Preferred Language
Articles
/
bsj-6210
Performance Evaluation of Intrusion Detection System using Selected Features and Machine Learning Classifiers
...Show More Authors

Some of the main challenges in developing an effective network-based intrusion detection system (IDS) include analyzing large network traffic volumes and realizing the decision boundaries between normal and abnormal behaviors. Deploying feature selection together with efficient classifiers in the detection system can overcome these problems.  Feature selection finds the most relevant features, thus reduces the dimensionality and complexity to analyze the network traffic.  Moreover, using the most relevant features to build the predictive model, reduces the complexity of the developed model, thus reducing the building classifier model time and consequently improves the detection performance.  In this study, two different sets of selected features have been adopted to train four machine-learning based classifiers.  The two sets of selected features are based on Genetic Algorithm (GA) and Particle Swarm Optimization (PSO) approach respectively.  These evolutionary-based algorithms are known to be effective in solving optimization problems.  The classifiers used in this study are Naïve Bayes, k-Nearest Neighbor, Decision Tree and Support Vector Machine that have been trained and tested using the NSL-KDD dataset. The performance of the abovementioned classifiers using different features values was evaluated.  The experimental results indicate that the detection accuracy improves by approximately 1.55% when implemented using the PSO-based selected features than that of using GA-based selected features.  The Decision Tree classifier that was trained with PSO-based selected features outperformed other classifiers with accuracy, precision, recall, and f-score result of 99.38%, 99.36%, 99.32%, and 99.34% respectively.  The results show that using optimal features coupling with a good classifier in a detection system able to reduce the classifier model building time, reduce the computational burden to analyze data, and consequently attain high detection rate.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Mar 30 2023
Journal Name
Iraqi Journal Of Science
A Tri-Gene Ontology Migration Operator for Improving the Performance of Meta-heuristics in Complex Detection Problems
...Show More Authors

      Detecting protein complexes in protein-protein interaction (PPI) networks is a challenging problem in computational biology. To uncover a PPI network into a complex structure, different meta-heuristic algorithms have been proposed in the literature. Unfortunately, many of such methods, including evolutionary algorithms (EAs), are based solely on the topological information of the network rather than on biological information. Despite the effectiveness of EAs over heuristic methods, more inherent biological properties of proteins are rarely investigated and exploited in these approaches. In this paper, we proposed an EA with a new mutation operator for complex detection problems. The proposed mutation operator is formulate

... Show More
Scopus (3)
Scopus Crossref
Publication Date
Thu Apr 07 2016
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
DETECTION OF MICROBIAL CONTAMINATION IN SOME TYPES OF FLOUR THAT AVAILABLE IN LOCAL MARKETS USING BACTRAC DEVICE 3400: DETECTION OF MICROBIAL CONTAMINATION IN SOME TYPES OF FLOUR THAT AVAILABLE IN LOCAL MARKETS USING BACTRAC DEVICE 3400
...Show More Authors

A microbial study conducted for a number of flour samples (30 samples) Uses in the bakery ovens in various areas of the city of Baghdad, by used the conventional methods used in laboratories in microbial tests and compared with the modern techniqueby usedof BacTrac Device 3400 equipped from SY-LAB Impedance analysersAustrian company.The results of two ways showed (The conventional way and BacTrac Device test)that the total counts of aerobic bacteria, coliform bacteria, StaphylococcusSpp. bacteria, Bacillus cereus bacteria and yeasts and molds,Most of them were within the permissible borders in the Iraqi standard for grain and its products With free samples from SalmonellaSpp. bacteria, and that the screening by BacTrac device are shorten

... Show More
View Publication Preview PDF
Publication Date
Mon Dec 05 2022
Journal Name
Baghdad Science Journal
An Evaluation of the Activity of Prepared Zinc Nanoparticles with Extracted Alfalfa Plant in the Treatment of Heavy Metals
...Show More Authors

The alfalfa plant, after harvesting, was washed, dried, and grinded to get fine powder used in water treatment. We used the alfalfa plant with ethanol to make the alcoholic extract characterized by using (GC-Mass, FTIR, and UV) spectroscopy to determine active compounds. Alcoholic extract was used to prepare zinc nanoparticles. We characterized Zinc nanoparticles using (FTIR, UV, SEM, EDX Zeta potential, XRD, AFM). Zinc nanoparticle with Alfalfa extract and alfalfa powder were used in the treatment of water polluted with inorganic elements such as Cr, Mn, Fe, Cu, Cd, Ag by (Batch processing). The batch process with using alfalfa powder gets treated with Pb (51.45%), which is the highest percentage of treatment. Mn (13.18%), which is the

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (2)
Scopus Crossref
Publication Date
Mon May 15 2017
Journal Name
Journal Of Theoretical And Applied Information Technology
Anomaly detection in text data that represented as a graph using dbscan algorithm
...Show More Authors

