Preferred Language
Articles
/
dxbivYoBVTCNdQwC26SA
Intrusion Detection System Techniques A Review
...Show More Authors

With the high usage of computers and networks in the current time, the amount of security threats is increased. The study of intrusion detection systems (IDS) has received much attention throughout the computer science field. The main objective of this study is to examine the existing literature on various approaches for Intrusion Detection. This paper presents an overview of different intrusion detection systems and a detailed analysis of multiple techniques for these systems, including their advantages and disadvantages. These techniques include artificial neural networks, bio-inspired computing, evolutionary techniques, machine learning, and pattern recognition.

Publication Date
Fri Jan 25 2019
Journal Name
Journal Of Al-qadisiyah For Computer Science And Mathematics Vol
Predicate the Ability of Extracorporeal Shock Wave Lithotripsy (ESWL) to treat the Kidney Stones by used Combined Classifier
...Show More Authors

Extracorporeal Shock Wave Lithotripsy (ESWL) is the most commonplace remedy for kidney stone. Shock waves from outside the body frame are centered at a kidney stone inflicting the stone to fragment. The success of the (ESWL) treatment is based on some variables such as age, sex, stone quantity stone period and so on. Thus, the prediction the success of remedy by this method is so important for professionals to make a decision to continue using (ESWL) or tousing another remedy technique. In this study, a prediction system for (ESWL) treatment by used three techniques of mixing classifiers, which is Product Rule (PR), Neural Network (NN) and the proposed classifier called Nested Combined Classi

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Jan 27 2020
Journal Name
Iraqi Journal Of Science
Deep Belief Network for Predicting the Predisposition to Lung Cancer in TP53 Gene
...Show More Authors

Lung cancer, similar to other cancer types, results from genetic changes. However, it is considered as more threatening due to the spread of the smoking habit, a major risk factor of the disease. Scientists have been collecting and analyzing the biological data for a long time, in attempts to find methods to predict cancer before it occurs. Analysis of these data requires the use of artificial intelligence algorithms and neural network approaches. In this paper, one of the deep neural networks was used, that is the enhancer Deep Belief Network (DBN), which is constructed from two Restricted Boltzmann Machines (RBM). The visible nodes for the first RBM are 13 nodes and 8 nodes in each hidden layer for the two RBMs. The enhancer DBN was tr

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (3)
Scopus Crossref
Publication Date
Thu Jun 20 2019
Journal Name
Baghdad Science Journal
Using Backpropagation to Predict Drought Factor in Keetch-Byram Drought Index
...Show More Authors

Forest fires continue to rise during the dry season and they are difficult to stop. In this case, high temperatures in the dry season can cause an increase in drought index that could potentially burn the forest every time. Thus, the government should conduct surveillance throughout the dry season. Continuous surveillance without the focus on a particular time becomes ineffective and inefficient because of preventive measures carried out without the knowledge of potential fire risk. Based on the Keetch-Byram Drought Index (KBDI), formulation of Drought Factor is used just for calculating the drought today based on current weather conditions, and yesterday's drought index. However, to find out the factors of drought a day after, the data

... Show More
View Publication Preview PDF
Clarivate Crossref
Publication Date
Tue Feb 28 2023
Journal Name
Iraqi Journal Of Science
Numerical Study of Compressible and Weak Compressible Flows in Channel Based on Artificial Compressibility Method and Fully Artificial Compressibility Method
...Show More Authors

      In this article, a numerical study of compressible and weak compressible Newtonian flows is achieved for a time marching, Galerkin algorithm. A comparison between two numerical techniques for such flows, namely the artificial compressibility method (AC–method) and the fully artificial compressibility method (FAC–method) is performed. In the first artificial compressibility parameter (  is added to the continuity equation, while this parameter is added to both continuity and momentum equations in the second technique. This strategy is implemented to treat the governing equations of Newtonian flow in cylindrical coordinates (axisymmetric). Particularly, this study concerns with the effect of the artificial compressibility p

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Tue Jan 30 2024
Journal Name
Iraqi Journal Of Science
Improved Naked Mole-Rat Algorithm Based on Variable Neighborhood Search for the N-Queens Problem
...Show More Authors

