For Women
An Evaluative study for the Arabic language course program: An Evaluative study for the Arabic language course program
...Show More Authors

Abstract
Language is one of God’s blessings to human beings through which he
distingushed them from other creatures, then how if this language was arabic.
God honored this language and in which he descended his Gracious Boole
that gave it glory and magnificance, and made it an immortal revelation to the
arab nation in their poetry, oration, history and human tendency to the life of
knowledge, mind leadershipe, innovation and progress.
This study aimed at evaluating the arabic language come program for
the new teachers. The sample was of (25) participants who were shown a
questionaire consisting of (60) items distributed on (9) fields. Then, the data
was processed statisically by using preauency rate, Kai s

... Show More
View Publication Preview PDF
Publication Date
Tue Mar 30 2021
Journal Name
Baghdad Science Journal
Properties of the Adjoint Operator of a General Fuzzy Bounded Operator
...Show More Authors

Our goal in the present paper is to recall the concept of general fuzzy normed space and its basic properties in order to define the adjoint operator of a general fuzzy bounded operator from a general fuzzy normed space V into another general fuzzy normed space U. After that basic properties of the adjoint operator were proved then the definition of fuzzy reflexive general fuzzy normed space was introduced in order to prove that every finite dimensional general fuzzy normed space is fuzzy reflexive.

View Publication
Scopus (9)
Crossref (2)
Scopus Clarivate Crossref