Preferred Language
Articles
/
alkej-137
Design a Security Network System against Internet Worms
...Show More Authors

 Active worms have posed a major security threat to the Internet, and many research efforts have focused on them. This paper is interested in internet worm that spreads via TCP, which accounts for the majority of internet traffic. It presents an approach that use a hybrid solution between two detection algorithms: behavior base detection and signature base detection to have the features of each of them. The aim of this study is to have a good solution of detecting worm and stealthy worm with the feature of the speed. This proposal was designed in distributed collaborative scheme based on the small-world network model to effectively improve the system performance.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Jan 30 2022
Journal Name
Iraqi Journal Of Science
Diagnosis of Malaria Infected Blood Cell Digital Images using Deep Convolutional Neural Networks
...Show More Authors

     Automated medical diagnosis is an important topic, especially in detection and classification of diseases. Malaria is one of the most widespread diseases, with more than 200 million cases, according to the 2016 WHO report. Malaria is usually diagnosed using thin and thick blood smears under a microscope. However, proper diagnosis is difficult, especially in poor countries where the disease is most widespread. Therefore, automatic diagnostics helps in identifying the disease through images of red blood cells, with the use of machine learning techniques and digital image processing. This paper presents an accurate model using a Deep Convolutional Neural Network build from scratch. The paper also proposed three CNN

... Show More
View Publication Preview PDF
Scopus (10)
Crossref (6)
Scopus Crossref
Publication Date
Fri Jun 30 2023
Journal Name
Iraqi Journal Of Science
Using Retrieved Sources for Semantic and Lexical Plagiarism Detection
...Show More Authors

     Plagiarism is described as using someone else's ideas or work without their permission. Using lexical and semantic text similarity notions, this paper presents a plagiarism detection system for examining suspicious texts against available sources on the Web. The user can upload suspicious files in pdf or docx formats. The system will search three popular search engines for the source text (Google, Bing, and Yahoo) and try to identify the top five results for each search engine on the first retrieved page. The corpus is made up of the downloaded files and scraped web page text of the search engines' results. The corpus text and suspicious documents will then be encoded as vectors. For lexical plagiarism detection, the system will

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Thu Mar 18 2010
Journal Name
Spe Projects, Facilities & Construction
Correlating Optimum Stage Pressure for Sequential Separator Systems
...Show More Authors
Summary<p>A study to find the optimum separators pressures of separation stations has been performed. Stage separation of oil and gas is accomplished with a series of separators operating at sequentially reduced pressures. Liquid is discharged from a higher-pressure separator into the lower-pressure separator. The set of working separator pressures that yields maximum recovery of liquid hydrocarbon from the well fluid is the optimum set of pressures, which is the target of this work.</p><p>A computer model is used to find the optimum separator pressures. The model employs the Peng-Robinson equation of state (Peng and Robinson 1976) for volatile oil. The application of t</p> ... Show More
View Publication
Scopus (15)
Crossref (13)
Scopus Crossref
Publication Date
Mon Jul 01 2024
Journal Name
Journal Of Engineering
Efficient Intrusion Detection Through the Fusion of AI Algorithms and Feature Selection Methods
...Show More Authors

With the proliferation of both Internet access and data traffic, recent breaches have brought into sharp focus the need for Network Intrusion Detection Systems (NIDS) to protect networks from more complex cyberattacks. To differentiate between normal network processes and possible attacks, Intrusion Detection Systems (IDS) often employ pattern recognition and data mining techniques. Network and host system intrusions, assaults, and policy violations can be automatically detected and classified by an Intrusion Detection System (IDS). Using Python Scikit-Learn the results of this study show that Machine Learning (ML) techniques like Decision Tree (DT), Naïve Bayes (NB), and K-Nearest Neighbor (KNN) can enhance the effectiveness of an Intrusi

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Dec 02 2021
Journal Name
Iraqi Journal Of Science
An Approach Based on Decision Tree and Self-Organizing Map For Intrusion Detection
...Show More Authors

In modern years, internet and computers were used by many nations all overhead the world in different domains. So the number of Intruders is growing day-by-day posing a critical problem in recognizing among normal and abnormal manner of users in the network. Researchers have discussed the security concerns from different perspectives. Network Intrusion detection system which essentially analyzes, predicts the network traffic and the actions of users, then these behaviors will be examined either anomaly or normal manner. This paper suggested Deep analyzing system of NIDS to construct network intrusion detection system and detecting the type of intrusions in traditional network. The performance of the proposed system was evaluated by using

