Preferred Language
Articles
/
bsj-4000
Anomaly Detection Approach Based on Deep Neural Network and Dropout
...Show More Authors

   Regarding to the computer system security, the intrusion detection systems are fundamental components for discriminating attacks at the early stage. They monitor and analyze network traffics, looking for abnormal behaviors or attack signatures to detect intrusions in early time. However, many challenges arise while developing flexible and efficient network intrusion detection system (NIDS) for unforeseen attacks with high detection rate. In this paper, deep neural network (DNN) approach was proposed for anomaly detection NIDS. Dropout is the regularized technique used with DNN model to reduce the overfitting. The experimental results applied on NSL_KDD dataset. SoftMax output layer has been used with cross entropy loss function to enforce the proposed model in multiple classification, including five labels, one is normal and four others are attacks (Dos, R2L, U2L and Probe). Accuracy metric was used to evaluate the model performance. The proposed model accuracy achieved to 99.45%. Commonly the recognition time is reduced in the NIDS by using feature selection technique. The proposed DNN classifier implemented with feature selection algorithm, and obtained on accuracy reached to 99.27%.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Sep 21 2024
Journal Name
Asian Pacific Journal Of Cancer Prevention
Oncolytic Newcastle Disease Virus and Photodynamic Therapy as Dual Approach for Breast Cancer Treatment
...Show More Authors

Objective: We hypothesized that attacking cancer cells by combining various modes of action can hinder them from taking the chance to evolve resistance to treatment. Incorporation of photodynamic therapy (PDT) with oncolytic virotherapy might be a promising dual approach to cancer treatment. Methods: NDV AMHA1 strain as virotherapy in integration with aminolaevulinic acid (ALA) using low power He-Ne laser as PDT in the existing work was examined against breast cancer cells derived from Iraqi cancer patients named (AMJ13). This combination was evaluated using Chou–Talalay analysis. Results: The results showed an increased killing rate when using both 0.01 and 0.1 Multiplicity of infection (MOI) of the virus when combined with a dose of 617

... Show More
View Publication
Scopus Crossref
Publication Date
Wed Jun 25 2025
Journal Name
Iraqi Journal Of Pharmaceutical Sciences
Phytochemical Analysis and Prostate Cancer Cytotoxicity of Iraqi Apium graveolens: A GC-MS Approach
...Show More Authors

Apium graveolens has been utilized for a multitude of purposes due to its diverse pharmacological characteristics. On the other hand, little is known about how the fatty acids (saturated and unsaturated) terpenes and steroids found in Iraqi Apium graveolens affect the human cancer cells. The purpose of this study was to examine the effects of Iraqi Apium graveolens petroleum ether extract on the human prostate cancer cell line (PC3). Subsidiary extraction and phytochemical analysis by GC/MS were performed.The dry and fresh aerial parts (leaves and stem) of Apium graveolens were extracted using a Soxhlet device with 70 % ethanol, then fractionated with petroleum ether. Then Gas Chromatography System was used to identify the bioactive

... Show More
View Publication
Scopus
Publication Date
Mon Jan 01 2024
Journal Name
Journal Of Engineering
Improving Press Bending Production Quality through Finite Element Simulation: Integration CAD and CAE Approach
...Show More Authors

Efficient operations and output of outstanding quality distinguish superior manufacturing sectors. The manufacturing process production of bending sheet metal is a form of fabrication in the industry of manufacture in which the plate is bent using punches and dies to the angle of the work design. Product quality is influenced by plate material selection, which includes thickness, type, dimensions, and material. Because no prior research has concentrated on this methodology, this research aims to determine V-bending capacity limits utilizing the press bending method. The inquiry employed finite element analysis (FEA), along with Solidworks was the tool of choice to develop drawings of design and simulations. The ASTM E290

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Thu Jun 30 2022
Journal Name
Journal Of Economics And Administrative Sciences
Industrial Sector and Development of Iraqi Economy by Kaldor's Approach For Years (2017-2030)
...Show More Authors

The study aims to clarify the impact of growth in the industrial sector on economic growth in the Iraqi economics according to the methodology of Kaldor for (2017-2030) , taking into consideration the effect of the accumulation of capital in the calculation of growth rates in the economy through productivity estimate of Total Factor Productivity (TFP) to growth in the economy, which is why the study assumes a formula to comply with the laws of Kaldor growth models developed requirements. This study is the most important to find out  the development of the laws of Kaldor among Arabic studies, especially the first and third, so that the relationship between the growth of industrial production and economic growth as represented

