Preferred Language
Articles
/
bsj-4000
Anomaly Detection Approach Based on Deep Neural Network and Dropout
...Show More Authors

   Regarding to the computer system security, the intrusion detection systems are fundamental components for discriminating attacks at the early stage. They monitor and analyze network traffics, looking for abnormal behaviors or attack signatures to detect intrusions in early time. However, many challenges arise while developing flexible and efficient network intrusion detection system (NIDS) for unforeseen attacks with high detection rate. In this paper, deep neural network (DNN) approach was proposed for anomaly detection NIDS. Dropout is the regularized technique used with DNN model to reduce the overfitting. The experimental results applied on NSL_KDD dataset. SoftMax output layer has been used with cross entropy loss function to enforce the proposed model in multiple classification, including five labels, one is normal and four others are attacks (Dos, R2L, U2L and Probe). Accuracy metric was used to evaluate the model performance. The proposed model accuracy achieved to 99.45%. Commonly the recognition time is reduced in the NIDS by using feature selection technique. The proposed DNN classifier implemented with feature selection algorithm, and obtained on accuracy reached to 99.27%.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Apr 01 2017
Journal Name
Image & Video Processing
Enhancement of LBP-based face identification system by adopting preprocessing techniques
...Show More Authors

Face Identification system is an active research area in these years. However, the accuracy and its dependency in real life systems are still questionable. Earlier research in face identification systems demonstrated that LBP based face recognition systems are preferred than others and give adequate accuracy. It is robust against illumination changes and considered as a high-speed algorithm. Performance metrics for such systems are calculated from time delay and accuracy. This paper introduces an improved face recognition system that is build using C++ programming language with the help of OpenCV library. Accuracy can be increased if a filter or combinations of filters are applied to the images. The accuracy increases from 95.5% (without ap

... Show More
View Publication
Publication Date
Sat Apr 30 2016
Journal Name
Environmental Science And Pollution Research
Risk-based prioritization of pharmaceuticals in the natural environment in Iraq
...Show More Authors

View Publication
Scopus (53)
Crossref (44)
Scopus Clarivate Crossref
Publication Date
Tue Jan 01 2019
Journal Name
Aip Conference Proceedings
Improvement of electrical features of SnO2 based varistor doped with Al2O3
...Show More Authors

One of the important objectives of the varistor is for a sustainable environment and reduce the pollution resulting from the frequent damage of the electrical devices and power station waste. In present work, the influence of Al2O3 additives on the non –linear electrical features of SnO2 varistors, has been investigated, where SnO2 ceramic powder doped with Al2O3 in three rates (0.005, 0.01, and 0.05), the XRD test improved that SnO2 is the primary phase, while CoCr2O4, and Al2O3 represent the secondary phases. The electrical tests of all prepared samples confirmed that the increasing of Al2O3 rates and sintering temperature improves and increase the electrical features, where the best results obtained at Al2O3 (0.05) and 1000℃, the non

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Sun Feb 13 2022
Journal Name
Petroleum & Coal
Laboratory-Based Correlations to Estimate Geomechanical Properties for Carbonate Tight Reservoir.
...Show More Authors

Rock mechanical properties are critical parameters for many development techniques related to tight reservoirs, such as hydraulic fracturing design and detecting failure criteria in wellbore instability assessment. When direct measurements of mechanical properties are not available, it is helpful to find sufficient correlations to estimate these parameters. This study summarized experimentally derived correlations for estimating the shear velocity, Young's modulus, Poisson's ratio, and compressive strength. Also, a useful correlation is introduced to convert dynamic elastic properties from log data to static elastic properties. Most of the derived equations in this paper show good fitting to measured data, while some equations show scatters

... Show More
Publication Date
Sat Jan 10 2015
Journal Name
British Journal Of Mathematics & Computer Science
The Use of Gradient Based Features for Woven Fabric Images Classification
...Show More Authors

View Publication
Crossref
Publication Date
Thu Dec 15 2022
Journal Name
Arab World English Journal
Genre-Based Analysis of Selected Political Debates: A Discourse Analysis Study
...Show More Authors

The researchers of the present study have conducted a genre analysis of two political debates between American presidential nominees in the 2016 and 2020 elections. The current study seeks to analyze the cognitive construction of political debates to evaluate the typical moves and strategies politicians use to express their communicative intentions and to reveal the language manifestations of those moves and strategies. To achieve the study’s aims, the researchers adopt Bhatia’s (1993) framework of cognitive construction supported by van Emeren’s (2010) pragma-dialectic framework. The study demonstrates that both presidents adhere to this genre structuring to further their political agendas. For a positive and promising image

... Show More
View Publication Preview PDF
Clarivate Crossref
Publication Date
Wed Apr 01 2015
Journal Name
2015 Annual Ieee Systems Conference (syscon) Proceedings
Automatic generation of fuzzy classification rules using granulation-based adaptive clustering
...Show More Authors

View Publication
Scopus (4)
Crossref (4)
Scopus Crossref
Publication Date
Sun Dec 09 2018
Journal Name
Baghdad Science Journal
Optimal UAV Deployment for Data Collection in Deadline-based IoT Applications
...Show More Authors

The deployment of UAVs is one of the key challenges in UAV-based communications while using UAVs for IoT applications. In this article, a new scheme for energy efficient data collection with a deadline time for the Internet of things (IoT) using the Unmanned Aerial Vehicles (UAV) is presented. We provided a new data collection method, which was set to collect IoT node data by providing an efficient deployment and mobility of multiple UAV, used to collect data from ground internet of things devices in a given deadline time. In the proposed method, data collection was done with minimum energy consumption of IoTs as well as UAVs. In order to find an optimal solution to this problem, we will first provide a mixed integer linear programming m

... Show More
View Publication Preview PDF
Scopus (4)
Scopus Clarivate Crossref
Publication Date
Mon Oct 09 2023
Journal Name
2023 Ieee 34th International Symposium On Software Reliability Engineering Workshops (issrew)
Semantics-Based, Automated Preparation of Exploratory Data Analysis for Complex Systems
...Show More Authors

View Publication
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Sun Aug 01 2021
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Simulation based comparison of routing protocols in wireless multihop adhoc networks
...Show More Authors

Routing protocols are responsible for providing reliable communication between the source and destination nodes. The performance of these protocols in the ad hoc network family is influenced by several factors such as mobility model, traffic load, transmission range, and the number of mobile nodes which represents a great issue. Several simulation studies have explored routing protocol with performance parameters, but few relate to various protocols concerning routing and Quality of Service (QoS) metrics. This paper presents a simulation-based comparison of proactive, reactive, and multipath routing protocols in mobile ad hoc networks (MANETs). Specifically, the performance of AODV, DSDV, and AOMDV protocols are evaluated and analyz

... Show More
View Publication
Crossref (12)
Crossref