Preferred Language
Articles
/
bsj-2167
Developing an Immune Negative Selection Algorithm for Intrusion Detection in NSL-KDD data Set
...Show More Authors

With the development of communication technologies for mobile devices and electronic communications, and went to the world of e-government, e-commerce and e-banking. It became necessary to control these activities from exposure to intrusion or misuse and to provide protection to them, so it's important to design powerful and efficient systems-do-this-purpose. It this paper it has been used several varieties of algorithm selection passive immune algorithm selection passive with real values, algorithm selection with passive detectors with a radius fixed, algorithm selection with passive detectors, variable- sized intrusion detection network type misuse where the algorithm generates a set of detectors to distinguish the self-samples. Practical Experiments showed the process to achieve a high rate of detection in the system designer using data NSL-KDD with 12 field without vulnerability to change the radius of the detector or change the number of reagents were obtained as the ratio between detection (0.984, 0.998, 0.999) and the ratio between a false alarm (0.003, 0.002, 0.001). Contrary to the results of experiments conducted on data NSL-KDD with 41 field contact, which affected the rate of detection by changing the radius and the number of the detector as it has been to get the proportion of uncovered between (0.44, 0.824, 0.992) and the percentage of false alarm between (0.5, 0.175, 0.003).

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Mar 01 2021
Journal Name
Al-khwarizmi Engineering Journal
Hurst Exponent and Tsallis Entropy Markers for Epileptic Detection from Children
...Show More Authors

The aim of the present study was to distinguish between healthy children and those with epilepsy by electroencephalography (EEG). Two biomarkers including Hurst exponents (H) and Tsallis entropy (TE) were used to investigate the background activity of EEG of 10 healthy children and 10 with epilepsy. EEG artifacts were removed using Savitzky-Golay (SG) filter. As it hypothesize, there was a significant changes in irregularity and complexity in epileptic EEG in comparison with healthy control subjects using t-test (p< 0.05). The increasing in complexity changes were observed in H and TE results of epileptic subjects make them suggested EEG biomarker associated with epilepsy and a reliable tool for detection and identification of this di

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (2)
Scopus Crossref
Publication Date
Wed Dec 13 2023
Journal Name
2023 3rd International Conference On Intelligent Cybernetics Technology &amp; Applications (icicyta)
GPT-4 versus Bard and Bing: LLMs for Fake Image Detection
...Show More Authors

The recent emergence of sophisticated Large Language Models (LLMs) such as GPT-4, Bard, and Bing has revolutionized the domain of scientific inquiry, particularly in the realm of large pre-trained vision-language models. This pivotal transformation is driving new frontiers in various fields, including image processing and digital media verification. In the heart of this evolution, our research focuses on the rapidly growing area of image authenticity verification, a field gaining immense relevance in the digital era. The study is specifically geared towards addressing the emerging challenge of distinguishing between authentic images and deep fakes – a task that has become critically important in a world increasingly reliant on digital med

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (3)
Scopus Crossref
Publication Date
Sat Jun 04 2022
Journal Name
Al–bahith Al–a'alami
Agitation Negative Social Behaviours in the Talk Shows of the (NRT) Satellite Channel: Research extracted from a master's thesis
...Show More Authors

This research asks what are negative social behaviours in the Kurdistan Region of Iraq (KRI) raised by the talk shows on the (NRT) channel? Furthermore, it aims to identify the most significant themes addressed by talk shows on the (NRT) channel regarding negative social behaviours in the KRI by using the content analysis approach through non-random purposive sampling to understand the dialogue contents that dealt with this subject. This study has reached a set of results: through its talk shows, the (NRT) channel attempts to create a media vision about the spread of negative social behaviours in the KRI and stand up to the dangers associated with these behaviours. At the same time, those programs tried to marginalize the behaviours that

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Sep 28 2021
Journal Name
Journal Of The College Of Education For Women
The Commonest Negative Behavioral Manifestations among Kindergarten Children in the Post-Terrorist Phase: شيماء حارث محمد , امل داود سليم
...Show More Authors

Behavioral and emotional disorders represent one of the commonest problems facing children in particular and disturbing their parents and educators in general. This is because Iraqi people have long been living in difficult conditions and faced various terrorists’ operations, such as killing, destruction, robbery, and looting. Such operations are said to be one of the reasons that leads to the development of such disorders, and may negatively affect the psyche of the child and be reflected on his behavior as represented by playing with the IPad for hours, and suffering from nightmares. Accordingly, the current research aims to examine specifically the commonest negative behavioral disorders among kindergarten children during the post-t

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Mar 11 2019
Journal Name
Baghdad Science Journal
Developing Load Balancing for IoT - Cloud Computing Based on Advanced Firefly and Weighted Round Robin Algorithms
...Show More Authors

