Preferred Language
Articles
/
QBfDNI8BVTCNdQwCSmG7
Differential evolution detection models for SMS spam
...Show More Authors

With the growth of mobile phones, short message service (SMS) became an essential text communication service. However, the low cost and ease use of SMS led to an increase in SMS Spam. In this paper, the characteristics of SMS spam has studied and a set of features has introduced to get rid of SMS spam. In addition, the problem of SMS spam detection was addressed as a clustering analysis that requires a metaheuristic algorithm to find the clustering structures. Three differential evolution variants viz DE/rand/1, jDE/rand/1, jDE/best/1, are adopted for solving the SMS spam problem. Experimental results illustrate that the jDE/best/1 produces best results over other variants in terms of accuracy, false-positive rate and false-negative rate. Moreover, it surpasses the baseline methods.

Scopus Crossref
View Publication
Publication Date
Tue Apr 19 2022
Journal Name
Chemistryselect
A Continuous Flow Injection/Indirect Photometric Method for the Detection of Fosetyl Aluminum in Commercial Pesticide Formulations
...Show More Authors
Abstract<p>Because of their Physico‐chemical characteristics and its composition, the development of new specific analytical methodologies to determine some highly polar pesticides are required. The reported methods demand long analysis time, expensive instruments and prior extraction of pesticide for detection. The current work presents a new flow injection analysis method combined with indirect photometric detection for the determination of Fosetyl‐Aluminum (Fosetyl‐Al) in commercial formulations, with rapid and highly accurate determination involving only construction of manifold system combined with photometric detector without need some of the pre‐treatments to the sample before the analysis such a</p> ... Show More
View Publication
Scopus (7)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Sat Apr 01 2023
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Intrusion detection method for internet of things based on the spiking neural network and decision tree method
...Show More Authors

The prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices

... Show More
Scopus (22)
Crossref (10)
Scopus Crossref
Publication Date
Tue Jan 01 2019
Journal Name
Aerosol And Air Quality Research
Effect of Inner Rod Tilting on the Performance of a Cylindrical Differential Electrical Mobility Analyzer (DEMC)
...Show More Authors

View Publication
Scopus Clarivate Crossref
Publication Date
Tue May 05 2015
Journal Name
International Journal Of Advanced Scientific And Technical Research
Fuzzy Stochastic Probability of The Solution of Single Stationary Non- Homogeneous Linear Fuzzy Random Differential Equations
...Show More Authors

Publication Date
Sun Dec 06 2015
Journal Name
Baghdad Science Journal
Bounded Solutions of the Second Order Differential Equation x ?+f(x) x ?+g(x)=u(t)
...Show More Authors

In this paper we prove the boundedness of the solutions and their derivatives of the second order ordinary differential equation x ?+f(x) x ?+g(x)=u(t), under certain conditions on f,g and u. Our results are generalization of those given in [1].

View Publication Preview PDF
Crossref
Publication Date
Mon Mar 08 2021
Journal Name
Baghdad Science Journal
edge detection using modification prewitt operators
...Show More Authors

in this paper we adopted ways for detecting edges locally classical prewitt operators and modification it are adopted to perform the edge detection and comparing then with sobel opreators the study shows that using a prewitt opreators

View Publication Preview PDF
Crossref
Publication Date
Fri Jul 21 2023
Journal Name
Journal Of Engineering
Shared Congestion Detection: A Comparative Study
...Show More Authors

Most Internet-tomography problems such as shared congestion detection depend on network measurements. Usually, such measurements are carried out in multiple locations inside the network and relied on local clocks. These clocks usually skewed with time making these measurements unsynchronized and thereby degrading the performance of most techniques. Recently, shared congestion detection has become an important issue in many computer networked applications such as multimedia streaming and
peer-to-peer file sharing. One of the most powerful techniques that employed in literature is based on Discrete Wavelet Transform (DWT) with cross-correlation operation to determine the state of the congestion. Wavelet transform is used as a de-noisin

... Show More
View Publication Preview PDF
Publication Date
Fri Sep 23 2022
Journal Name
Specialusis Ugdymas
Intrusion Detection System Techniques A Review
...Show More Authors

With the high usage of computers and networks in the current time, the amount of security threats is increased. The study of intrusion detection systems (IDS) has received much attention throughout the computer science field. The main objective of this study is to examine the existing literature on various approaches for Intrusion Detection. This paper presents an overview of different intrusion detection systems and a detailed analysis of multiple techniques for these systems, including their advantages and disadvantages. These techniques include artificial neural networks, bio-inspired computing, evolutionary techniques, machine learning, and pattern recognition.

Publication Date
Sun Sep 01 2013
Journal Name
Journal Of Economics And Administrative Sciences
The Use of Replacement Models On Determine the Optimal Time to Replacement
...Show More Authors

Abstract:-

            The approach maintenance and replacement one of techniques of operations research whom cares of the failure experienced by a lot of production lines which consist of a set of machines and equipment, which in turn exposed to the failure or work stoppages over the lifetime, which requires reducing the working time of these machines or equipment below what can or conuct  maintenance process once in a while or a replacement for one part of the machine or replace one of the machines in production lines. In this research is the study of the failure s that occur in some parts of one of the machines for the General Company for Vege

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jan 25 2026
Journal Name
Philosophy Journal
Philosophy of Civilization Read and critique and analysis of the selected models
...Show More Authors

View Publication