Preferred Language
Articles
/
aRbXvYoBVTCNdQwC8qQ2
Hybrid Intrusion Detection System based on DNA Encoding, Teiresias Algorithm and Clustering Method
...Show More Authors

Until recently, researchers have utilized and applied various techniques for intrusion detection system (IDS), including DNA encoding and clustering that are widely used for this purpose. In addition to the other two major techniques for detection are anomaly and misuse detection, where anomaly detection is done based on user behavior, while misuse detection is done based on known attacks signatures. However, both techniques have some drawbacks, such as a high false alarm rate. Therefore, hybrid IDS takes advantage of combining the strength of both techniques to overcome their limitations. In this paper, a hybrid IDS is proposed based on the DNA encoding and clustering method. The proposed DNA encoding is done based on the UNSW-NB15 database by dividing the record's attributes into four groups, including State, Protocol, Service, and the rest of the features is Digits. Four DNA characters were used to represent each protocol attribute values. While two DNA characters are used to represent State, Service and Digits attributes values. Then, the clustering method is applied to classify the records into two clusters, either attack or normal. The current experiment results showed that the proposed system has achieved a good detection rate and accuracy results equal to 81.22% and 82.05% respectively. Also, the system achieved fast encoding and clustering time that equal 0.385 seconds and 0.00325 seconds respectively for each record.

Crossref
View Publication
Publication Date
Fri Jun 24 2022
Journal Name
Iraqi Journal Of Science
Spectral Analysis of Remote Sensing Data
...Show More Authors

In the present work, different remote sensing techniques have been used to analyze remote sensing data spectrally using ENVI software. The majority of algorithms used in the Spectral Processing can be organized as target detection, change detection and classification. In this paper several methods of target detection have been studied such as matched filter and constrained energy minimization.
The water body mapping have been obtained and the results showed changes on the study area through the period 1995-2000. Also the results that obtained from applying constrained energy minimization were more accurate than other method comparing with the real situation.

View Publication Preview PDF
Publication Date
Thu Feb 01 2024
Journal Name
Journal Of Engineering
Improving Building Information Modeling (BIM) Implementation throughout the Construction Industry
...Show More Authors

Building Information Modeling (BIM) is extensively used in the construction industry due to its benefits throughout the Project Life Cycle (PLC). BIM can simulate buildings throughout PLC, detect and resolve problems, and improve building visualization that contributes to the representation of actual project details in the construction stage. BIM contributes to project management promotion by detecting problems that lead to conflicts, cost overruns, and time delays. This work aims to implement an effective BIM for the Iraqi construction projects’ life cycle. The methodology used is a literature review to collect the most important factors contributing to the success of BIM implementation, interview the team of the Cent

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Aug 26 2019
Journal Name
Iraqi Journal Of Science
Heuristic Modularity for Complex Identification in Protein-Protein Interaction Networks
...Show More Authors

     Due to the significant role in understanding cellular processes, the decomposition of Protein-Protein Interaction (PPI) networks into essential building blocks, or complexes, has received much attention for functional bioinformatics research in recent years. One of the well-known bi-clustering descriptors for identifying communities and complexes in complex networks, such as PPI networks, is modularity function.   The contribution of this paper is to introduce heuristic optimization models that can collaborate with the modularity function to improve its detection ability. The definitions of the formulated heuristics are based on nodes and different levels of their neighbor properties.  The modulari

... Show More
View Publication Preview PDF
Scopus (10)
Crossref (3)
Scopus Crossref
Publication Date
Wed Mar 27 2019
Journal Name
Iraqi Journal Of Science
Evaluation of the Tectonic Boundaries Using Potential Data at Tikrit-Kirkuk Area, North - Central Iraq
...Show More Authors

The gravity and magnetic data of Tikrit-Kirkuk area in central Iraq were considered to study the tectonic situation in the area. The residual anomalies were separated from regional using space windows method with space of about 24, 12 and 10km to delineate the source level of the residual anomalies. The Total Horizontal Derivative (THD) is used to identify the fault trends in the basement and sedimentary rocks depending upon gravity and magnetic data. The identified faults in the study area show (NW-SE), less common (NE-SW) and rare (N-S) trends. Some of these faults extending from the basement to the upper most layer of the sedimentary rocks. It was found that the depth of some gravity and magnetic source range 12-13Km, which confirm th