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Feb 10 2019
Journal Name
Journal Of The College Of Education For Women
The Foreignized Translation: One Approach to Respect and Preserve the Culture of the other
...Show More Authors

Domesticated translation has been for a long time the norm in cultural communication between nations all over the world. The texts are translated mainly into English (being the dominant language) in terms dictated principally by the requirements of the target language (English). The claim has been that fluency, readability, and immediate intelligibility can be guaranteed as far as the reader of the target language is concerned (English). The foreignness of the text (of the culture which produced it) would be not preserved. Not only this. Being the language of predominant cultures, English has become number one among languages into which texts are translated. The imbalance has been noticeable between the volumes of works translated from a

... Show More
View Publication Preview PDF
Publication Date
Wed Jan 24 2018
Journal Name
The Journal Of Physical Chemistry C
Novel Approach for Fabricating Transparent and Conducting SWCNTs/ITO Thin Films for Optoelectronic Applications
...Show More Authors

View Publication
Scopus (35)
Crossref (40)
Scopus Clarivate Crossref
Publication Date
Sun Sep 01 2019
Journal Name
Journal Of Craniofacial Surgery
Pros and Cons of the Transconjunctival Retroseptal Approach to the Isolated Orbital Floor Fracture
...Show More Authors

To get access into the orbital floor 3 paths are commonly used which are transconjunctival, subciliary and subtarsal approaches. Each one of these approaches has its advantages and disadvantages. The study assessed the outcomes of the transconjunctival retroseptal approach, which reflects our experience in this type of surgery. Along 8 years, 26 patients received in the emergency room diagnosed with pure isolated orbital floor fractures, all of them admitted to the maxillofacial surgery department and approached by transconjunctival incision without lateral canthotomy. Three types of complications occurred: laceration of the lower eyelid, injury to the lacrimal system and entropion. All of these complications were managed accordingly with n

... Show More
View Publication
Scopus (7)
Crossref (9)
Scopus Clarivate Crossref
Publication Date
Sun Feb 03 2019
Journal Name
Journal Of The College Of Education For Women
Features of Historical Approach in Thinking the Grammar In Ibin Ginie: Features of Historical Approach in Thinking the Grammar In Ibin Ginie
...Show More Authors

Abstract:
This research to monitor the features of the historical method in the
thought of a linguistic scientist is known (ibin genieD. 392 AH by offering a
range of grammatical rules presented in his book (the properties and the
nature of their treatment on the basis of the historical method in accordance
with These are an important milestone in facilitating the grammatical rules and
display image "makes it more suitable for the social reality

View Publication Preview PDF
Publication Date
Thu Dec 15 2022
Journal Name
Al-academy
Strategies of brain-based learning theory and its impact on the achievement of students of the Department of Art Education in Teaching Methods
...Show More Authors

The aim of the current research is to reveal the effect of using brain-based learning theory strategies on the achievement of Art Education students in the subject of Teaching Methods. The experimental design with two equal experimental and control groups was used. The experimental design with two independent and equal groups was used, and the total of the research sample was (60) male and female students, (30) male and female students represented the experimental group, and (30) male and female students represented the control group. The researcher prepared the research tool represented by the cognitive achievement test consisting of (20) questions, and it was characterized by honesty and reliability, and the experiment lasted (6) weeks

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Oct 17 2011
Journal Name
Journal Of Engineering
MODIFIED TRAINING METHOD FOR FEEDFORWARD NEURAL NETWORKS AND ITS APPLICATION in 4-LINK SCARA ROBOT IDENTIFICATION
...Show More Authors

In this research the results of applying Artificial Neural Networks with modified activation function to perform the online and offline identification of four Degrees of Freedom (4-DOF) Selective Compliance Assembly Robot Arm (SCARA) manipulator robot will be described. The proposed model of identification strategy consists of a feed-forward neural network with a modified activation function that operates in parallel with the SCARA robot model. Feed-Forward Neural Networks (FFNN) which have been trained online and offline have been used, without requiring any previous knowledge about the system to be identified. The activation function that is used in the hidden layer in FFNN is a modified version of the wavelet function. This approach ha

... Show More
Preview PDF