The evolution of the Internet of things (IoT) led to connect billions of heterogeneous physical devices together to improve the quality of human life by collecting data from their environment. However, there is a need to store huge data in big storage and high computational capabilities.   Cloud computing can be used to store big data.  The data of IoT devices is transferred using two types of protocols: Message Queuing Telemetry Transport (MQTT) and Hypertext Transfer Protocol (HTTP). This paper aims to make a high performance and more reliable system through efficient use of resources. Thus, load balancing in cloud computing is used to dynamically distribute the workload across nodes to avoid overloading any individual r

... Show More
View Publication Preview PDF
Scopus (29)
Crossref (14)
Scopus Clarivate Crossref
Publication Date
Thu Nov 14 2024
Journal Name
Journal Of Studies And Researches Of Sport Education
The Effect Of Suggested Exercises On Developing Some Mental Abilities For Children Aged 4-6 Years
...Show More Authors

The purpose of the current article lies in determining  the impact of the suggestive  exercises on the development of  the mental capabilities of children. The researchers used the experimental method with a single-group design, which was appropriate for the core of the current article . The study samble  has been specified as children aged 4-6 years in Umm Al-Rabi'een Kindergarten, with a total of 95 children. The study samble  (15 children) was randomly selected.  . After the exercises were completed, the post-tests have been carried out  on the sample  with similar circumstances as that of  pre-tests.  Researchers used statistical methods in the SPSS program. After the results were presented, analyzed, and discussed, The resear

... Show More
View Publication Preview PDF
Crossref (4)
Crossref
Publication Date
Tue Oct 01 2013
Journal Name
Journal Of Economics And Administrative Sciences
Comparison Robust M Estimate With Cubic Smoothing Splines For Time-Varying Coefficient Model For Balance Longitudinal Data
...Show More Authors

In this research، a comparison has been made between the robust estimators of (M) for the Cubic Smoothing Splines technique، to avoid the problem of abnormality in data or contamination of error، and the traditional estimation method of Cubic Smoothing Splines technique by using two criteria of differentiation which are (MADE، WASE) for different sample sizes and disparity levels to estimate the chronologically different coefficients functions for the balanced longitudinal data which are characterized by observations obtained through (n) from the independent subjects، each one of them is measured repeatedly by group of  specific time points (m)،since the frequent measurements within the subjects are almost connected an

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Apr 03 2023
Journal Name
Journal Of Educational And Psychological Researches
The Role of Digital Repositories in Developing Teacher Performance in the Primary Stage
...Show More Authors

Abstract

Digital repositories are considered one of the integrated collaborative educational environments that help every researcher interested in developing the education and educational process. The learning resources provided by the repositories are suitable for every researcher, so digital information can be stored and exchanged by ensuring the participation and cooperation of researchers, teachers, and those who are interested, as well as curricula experts, teachers, and students, to exchange each other’s experiences in constantly updating that information as a reason for developing their performance in education. This reveals the importance of the role of educational digital institutions by providing and

... Show More
View Publication Preview PDF
Publication Date
Thu May 18 2023
Journal Name
Journal Of Engineering
Genetic Algorithm Optimization Model for Central Marches Restoration Flows with Different Water Quality Scenarios
...Show More Authors

A Genetic Algorithm optimization model is used in this study to find the optimum flow values of the Tigris river branches near Ammara city, which their water is to be used for central marshes restoration after mixing in Maissan River. These tributaries are Al-Areed, AlBittera and Al-Majar Al-Kabeer Rivers. The aim of this model is to enhance the water quality in Maissan River, hence provide acceptable water quality for marsh restoration. The model is applied for different water quality change scenarios ,i.e. , 10%,20% increase in EC,TDS and BOD. The model output are the optimum flow values for the three rivers while, the input data are monthly flows(1994-2011),monthly water requirements and water quality parameters (EC, TDS, BOD, DO and

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Fri Jan 01 2021
Journal Name
Journal Of Engineering
A Proposed Adaptive Bitrate Scheme Based on Bandwidth Prediction Algorithm for Smoothly Video Streaming
...Show More Authors

A robust video-bitrate adaptive scheme at client-aspect plays a significant role in keeping a good quality of video streaming technology experience. Video quality affects the amount of time the video has turned off playing due to the unfilled buffer state. Therefore to maintain a video streaming continuously with smooth bandwidth fluctuation, a video buffer structure based on adapting the video bitrate is considered in this work. Initially, the video buffer structure is formulated as an optimal control-theoretic problem that combines both video bitrate and video buffer feedback signals. While protecting the video buffer occupancy from exceeding the limited operating level can provide continuous video str

... Show More
View Publication Preview PDF
Crossref (1)
Crossref