Preferred Language
Articles
/
bsj-2167
Developing an Immune Negative Selection Algorithm for Intrusion Detection in NSL-KDD data Set
...Show More Authors

With the development of communication technologies for mobile devices and electronic communications, and went to the world of e-government, e-commerce and e-banking. It became necessary to control these activities from exposure to intrusion or misuse and to provide protection to them, so it's important to design powerful and efficient systems-do-this-purpose. It this paper it has been used several varieties of algorithm selection passive immune algorithm selection passive with real values, algorithm selection with passive detectors with a radius fixed, algorithm selection with passive detectors, variable- sized intrusion detection network type misuse where the algorithm generates a set of detectors to distinguish the self-samples. Practical Experiments showed the process to achieve a high rate of detection in the system designer using data NSL-KDD with 12 field without vulnerability to change the radius of the detector or change the number of reagents were obtained as the ratio between detection (0.984, 0.998, 0.999) and the ratio between a false alarm (0.003, 0.002, 0.001). Contrary to the results of experiments conducted on data NSL-KDD with 41 field contact, which affected the rate of detection by changing the radius and the number of the detector as it has been to get the proportion of uncovered between (0.44, 0.824, 0.992) and the percentage of false alarm between (0.5, 0.175, 0.003).

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Jan 01 2020
Journal Name
Plant Archives
DETECTION OF sHLA-G PROTEINS IN THE SERA OF PATIENTS INFECTED WITH VISCERAL LEISHMANIASIS
...Show More Authors

Visceral leishmaniasis (VL) or kala-azar is one of the worlds most neglected tropical diseases in mortality and fourth in morbidity, rK39 dipstick was used to diagnose the suspected infected patients as cheapest simple technique which can differentiate recent from chronic infection, for disease out-coming, naïve T-lymphocyte cells should be differentiated into pathogen-specific immunity responses, such as T-helper 1(Th-1) or (Th-2). HLA-G is a special protein defined as nonclassical HLA class I molecule can suppress the immune system through prevention of T-cell function by foul all T-cell mechanisms. So, this study aimed to detect and evaluate the level of sHLA-G in the sera of patients infected with VL. The results showed that there was

... Show More
Preview PDF
Publication Date
Thu Feb 01 2018
Journal Name
European Journal Of General Medicine
The Value of Longitudinal Strain versus Coronary Angiography in Detection of Coronary Artery Disease
...Show More Authors

Aims: The aim of this study was to evaluate the value and accuracy of longitudinal strain in detection of coronary artery disease compared to coronary angiography. Results: The left ventricular longitudinal strain-speckle tracking showed evidence of stenosis of left anterior descending artery, circumflex artery and right coronary artery in (86.1%), (76.4%), and (84.7%) respectively. For the stenosis in left anterior descending artery, the current study showed that the longitudinal strain was a good predictor for presence of significant stenosis with a sensitivity of (93.8%), specificity (75%) and accuracy (91.7%) compared with coronary angiography. For the stenosis in right coronary artery, the left ventricular longitudinal strain had

... Show More
View Publication
Crossref (2)
Crossref
Publication Date
Sun Jun 02 2013
Journal Name
Baghdad Science Journal
Detection of Type 2 Diabetes Mellitus in Serum from Women with Polycystic Ovarian Syndrome
...Show More Authors

Polycystic ovary syndrome (PCOS) is one of the most common endocrine disorder. To determine the metabolic disorders in women with PCOS, (25) women with PCOS ages (15 - 47) years have been investigated and compared with (20) healthy individuals. All the studied groups were carried out to measure fasting blood sugar, (anti-GAD Ab, anti ?-islet cell Ab by IFAT) and measured insulin level by ELISA. There was significant elevation in the concentration of fasting blood sugar than in control groups (p ? 0.05) and there was negative results for anti-GAD Ab and anti ?-islet cell Ab by IFAT test for serum of women with PCOS, while there was significant differences in the insulin level for women with PCOS compared with control groups (p ? 0.05), these

