Preferred Language
Articles
/
YRjZM5UBVTCNdQwCeSqQ
Radial Basis Function (RBF) Based on Multistage Autoencoders for Intrusion Detection system (IDS)
...Show More Authors

In this paper, RBF-based multistage auto-encoders are used to detect IDS attacks. RBF has numerous applications in various actual life settings. The planned technique involves a two-part multistage auto-encoder and RBF. The multistage auto-encoder is applied to select top and sensitive features from input data. The selected features from the multistage auto-encoder is wired as input to the RBF and the RBF is trained to categorize the input data into two labels: attack or no attack. The experiment was realized using MATLAB2018 on a dataset comprising 175,341 case, each of which involves 42 features and is authenticated using 82,332 case. The developed approach here has been applied for the first time, to the knowledge of the authors, to detect IDS attacks with 98.80% accuracy when validated using UNSW-NB15 dataset. The experimental results show the proposed method presents satisfactory results when compared with those obtained in this field.

Scopus Crossref
View Publication
Publication Date
Sat Jan 10 2015
Journal Name
British Journal Of Mathematics & Computer Science
The Use of Gradient Based Features for Woven Fabric Images Classification
...Show More Authors

View Publication
Crossref
Publication Date
Mon Nov 09 2020
Journal Name
Construction Research Congress 2020
Alternative Risk Models for Optimal Investment in Portfolio-Based Community Solar
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Fri Apr 28 2023
Journal Name
Surgical Neurology International
Neurosurgery theater-based learning: Etiquette and preparation tips for medical students
...Show More Authors

View Publication Preview PDF
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Mon Dec 25 2023
Journal Name
Ieee Access
ITor-SDN: Intelligent Tor Networks-Based SDN for Data Forwarding Management
...Show More Authors

Tor (The Onion Routing) network was designed to enable users to browse the Internet anonymously. It is known for its anonymity and privacy security feature against many agents who desire to observe the area of users or chase users’ browsing conventions. This anonymity stems from the encryption and decryption of Tor traffic. That is, the client’s traffic should be subject to encryption and decryption before the sending and receiving process, which leads to delay and even interruption in data flow. The exchange of cryptographic keys between network devices plays a pivotal and critical role in facilitating secure communication and ensuring the integrity of cryptographic procedures. This essential process is time-consuming, which causes del

... Show More
View Publication
Scopus (3)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Fri Dec 01 2023
Journal Name
Ieee Antennas And Wireless Propagation Letters
Stabilized and Fast Method for Compressive-Sensing-Based Method of Moments
...Show More Authors

View Publication
Scopus (15)
Crossref (11)
Scopus Clarivate Crossref
Publication Date
Mon Aug 01 2022
Journal Name
Baghdad Science Journal
Perceptually Important Points-Based Data Aggregation Method for Wireless Sensor Networks
...Show More Authors

The transmitting and receiving of data consume the most resources in Wireless Sensor Networks (WSNs). The energy supplied by the battery is the most important resource impacting WSN's lifespan in the sensor node. Therefore, because sensor nodes run from their limited battery, energy-saving is necessary. Data aggregation can be defined as a procedure applied for the elimination of redundant transmissions, and it provides fused information to the base stations, which in turn improves the energy effectiveness and increases the lifespan of energy-constrained WSNs. In this paper, a Perceptually Important Points Based Data Aggregation (PIP-DA) method for Wireless Sensor Networks is suggested to reduce redundant data before sending them to the

... Show More
View Publication Preview PDF
Scopus (61)
Crossref (52)
Scopus Clarivate Crossref
Publication Date
Thu Oct 01 2020
Journal Name
Journal Of Engineering Science And Technology
Automatic voice activity detection using fuzzy-neuro classifier
...Show More Authors

Voice Activity Detection (VAD) is considered as an important pre-processing step in speech processing systems such as speech enhancement, speech recognition, gender and age identification. VAD helps in reducing the time required to process speech data and to improve final system accuracy by focusing the work on the voiced part of the speech. An automatic technique for VAD using Fuzzy-Neuro technique (FN-AVAD) is presented in this paper. The aim of this work is to alleviate the problem of choosing the best threshold value in traditional VAD methods and achieves automaticity by combining fuzzy clustering and machine learning techniques. Four features are extracted from each speech segment, which are short term energy, zero-crossing rate, auto

... Show More
View Publication Preview PDF
Scopus (7)
Scopus
Publication Date
Wed Mar 01 2017
Journal Name
جامعة كرميان
The effect of a training program for chemistry teachers based on the strategy of both sides of the brain together on the thinking patterns of their students
...Show More Authors

Preview PDF
Publication Date
Sat Feb 01 2020
Journal Name
Iop Conference Series: Materials Science And Engineering
The rationing system effect on seepage from the cement-treated gypsum canals
...Show More Authors
Abstract<p>The shortage of irrigation water requires specific measures. One of these measures is the application of the rationing system (a period of irrigation followed by a period of drought). This system could have an effect on the behavior and properties of irrigation canals. So, studying rationing system on the irrigation canals is important both in civil engineering and water resources engineering, especially if these channels constructed with gypsum soil. This study includes the calculation of seepage velocity and water content in each cycle (10 days wetting and 10 days of drying). The model is built for this research contains four samples, two samples for untreated soil one of them expos</p> ... Show More
View Publication
Scopus (1)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Thu Dec 01 2011
Journal Name
Journal Of Economics And Administrative Sciences
Measurement of Impact of Banking System Development on Economic Growth in Iraq
...Show More Authors

At the heart of every robust economy is a vital banking system. The functional banking system can effectively perform several functions such as mobilizing savings, allocating credit, monitoring managers, transforming risks, and facilitating the financial transactions. This paper aims to measure the impact of banking system development on economic growth in Iraq. Credit to private sector divided by GDP used as a proxy of banking development. Real per capita GDP used as a proxy of economic growth. By using Autoregressive Distributed Lag (ARDL) model, the paper finds that the undeveloped Iraqi banking system could not promote economic growth in the country. Therefore, a variety of policies need to be taken to spur the role of bankin

... Show More
View Publication Preview PDF
Crossref