Preferred Language
Articles
/
bsj-6210
Performance Evaluation of Intrusion Detection System using Selected Features and Machine Learning Classifiers
...Show More Authors

Some of the main challenges in developing an effective network-based intrusion detection system (IDS) include analyzing large network traffic volumes and realizing the decision boundaries between normal and abnormal behaviors. Deploying feature selection together with efficient classifiers in the detection system can overcome these problems.  Feature selection finds the most relevant features, thus reduces the dimensionality and complexity to analyze the network traffic.  Moreover, using the most relevant features to build the predictive model, reduces the complexity of the developed model, thus reducing the building classifier model time and consequently improves the detection performance.  In this study, two different sets of selected features have been adopted to train four machine-learning based classifiers.  The two sets of selected features are based on Genetic Algorithm (GA) and Particle Swarm Optimization (PSO) approach respectively.  These evolutionary-based algorithms are known to be effective in solving optimization problems.  The classifiers used in this study are Naïve Bayes, k-Nearest Neighbor, Decision Tree and Support Vector Machine that have been trained and tested using the NSL-KDD dataset. The performance of the abovementioned classifiers using different features values was evaluated.  The experimental results indicate that the detection accuracy improves by approximately 1.55% when implemented using the PSO-based selected features than that of using GA-based selected features.  The Decision Tree classifier that was trained with PSO-based selected features outperformed other classifiers with accuracy, precision, recall, and f-score result of 99.38%, 99.36%, 99.32%, and 99.34% respectively.  The results show that using optimal features coupling with a good classifier in a detection system able to reduce the classifier model building time, reduce the computational burden to analyze data, and consequently attain high detection rate.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Dec 31 2012
Journal Name
Al-khwarizmi Engineering Journal
Evaluation Study of Glass Fiber Reinforced Polyester and Kevlar Reinforced Polyester by Taguchi Method
...Show More Authors

     In the present investigation two different types of fiber reinforced polymer composites were prepared by hand lay-up method using three different parameters (curing temperature, pressing load and fiber volume fraction). These composites were prepared from the polyester resin as the matrix material reinforced with glass fibers as first group of samples and mat Kevlar fibers as the second group, both with different volume fractions (4%, 8%, and 12%) of fibers. They were then tested by tensile strength and impact strength. The main objective in this study is to use Taguchi method for predicting the better parameters that give the better tensile and impact strength to the composites, and then preparing composites at

... Show More
View Publication Preview PDF
Publication Date
Sun Dec 31 2023
Journal Name
College Of Islamic Sciences
Features of misleading thought in Quranic discourse and methods of confronting it
...Show More Authors

Research summary

The Quranic discourse focused on a lot of vocabularies that carry goals that help man to acquire good, according to a methodology relies on adopting lofty ideas and values. The individual towards society, and the responsibility of society towards the individual. In our present age, the Muslim individual lives in a state of confrontation with deviant ideas, which unfortunately possess the means that make their impact great on society. The study concluded that the Holy Quran contains indicators and determinants of misguided and deviant thought, Which must be avoided because of the seriousness of its effects. Religion, in its general sense, represents a culture that transcends the limits of human ins

... Show More
View Publication Preview PDF
Publication Date
Sat Oct 20 2018
Journal Name
Journal Of Economics And Administrative Sciences
Evaluation of the Quality of Health Services from Patients’ Perspective: A Comparative Study between Public and Private Hospitals
...Show More Authors

ASTRACT

The current study aimed to identify the quality of health services provided by the Omani health sector through the comparison between public and private hospitals in Dhofar Governorate, Oman. A questionnaire has been developed to collect data from 360 patients who received health services in one public Hospital (Sultan Qaboos) and three private Hospitals (Badr Al-Sama, Lifeline, and Al-Hakeeim). The data were analyzed using independent samples T-Test and One Way ANOVA. The results of the study showed that the quality levels of health services offered in private hospitals were better than public hospitals. The study results also reveled that there are significant differences between public hospitals and private hos

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Jan 12 2023
Journal Name
Journal Of The Saudi Society Of Agricultural Sciences
Effect of planting density, foliar spraying and overlapping system on the growth and productivity using soilless culture system
...Show More Authors

