Preferred Language
Articles
/
bsj-2167
Developing an Immune Negative Selection Algorithm for Intrusion Detection in NSL-KDD data Set
...Show More Authors

With the development of communication technologies for mobile devices and electronic communications, and went to the world of e-government, e-commerce and e-banking. It became necessary to control these activities from exposure to intrusion or misuse and to provide protection to them, so it's important to design powerful and efficient systems-do-this-purpose. It this paper it has been used several varieties of algorithm selection passive immune algorithm selection passive with real values, algorithm selection with passive detectors with a radius fixed, algorithm selection with passive detectors, variable- sized intrusion detection network type misuse where the algorithm generates a set of detectors to distinguish the self-samples. Practical Experiments showed the process to achieve a high rate of detection in the system designer using data NSL-KDD with 12 field without vulnerability to change the radius of the detector or change the number of reagents were obtained as the ratio between detection (0.984, 0.998, 0.999) and the ratio between a false alarm (0.003, 0.002, 0.001). Contrary to the results of experiments conducted on data NSL-KDD with 41 field contact, which affected the rate of detection by changing the radius and the number of the detector as it has been to get the proportion of uncovered between (0.44, 0.824, 0.992) and the percentage of false alarm between (0.5, 0.175, 0.003).

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Jul 06 2022
Journal Name
Journal Of Asian Multicultural Research For Social Sciences Study
Remote Data Auditing in a Cloud Computing Environment
...Show More Authors

In the current paradigms of information technology, cloud computing is the most essential kind of computer service. It satisfies the need for high-volume customers, flexible computing capabilities for a range of applications like as database archiving and business analytics, and the requirement for extra computer resources to provide a financial value for cloud providers. The purpose of this investigation is to assess the viability of doing data audits remotely inside a cloud computing setting. There includes discussion of the theory behind cloud computing and distributed storage systems, as well as the method of remote data auditing. In this research, it is mentioned to safeguard the data that is outsourced and stored in cloud serv

... Show More
View Publication
Crossref
Publication Date
Sat Dec 01 2012
Journal Name
Journal Of Economics And Administrative Sciences
Using panel data in structural equations with application
...Show More Authors

The non static chain is always the problem of static analysis so that explained some of theoretical work, the properties of statistical regression analysis to lose when using strings in statistic and gives the slope of an imaginary relation under consideration.  chain is not static can become static by adding variable time to the multivariate analysis the factors to remove the general trend as well as variable placebo seasons to remove the effect of seasonal .convert the data to form exponential or logarithmic , in addition to using the difference repeated d is said in this case it integrated class d. Where the research contained in the theoretical side in parts in the first part the research methodology ha

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Oct 25 2025
Journal Name
Iet Networks
An Effective Technique of Zero‐Day Attack Detection in the Internet of Things Network Based on the Conventional Spike Neural Network Learning Method
...Show More Authors
ABSTRACT<p>The fast evolution of cyberattacks in the Internet of Things (IoT) area, presents new security challenges concerning Zero Day (ZD) attacks, due to the growth of both numbers and the diversity of new cyberattacks. Furthermore, Intrusion Detection System (IDSs) relying on a dataset of historical or signature‐based datasets often perform poorly in ZD detection. A new technique for detecting zero‐day (ZD) attacks in IoT‐based Conventional Spiking Neural Networks (CSNN), termed ZD‐CSNN, is proposed. The model comprises three key levels: (1) Data Pre‐processing, in this level a thorough cleaning process is applied to the CIC IoT Dataset 2023, which contains both malicious and t</p> ... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Mon Apr 03 2023
Journal Name
Journal Of Educational And Psychological Researches
The Role of Digital Repositories in Developing Teacher Performance in the Primary Stage
...Show More Authors

Abstract

Digital repositories are considered one of the integrated collaborative educational environments that help every researcher interested in developing the education and educational process. The learning resources provided by the repositories are suitable for every researcher, so digital information can be stored and exchanged by ensuring the participation and cooperation of researchers, teachers, and those who are interested, as well as curricula experts, teachers, and students, to exchange each other’s experiences in constantly updating that information as a reason for developing their performance in education. This reveals the importance of the role of educational digital institutions by providing and