     Solving problems via artificial intelligence techniques has widely prevailed in different aspects. Implementing artificial intelligence optimization algorithms for NP-hard problems is still challenging. In this manuscript, we work on implementing the Naked Mole-Rat Algorithm (NMRA) to solve the n-queens problems and overcome the challenge of applying NMRA to a discrete space set. An improvement of NMRA is applied using the aspect of local search in the Variable Neighborhood Search algorithm (VNS) with 2-opt and 3-opt. Introducing the Naked Mole Rat algorithm based on variable neighborhood search (NMRAVNS) to solve N-queens problems with different sizes. Finding the best solution or set of solutions within a plausible amount of t

... Show More
View Publication Preview PDF
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Thu Mar 30 2023
Journal Name
Iraqi Journal Of Science
Low Energy Consumption Scheme Based on PEGASIS Protocol in WSNs
...Show More Authors

Wireless Sensor Networks (WSNs) are composed of a collection of rechargeable sensor nodes. Typically, sensor nodes collect and deliver the necessary data in response to a user’s specific request in many application areas such as health, military and domestic purposes. Applying routing protocols for sensor nodes can prolong the lifetime of the network. Power Efficient GAthering in Sensor Information System (PEGASIS) protocol is developed as a chain based protocol that uses a greedy algorithm in selecting one of the nodes as a head node to transmit the data to the base station. The proposed scheme Multi-cluster Power Efficient GAthering in Sensor Information System (MPEGASIS) is developed based on PEGASIS routing protocol in WSN. The aim

... Show More
View Publication Preview PDF
Publication Date
Fri Dec 30 2022
Journal Name
Iraqi Journal Of Science
Automatic Number Extraction from Fixed Imaging Distance
...Show More Authors

     Developed countries are facing many challenges to convert large areas of existing services to electronic modes, reflecting the current nature of workflow and the equipment utilized for achieving such services. For instance, electricity bill collection still tend to be based on traditional approaches (paper-based and relying on human interaction) making them comparatively time-consuming and prone to human error.

This research aims to recognize numbers in mechanical electricity meters and convert them to digital figures utilizing Optical Character Recognition (OCR) in Matlab. The research utilized the location of red region in color electricity meters image to determine the crop region that contain the meters numbers, then

... Show More
View Publication
Scopus Crossref
Publication Date
Thu May 28 2020
Journal Name
Iraqi Journal Of Science
Human Action Recognition Based on Bag-of-Words
...Show More Authors

Human action recognition has gained popularity because of its wide applicability, such as in patient monitoring systems, surveillance systems, and a wide diversity of systems that contain interactions between people and electrical devices, including human computer interfaces. The proposed method includes sequential stages of object segmentation, feature extraction, action detection and then action recognition. Effective results of human actions using different features of unconstrained videos was a challenging task due to camera motion, cluttered background, occlusions, complexity of human movements, and variety of same actions performed by distinct subjects. Thus, the proposed method overcomes such problems by using the fusion of featur

... Show More
View Publication Preview PDF
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Sun Dec 03 2017
Journal Name
Baghdad Science Journal
Network Self-Fault Management Based on Multi-Intelligent Agents and Windows Management Instrumentation (WMI)
...Show More Authors

This paper proposed a new method for network self-fault management (NSFM) based on two technologies: intelligent agent to automate fault management tasks, and Windows Management Instrumentations (WMI) to identify the fault faster when resources are independent (different type of devices). The proposed network self-fault management reduced the load of network traffic by reducing the request and response between the server and client, which achieves less downtime for each node in state of fault occurring in the client. The performance of the proposed system is measured by three measures: efficiency, availability, and reliability. A high efficiency average is obtained depending on the faults occurred in the system which reaches to

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Wed Dec 25 2024
Journal Name
International Journal Of Engineering & Technology
An integrated multi layers approach for detecting unknown malware behaviours
...Show More Authors

Malware represents one of the dangerous threats to computer security. Dynamic analysis has difficulties in detecting unknown malware. This paper developed an integrated multi – layer detection approach to provide more accuracy in detecting malware. User interface integrated with Virus Total was designed as a first layer which represented a warning system for malware infection, Malware data base within malware samples as a second layer, Cuckoo as a third layer, Bull guard as a fourth layer and IDA pro as a fifth layer. The results showed that the use of fifth layers was better than the use of a single detector without merging. For example, the efficiency of the proposed approach is 100% compared with 18% and 63% of Virus Total and Bel

... Show More
View Publication Preview PDF
Crossref