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Tue Nov 01 2022
Journal Name
Journal Of Photochemistry And Photobiology B: Biology
High efficiency of Ag0 decorated Cu2MoO4 nanoparticles for heterogeneous photocatalytic activation, bactericidal system, and detection of glucose from blood sample
...Show More Authors

View Publication
Scopus (61)
Crossref (60)
Scopus Clarivate Crossref
Publication Date
Tue Jun 30 2015
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
Consumer protection in e-marketing contracts An analytical study.: Consumer protection in e-marketing contracts An analytical study.
...Show More Authors

Marketing plays a role in the transfer of consumer desires through research, studies and satisfy the needs process, and with the technical development has evolved and marketing departments in the world of commerce has made great strides since the expansion of the trade deal, especially in light of spread of the Internet and the culture of use where he became a lot as individuals or institutions are dealings via electronic shopping . In all cases, we find that the consumer is important party, and that the legal rules did not leave the shopping process or contracting E without protection and I've dealt with so many studies through the civil protection for the consumer in electronic contracts legally with an analytical study of the

... Show More
View Publication Preview PDF
Publication Date
Wed Sep 12 2018
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Cryptography with Dynamic DNA Depending on Edge Detection
...Show More Authors

Making the data secure is more and more concerned in the communication era. This research is an attempt to make a more secured information message by using both encryption and steganography. The encryption phase is done with dynamic DNA complementary rules while DNA addition rules are done with secret key where both are based on the canny edge detection point of the cover image. The hiding phase is done after dividing the cover image into 8 blocks, the blocks that are used for hiding selected in reverse order exception the edge points. The experiments result shows that the method is reliable with high value in PSNR

View Publication Preview PDF
Crossref
Publication Date
Tue Feb 01 2022
Journal Name
Int. J. Nonlinear Anal. Appl.
Computer-based plagiarism detection techniques: A comparative study
...Show More Authors

Plagiarism is becoming more of a problem in academics. It’s made worse by the ease with which a wide range of resources can be found on the internet, as well as the ease with which they can be copied and pasted. It is academic theft since the perpetrator has ”taken” and presented the work of others as his or her own. Manual detection of plagiarism by a human being is difficult, imprecise, and time-consuming because it is difficult for anyone to compare their work to current data. Plagiarism is a big problem in higher education, and it can happen on any topic. Plagiarism detection has been studied in many scientific articles, and methods for recognition have been created utilizing the Plagiarism analysis, Authorship identification, and

... Show More
Publication Date
Thu Oct 01 2020
Journal Name
Journal Of Engineering Science And Technology
Automatic voice activity detection using fuzzy-neuro classifier
...Show More Authors

Voice Activity Detection (VAD) is considered as an important pre-processing step in speech processing systems such as speech enhancement, speech recognition, gender and age identification. VAD helps in reducing the time required to process speech data and to improve final system accuracy by focusing the work on the voiced part of the speech. An automatic technique for VAD using Fuzzy-Neuro technique (FN-AVAD) is presented in this paper. The aim of this work is to alleviate the problem of choosing the best threshold value in traditional VAD methods and achieves automaticity by combining fuzzy clustering and machine learning techniques. Four features are extracted from each speech segment, which are short term energy, zero-crossing rate, auto

... Show More
View Publication Preview PDF
Scopus (6)
Scopus
Publication Date
Mon May 15 2017
Journal Name
International Journal Of Image And Data Fusion
Image edge detection operators based on orthogonal polynomials
...Show More Authors

View Publication
Scopus (32)
Crossref (10)
Scopus Crossref
Publication Date
Wed Sep 11 2019
Journal Name
Journal Of Mechanical Engineering Research And Developments
INDUSTRIAL TRACKING CAMERA AND PRODUCT VISION DETECTION SYSTEM
...Show More Authors

View Publication
Scopus (6)
Crossref (3)
Scopus Crossref