Scopus (5)
Scopus
Publication Date
Tue Jan 14 2025
Journal Name
South Eastern European Journal Of Public Health
Deep learning-based threat Intelligence system for IoT Network in Compliance With IEEE Standard
...Show More Authors

The continuous advancement in the use of the IoT has greatly transformed industries, though at the same time it has made the IoT network vulnerable to highly advanced cybercrimes. There are several limitations with traditional security measures for IoT; the protection of distributed and adaptive IoT systems requires new approaches. This research presents novel threat intelligence for IoT networks based on deep learning, which maintains compliance with IEEE standards. Interweaving artificial intelligence with standardization frameworks is the goal of the study and, thus, improves the identification, protection, and reduction of cyber threats impacting IoT environments. The study is systematic and begins by examining IoT-specific thre

... Show More
View Publication
Crossref
Publication Date
Tue Jan 01 2013
Journal Name
Innovative Systems Design And Engineering
Automated Surface Defect Detection using Area Scan Camera
...Show More Authors

Publication Date
Tue Oct 12 2021
Journal Name
Engineering, Technology And Applied Science Research
Automated Pavement Distress Detection Using Image Processing Techniques
...Show More Authors

Pavement crack and pothole identification are important tasks in transportation maintenance and road safety. This study offers a novel technique for automatic asphalt pavement crack and pothole detection which is based on image processing. Different types of cracks (transverse, longitudinal, alligator-type, and potholes) can be identified with such techniques. The goal of this research is to evaluate road surface damage by extracting cracks and potholes, categorizing them from images and videos, and comparing the manual and the automated methods. The proposed method was tested on 50 images. The results obtained from image processing showed that the proposed method can detect cracks and potholes and identify their severity levels wit

... Show More
Scopus (29)
Crossref (25)
Scopus Crossref
Publication Date
Sun Dec 01 2024
Journal Name
Al-khwarizmi Engineering Journal
Defect Detection Using Thermography Camera Techniques: A review
...Show More Authors

Individuals across different industries, including but not limited to agriculture, drones, pharmaceuticals and manufacturing, are increasingly using thermal cameras to achieve various safety and security goals. This widespread adoption is made possible by advancements in thermal imaging sensor technology. The current literature provides an in-depth exploration of thermography camera applications for detecting faults in sectors such as fire protection, manufacturing, aerospace, automotive, non-destructive testing and structural material industries. The current discussion builds on previous studies, emphasising the effectiveness of thermography cameras in distinguishing undetectable defects by the human eye. Various methods for defect

... Show More
View Publication
Scopus (3)
Crossref (3)
Scopus Crossref
Publication Date
Fri Dec 25 2020
Journal Name
Al-nahrain Journal For Engineering Sciences
Comparison Sequences of Pick and Place System Controlled Using PLC
...Show More Authors

Pick and place system is one of the significant employments of modern robots utilized in industrial environments. The objective of this research is to make a comparison of time sequences by combining multiple axes of sequences. A pick-place system implemented with pneumatic linear double-acting cylinders to applicator in automated systems processes for manufacturing. The challenge of 3-axes movement control was achieved using the PLC (Programmable Logic Controller) controller such that the merging between two or three axes was achieved according to the selected sequence of the program. The outcomes show the contrasted sequences and the reference in a constant velocity. The main variable parameter is the number of steps for each sequ

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Sat Mar 19 2022
Journal Name
Al-khwarizmi Engineering Journal
Enhancement of System Security by Using LSB and RSA Algorithms
...Show More Authors

A steganography hides information within other information, such as file, message, picture, or video. A cryptography is the science of converting the information from a readable form to an unreadable form for unauthorized person. The main problem in the stenographic system is embedding in cover-data without providing information that would facilitate its removal. In this research, a method for embedding data into images is suggested which employs least significant bit Steganography (LSB) and ciphering (RSA algorithm) to protect the data. System security will be enhanced by this collaboration between steganography and cryptography.

View Publication Preview PDF
Scopus (3)
Crossref (2)
Scopus Crossref