... Show More
View Publication Preview PDF
Publication Date
Sun Oct 30 2022
Journal Name
Revista Iberoamericana De Psicologia Del Ejercicio Y El Deporte
THE EFFECT OF (HIT) TRAINING ON IMMUNE GLOBULINS AND WHITE BLOOD CELLS FOR AMATEUR WEIGHTLIFTERS AFTER THE RETURN OF ACTIVITY FROM THE MANDATORY QUARANTINE FOR THE COVID-19 EPIDEMIC
...Show More Authors

The aim of the research is to identify an appropriate training method that raises the levels of immune globulins (IgA, IgM, IgG) and white blood cells and the effect of training by (HIT) method using resistance (weights) as a training curriculum that increases immunity and ensures the continuation of the pills after the return of activity from the stone The response to the Covid-19 epidemic among amateur weightlifters, the researchers relied on the method of trace analysis in an experimental way by conducting a pre-, medial and post-test with the same experimental one agroup on a sample of amateur weightlifters in the Fury private hall for weightlifting and body building in Adhamiya, the number of sample members reached (15 players) who int

... Show More
View Publication
Scopus (5)
Scopus
Publication Date
Sat Mar 01 2008
Journal Name
Iraqi Journal Of Physics
Enforcing Wiener Filter in the Iterative Blind Restoration Algorithm
...Show More Authors

A new blind restoration algorithm is presented and shows high quality restoration. This
is done by enforcing Wiener filtering approach in the Fourier domains of the image and the
psf environments

View Publication Preview PDF
Publication Date
Mon Mar 11 2019
Journal Name
Baghdad Science Journal
Developing Load Balancing for IoT - Cloud Computing Based on Advanced Firefly and Weighted Round Robin Algorithms
...Show More Authors

The evolution of the Internet of things (IoT) led to connect billions of heterogeneous physical devices together to improve the quality of human life by collecting data from their environment. However, there is a need to store huge data in big storage and high computational capabilities.   Cloud computing can be used to store big data.  The data of IoT devices is transferred using two types of protocols: Message Queuing Telemetry Transport (MQTT) and Hypertext Transfer Protocol (HTTP). This paper aims to make a high performance and more reliable system through efficient use of resources. Thus, load balancing in cloud computing is used to dynamically distribute the workload across nodes to avoid overloading any individual r

... Show More
View Publication Preview PDF
Scopus (31)
Crossref (15)
Scopus Clarivate Crossref
Publication Date
Thu Nov 14 2024
Journal Name
Journal Of Studies And Researches Of Sport Education
The Effect Of Suggested Exercises On Developing Some Mental Abilities For Children Aged 4-6 Years
...Show More Authors

The purpose of the current article lies in determining  the impact of the suggestive  exercises on the development of  the mental capabilities of children. The researchers used the experimental method with a single-group design, which was appropriate for the core of the current article . The study samble  has been specified as children aged 4-6 years in Umm Al-Rabi'een Kindergarten, with a total of 95 children. The study samble  (15 children) was randomly selected.  . After the exercises were completed, the post-tests have been carried out  on the sample  with similar circumstances as that of  pre-tests.  Researchers used statistical methods in the SPSS program. After the results were presented, analyzed, and discussed, The resear

... Show More
View Publication Preview PDF
Crossref (5)
Crossref
Publication Date
Fri Jan 01 2021
Journal Name
Computers, Materials &amp; Continua
A New Hybrid Feature Selection Method Using T-test and Fitness Function
...Show More Authors

View Publication
Scopus (11)
Crossref (8)
Scopus Clarivate Crossref
Publication Date
Sun Mar 07 2010
Journal Name
Baghdad Science Journal
Detection of BRCA1and BRCA2 mutation for Breast Cancer in Sample of Iraqi Women above 40 Years
...Show More Authors

Breast cancer is the commonest cancer affecting women worldwide. Different studies have dealt with the etiological factors of that cancer aiming to find a way for early diagnosis and satisfactory therapy. The present study clarified the relationship between genetic polymorphisms of BRCA1 & BRCA2 genes and some etiological risk factors among breast cancer patients in Iraq. This investigation was carried out on 25 patients (all were females) who were diagnosed as breast cancer patients attended AL-Kadhemya Teaching Hospital in Baghdad and 10 apparently healthy women were used as a control, all women (patients and control) aged above 40 years. The Wizard Promega kit was used for DNA isolation from breast patients and normal individuals. B

... Show More
View Publication Preview PDF
Crossref