Preferred Language
Articles
/
OhdOPo8BVTCNdQwCHmXk
Construct an efficient distributed denial of service attack detection system based on data mining techniques
...Show More Authors

<span>Distributed denial-of-service (DDoS) attack is bluster to network security that purpose at exhausted the networks with malicious traffic. Although several techniques have been designed for DDoS attack detection, intrusion detection system (IDS) It has a great role in protecting the network system and has the ability to collect and analyze data from various network sources to discover any unauthorized access. The goal of IDS is to detect malicious traffic and defend the system against any fraudulent activity or illegal traffic. Therefore, IDS monitors outgoing and incoming network traffic. This paper contains a based intrusion detection system for DDoS attack, and has the ability to detect the attack intelligently, dynamically and periodically by evaluating the set of attackers of the current node with its neighbors. We use dataset named CICDDoS2019 that contains on binary classes benign and DDoS. Performance has evaluated by applying data mining algorithms as well as applying the best features to discover potential attack classes.</span>

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Jan 20 2023
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Automatic Detection and Recognition of Car Plates Based on Cascade Classifier
...Show More Authors

The study consists of video clips of all cars parked in the selected area. The studied camera height is1.5 m, and the video clips are 18video clips. Images are extracted from the video clip to be used for training data for the cascade method. Cascade classification is used to detect license plates after the training step. Viola-jones algorithm was applied to the output of the cascade data for camera height (1.5m). The accuracy was calculated for all data with different weather conditions and local time recoding in two ways. The first used the detection of the car plate based on the video clip, and the accuracy was 100%. The second is using the clipped images stored in the positive file, based on the training file (XML file), where the ac

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Jun 01 2013
Journal Name
Engineering And Technology Journal
Effect of External Sulfate Attack on Self Compacted Concrete
...Show More Authors

Self-compacting concrete (SCC) is an innovative concrete that does not require vibration for placing and compaction. It is able to flow under its own weight, completely filling formwork and achieving full compaction, even in the presence of congested reinforcement. The effect of external sulfate attack was studied-Es (very sever exposure SO4>10000ppm) according to ACI 318-11. The mix design method of SCC used is according to EFNARC 2002, and then must satisfy the criteria of filling ability, passing ability and segregation resistance. The experimental program focuses to study two different chemical composition of sulfate resistance Portland cement with different percentage of silica fume replacement by weight of cement and W/cm (0.3 and 0.3

... Show More
Preview PDF
Publication Date
Tue Feb 01 2022
Journal Name
Svu-international Journal Of Engineering Sciences And Applications
Water Quality Detection using cost-effective sensors based on IoT
...Show More Authors

Crossref (1)
Crossref
Publication Date
Fri Feb 08 2019
Journal Name
Journal Of The College Of Education For Women
Online Sumarians Cuneiform Detection Based on Symbol Structural Vector Algorithm
...Show More Authors

The cuneiform images need many processes in order to know their contents
and by using image enhancement to clarify the objects (symbols) founded in the
image. The Vector used for classifying the symbol called symbol structural vector
(SSV) it which is build from the information wedges in the symbol.
The experimental tests show insome numbersand various relevancy including
various drawings in online method. The results are high accuracy in this research,
and methods and algorithms programmed using a visual basic 6.0. In this research
more than one method was applied to extract information from the digital images
of cuneiform tablets, in order to identify most of signs of Sumerian cuneiform.

View Publication Preview PDF
Publication Date
Mon May 11 2020
Journal Name
Baghdad Science Journal
Towards Accurate Pupil Detection Based on Morphology and Hough Transform
...Show More Authors

 Automatic recognition of individuals is very important in modern eras. Biometric techniques have emerged as an answer to the matter of automatic individual recognition. This paper tends to give a technique to detect pupil which is a mixture of easy morphological operations and Hough Transform (HT) is presented in this paper. The circular area of the eye and pupil is divided by the morphological filter as well as the Hough Transform (HT) where the local Iris area has been converted into a rectangular block for the purpose of calculating inconsistencies in the image. This method is implemented and tested on the Chinese Academy of Sciences (CASIA V4) iris image database 249 person and the IIT Delhi (IITD) iris

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (7)
Scopus Clarivate Crossref
Publication Date
Tue Jun 23 2020
Journal Name
Baghdad Science Journal
Anomaly Detection Approach Based on Deep Neural Network and Dropout
...Show More Authors

   Regarding to the computer system security, the intrusion detection systems are fundamental components for discriminating attacks at the early stage. They monitor and analyze network traffics, looking for abnormal behaviors or attack signatures to detect intrusions in early time. However, many challenges arise while developing flexible and efficient network intrusion detection system (NIDS) for unforeseen attacks with high detection rate. In this paper, deep neural network (DNN) approach was proposed for anomaly detection NIDS. Dropout is the regularized technique used with DNN model to reduce the overfitting. The experimental results applied on NSL_KDD dataset. SoftMax output layer has been used with cross entropy loss funct

... Show More
View Publication Preview PDF
Scopus (25)
Crossref (11)
Scopus Clarivate Crossref
Publication Date
Tue Dec 05 2023
Journal Name
Baghdad Science Journal
An improved neurogenetic model for recognition of 3D kinetic data of human extracted from the Vicon Robot system
...Show More Authors

These days, it is crucial to discern between different types of human behavior, and artificial intelligence techniques play a big part in that.  The characteristics of the feedforward artificial neural network (FANN) algorithm and the genetic algorithm have been combined to create an important working mechanism that aids in this field. The proposed system can be used for essential tasks in life, such as analysis, automation, control, recognition, and other tasks. Crossover and mutation are the two primary mechanisms used by the genetic algorithm in the proposed system to replace the back propagation process in ANN. While the feedforward artificial neural network technique is focused on input processing, this should be based on the proce

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Tue Sep 01 2020
Journal Name
Journal Of Engineering
An Adaptive Digital Neural Network-Like-PID Control Law Design for Fuel Cell System Based on FPGA Technique
...Show More Authors

This paper proposes an on-line adaptive digital Proportional Integral Derivative (PID) control algorithm based on Field Programmable Gate Array (FPGA) for Proton Exchange Membrane Fuel Cell (PEMFC) Model. This research aims to design and implement Neural Network like a digital PID using FPGA in order to generate the best value of the hydrogen partial pressure action (PH2) to control the stack terminal output voltage of the (PEMFC) model during a variable load current applied. The on-line Particle Swarm Optimization (PSO) algorithm is used for finding and tuning the optimal value of the digital PID-NN controller (kp, ki, and kd) parameters that improve the dynamic behavior of the closed-loop digital control fue

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sat Aug 25 2012
Journal Name
Wireless Personal Communications
Multi-Objective Evolutionary Algorithm Based on Decomposition for Energy Efficient Coverage in Wireless Sensor Networks
...Show More Authors

Scopus (57)
Crossref (42)
Scopus Clarivate Crossref
Publication Date
Sun Jan 01 2017
Journal Name
Journal Of Engineering
Detection and Diagnosis of Induction Motor Faults by Intelligent Techniques
...Show More Authors

This paper presents a complete design and implementation of a monitoring system for the operation of the three-phase induction motors. This system is built using a personal computer and  two types of sensors (current, vibration) to detect some of the mechanical faults that may occur in the motor. The study and examination of several types of faults including (ball bearing and shaft misalignment faults) have been done through the extraction of fault data by using fast Fourier transform (FFT) technique. Results showed that the motor current signature analysis (MCSA) technique, and measurement of vibration technique have high possibility in the detection and diagnosis of most mechanical faults with high accuracy. Subsequently, diagnosi

... Show More
View Publication Preview PDF