... Show More
View Publication Preview PDF
Publication Date
Mon Jan 01 2018
Journal Name
Lecture Notes Of The Institute For Computer Sciences, Social Informatics And Telecommunications Engineering
Sensor Data Classification for the Indication of Lameness in Sheep
...Show More Authors

View Publication Preview PDF
Scopus (6)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Fri Nov 09 2018
Journal Name
Iraqi National Journal Of Nursing Specialties
Promoting Clinical Breast Examination as A screening Tool for Breast Cancer in Iraq
...Show More Authors

Breast cancer constitutes about one fourth of the registered cancer cases among the Iraqi population (1)
and it is the leading cause of death among Iraqi women (2)
. Each year more women are exposed to the vicious
ramifications of this disease which include death if left unmanaged or the negative sequels that they would
experience, cosmetically and psychologically, after exposure to radical mastectomy.
The World Health Organization (WHO) documented that early detection and screening, when coped
with adequate therapy, could offer a reduction in breast cancer mortality; displaying that the low survival rates
in less developed countries, including Iraq, is mainly attributed to the lack of early detection programs couple

... Show More
View Publication Preview PDF
Publication Date
Wed Sep 30 2015
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Enhancement of Uniformity of Solid Particles in Spouted Bed Using Stochastic Optimization
...Show More Authors

Performance of gas-solid spouted bed benefit from solids uniformity structure (UI).Therefore, the focus of this work is to maximize UI across the bed based on process variables. Hence, UI is to be considered as the objective of the optimization process .Three selected process variables are affecting the objective function. These decision variables are: gas velocity, particle density and particle diameter. Steady-state solids concentration measurements were carried out in a narrow 3-inch cylindrical spouted bed made of Plexiglas that used 60° conical shape base. Radial concentration of particles (glass and steel beads) at various bed heights and different flow patterns were measured using sophisticated optical probes. Stochastic Genetic

... Show More
View Publication Preview PDF
Publication Date
Thu May 04 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Design Feed Forward Neural Network to Determine Doses of the Decongestant for Cold Pills
...Show More Authors

The aim of this paper is to design feed forward neural network to determine the effects of
cold pills and cascades from simulation the problem to system of first order initial value
problem. This problem is typical of the many models of the passage of medication throughout
the body. Designer model is an important part of the process by which dosage levels are set.
A critical factor is the need to keep the levels of medication high enough to be effective, but
not so high that they are dangerous.

View Publication Preview PDF
Publication Date
Sat Oct 30 2021
Journal Name
Iraqi Journal Of Science
An Application of Data Mining Algorithms for Analyzing Psychological Researches
...Show More Authors

     Computer science has evolved to become the basis for evolution and entered into all areas of life where the use of computer has been developed in all scientific, military, commercial and health institutions. In addition, it has been applied in residential and industrial projects due to the high capacity and ability to achieve goals in a shorter time and less effort. In this research, the computer, its branches, and algorithms will be invested in the psychological field. In general, in psychological fields, a questionnaire model is created according to the requirements of the research topic. The model contains many questions that are answered by the individuals of the sample space chosen by the researcher. Often,

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Wed Oct 28 2020
Journal Name
Iraqi Journal Of Science
A Review of Software Watermarking
...Show More Authors

The Internet is the hallmark of the age of technology and this technology is complemented by the presence of software which is one of the basic components of the operation of the network and it is used in almost all daily life aspects such as industry, commerce and others. Because the digital documents and objects can be easily replicated and distributed at an economically low cost and as the software is a type of digital object, the problem of software watermarking risen as related to how to protect data from piracy. Therefore, various techniques have been developed to protect codes from misusing and unauthorized alteration. Each of them is known as watermarking technology that protects data by inserting secret information into software

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (2)
Scopus Crossref