... Show More
View Publication Preview PDF
Publication Date
Mon Oct 30 2023
Journal Name
Iraqi Journal Of Science
Transfer Learning Based Traffic Light Detection and Recognition Using CNN Inception-V3 Model
...Show More Authors

Due to the lack of vehicle-to-infrastructure (V2I) communication in the existing transportation systems, traffic light detection and recognition is essential for advanced driver assistant systems (ADAS) and road infrastructure surveys. Additionally, autonomous vehicles have the potential to change urban transportation by making it safe, economical, sustainable, congestion-free, and transportable in other ways. Because of their limitations, traditional traffic light detection and recognition algorithms are not able to recognize traffic lights as effectively as deep learning-based techniques, which take a lot of time and effort to develop. The main aim of this research is to propose a traffic light detection and recognition model based on

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (2)
Scopus Crossref
Publication Date
Tue Dec 31 2013
Journal Name
Al-khwarizmi Engineering Journal
Thermo-Rheological Investigation and Modeling of the Shear Viscosity of Polypropylene above the Melting Temperature
...Show More Authors

The increasing use of polymeric materials in the daily life, leads to challenges in the processing industry to deliver high performance materials with affordable terms. However, new processing techniques lead to high costs. In order to reduce processing costs it is necessary to understand the non-Newtonian behavior of the polymers in their molten state to be able to simulate the processes before the construction of the plants starts. Here the shear thinning behavior of the viscosity of polymeric melts is essential. Thus, this paper deals with the experimental investigation of the thermo-rheological behavior of the viscosity of one of the most used polymers (Polypropylene) over a wide range of temperatures and shear rates.  Furthermo

... Show More
View Publication Preview PDF
Publication Date
Sun Jun 01 2014
Journal Name
Journal Of Economics And Administrative Sciences
The role of the learning organization in the behavior of the work teams \ exploratory research in the Rasheed Bank
...Show More Authors

This research aims to examine the relationship between learning organization and behavior of work teams. The variable of the learning organization took four dimensions depending on the study (sudhartna & Li, 2004): Common cultural values ​​, communication, knowledge transfer and the characteristics of workers. The behavior of teams was identified on the basis of realizing of the respondents of their organization to work as a team where the research relied concepts applied in the study (Hakim , 2005) , and chose to research the case of a service organization for the study and relied on four dimensions of coordination , cooperation , sharing of information , the performance of the team, and was a curriculum approach and des

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Mon Nov 29 2021
Journal Name
Iraqi Journal Of Science
Determining and Estimating the Creep of Tigris Riverbanks at the Baghdad University Camp Using GIS Analytical Symmetrical Difference Method
...Show More Authors

The Tigris River in Iraq is of highly meandering in several of its parts. So, the largest meandering inside Baghdad City, is in Al-Jadriyah. During its course, the Tigris Riverbanks are facing erosion frequently due to alteration in the geomorphological and hydrological characteristics affecting the river channel. The entire length of Tigris River from the northern entrance of Baghdad to the convergence with Diyala River at southern of Baghdad is about 49 km length. The Tigris River is suffering from the erosion, deposition, and migration conditions. The river migration was found as maximum in the left bank at the side of the University, and lesser in the right bank in the opposite side, Dora. The aim of this study is to measure the magn

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sun Dec 07 2014
Journal Name
Baghdad Science Journal
Synthesis, Characterization and Stability Study of V(IV), Zr(IV), Rh(III), Pd(II), Cd(II) and Hg(II) Complexes with Pyrazol Derivative
...Show More Authors

In this work lactone (1) was prepared from the reaction of p-nitro phenyl hydrazine with ethylacetoacetate, which upon treatment with benzoyl chloride afforded the lactame (2). The reaction of (2) with 2-amino phenol produced a new Schiff base (L) in good yield. Complexes of V(IV), Zr(IV), Rh(III), Pd(II), Cd(II) and Hg(II) with the new Schiff base (L) have been prepared. The compounds (1, 2) were characterized by FT-IR and UV spectroscopy, as well as characterizing ligand (L) by the same techniques with elemental analysis (C.H.N) and (1H-NMR). The prepared complexes were identified and their structural geometries were suggested by using elemental analysis (C.H.N), flame atomic absorption technique, FT-IR and UV-Vis spectroscopy, in additio

... Show More
View Publication Preview PDF
Crossref