Anomaly detection is still a difficult task. To address this problem, we propose to strengthen DBSCAN algorithm for the data by converting all data to the graph concept frame (CFG). As is well known that the work DBSCAN method used to compile the data set belong to the same species in a while it will be considered in the external behavior of the cluster as a noise or anomalies. It can detect anomalies by DBSCAN algorithm can detect abnormal points that are far from certain set threshold (extremism). However, the abnormalities are not those cases, abnormal and unusual or far from a specific group, There is a type of data that is do not happen repeatedly, but are considered abnormal for the group of known. The analysis showed DBSCAN using the

... Show More
Preview PDF
Scopus (4)
Scopus
Publication Date
Sun Mar 01 2020
Journal Name
Iraqi Journal Of Physics
Blood Vessels Detection of Diabetic Retinopathy from Retinal Fundus Image using Image Processing Techniques
...Show More Authors

 

Early detection of eye diseases can forestall visual deficiency and vision loss. There are several types of human eye diseases, for example, diabetic retinopathy, glaucoma, arteriosclerosis, and hypertension. Diabetic retinopathy (DR) which is brought about by diabetes causes the retinal vessels harmed and blood leakage in the retina. Retinal blood vessels have a huge job in the detection and treatment of different retinal diseases. Thus, retinal vasculature extraction is significant to help experts for the finding and treatment of systematic diseases. Accordingly, early detection and consequent treatment are fundamental for influenced patients to protect their vision. The aim of this paper is to detect blood vessels from

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Wed Mar 15 2023
Journal Name
International Journal Of Advances In Intelligent Informatics
An automatic lip reading for short sentences using deep learning nets
...Show More Authors

One study whose importance has significantly grown in recent years is lip-reading, particularly with the widespread of using deep learning techniques. Lip reading is essential for speech recognition in noisy environments or for those with hearing impairments. It refers to recognizing spoken sentences using visual information acquired from lip movements. Also, the lip area, especially for males, suffers from several problems, such as the mouth area containing the mustache and beard, which may cover the lip area. This paper proposes an automatic lip-reading system to recognize and classify short English sentences spoken by speakers using deep learning networks. The input video extracts frames and each frame is passed to the Viola-Jone

... Show More
View Publication
Scopus (6)
Crossref (3)
Scopus Crossref
Publication Date
Sun Dec 01 2019
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Measuring the impact of internal control on tax performance using balanced score card indicators: An applied research in a sample of the branches of the General Tax Authority in Iraq
...Show More Authors

This research dealt with the impact of internal control on tax performance using balanced scorecard indicators because of its special importance in improving tax performance and reform. The internal control system is a safety valve for senior management in all organizations, it plays an important role in the regularity and development of work and the fight against corruption To provide reliable and accurate data and information, follow up on compliance with laws, regulations and instructions. The aim of this research is to demonstrate how control affects tax performance and how to adapt internal control components to improve tax performance. In the General Authority for taxes and its branches,. The research resulted in a number of conclu

... Show More
View Publication Preview PDF
Publication Date
Tue Feb 01 2022
Journal Name
Baghdad Science Journal
An Enhanced Approach of Image Steganographic Using Discrete Shearlet Transform and Secret Sharing
...Show More Authors

Recently, the internet has made the users able to transmit the digital media in the easiest manner. In spite of this facility of the internet, this may lead to several threats that are concerned with confidentiality of transferred media contents such as media authentication and integrity verification. For these reasons, data hiding methods and cryptography are used to protect the contents of digital media. In this paper, an enhanced method of image steganography combined with visual cryptography has been proposed. A secret logo (binary image) of size (128x128) is encrypted by applying (2 out 2 share) visual cryptography on it to generate two secret share. During the embedding process, a cover red, green, and blue (RGB) image of size (512

... Show More
View Publication Preview PDF
Scopus (13)
Crossref (8)
Scopus Clarivate Crossref
Publication Date
Thu Apr 27 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Extraction of volatile oils and evaluation some features of volatile oil from the leaves of some local Eucalyptus spp trees and comparing them with volatile oil of some foreign species
...Show More Authors

 This study included the extraction of volatile oils from the leaves of some local Eucalyptus trees (i.e.(1)E.camldulensis ,(2) E.camldulensis , E.microtheca , E.globules , E.sideroxylem , E.krusianin. by the water distillation method. As well as exploring some of their physical properties.       The results of this study reveald that the local eucalyptus trees gave a good rate of volatile oil equals to some global kinds and to the rate in India pharmacopeia.       Also the results revealed that there had been concurrence between the percentages of volatile oils and refractive index and specific gravity of the plants on which the study was made to study and those included i

... Show More
View Publication Preview PDF
Publication Date
Tue Jan 28 2020
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Forecasting the performance and profitability of companies using the equation of Tobin’sq
...Show More Authors

The main objective and primary concern to every investor not only to achieve a greater return on his or her investments, but also to create the largest possible value of these investments the, researchers and those interested in the field of investment and financial analysis  try to develop standards  for performance      valuation      is guided through the                                     &nbsp

... Show More
View Publication Preview PDF