Preferred Language
Articles
/
ijs-2802
Vehicles Detection System at Different Weather Conditions

The importance of efficient vehicle detection (VD) is increased with the expansion of road networks and the number of vehicles in the Intelligent Transportation Systems (ITS). This paper proposes a system for detecting vehicles at different weather conditions such as sunny, rainy, cloudy and foggy days. The first step to the proposed system implementation is to determine whether the video’s weather condition is normal or abnormal. The Random Forest (RF) weather condition classification was performed in the video while the features were extracted for the first two frames by using the Gray Level Co-occurrence Matrix (GLCM). In this system, the background subtraction was applied by the mixture of Gaussian 2 (MOG 2) then applying a number of pre-processing operations, such as Gaussian blur filter, dilation, erosion, and threshold. The main contribution of this paper is to propose a histogram equalization technique for complex weather conditions instead of a Gaussian blur filter for improving the video clarity, which leads to increase detection accuracy. Based on the previous steps, the system defines each region in the frame expected to contain vehicles. Finally, Support Vector Machine (SVM) classifies the defined regions into a vehicle or not.  As compared to the previous methods, the proposed system showed high efficiency of about 96.4% and ability to detect vehicles at different weather conditions.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Dec 30 2020
Journal Name
Iraqi Journal Of Science
DNA Encoding for Misuse Intrusion Detection System based on UNSW-NB15 Data Set

Recent researches showed that DNA encoding and pattern matching can be used for the intrusion-detection system (IDS), with results of high rate of attack detection. The evaluation of these intrusion detection systems is based on datasets that are generated decades ago. However, numerous studies outlined that these datasets neither inclusively reflect the network traffic, nor the modern low footprint attacks, and do not cover the current network threat environment. In this paper, a new DNA encoding for misuse IDS based on UNSW-NB15 dataset is proposed. The proposed system is performed by building a DNA encoding for all values of 49 attributes. Then attack keys (based on attack signatures) are extracted and, finally, Raita algorithm is app

... Show More
Scopus (5)
Crossref (3)
Scopus Crossref
View Publication Preview PDF
Publication Date
Thu Jan 20 2022
Journal Name
Webology
Hybrid Intrusion Detection System based on DNA Encoding, Teiresias Algorithm and Clustering Method

Until recently, researchers have utilized and applied various techniques for intrusion detection system (IDS), including DNA encoding and clustering that are widely used for this purpose. In addition to the other two major techniques for detection are anomaly and misuse detection, where anomaly detection is done based on user behavior, while misuse detection is done based on known attacks signatures. However, both techniques have some drawbacks, such as a high false alarm rate. Therefore, hybrid IDS takes advantage of combining the strength of both techniques to overcome their limitations. In this paper, a hybrid IDS is proposed based on the DNA encoding and clustering method. The proposed DNA encoding is done based on the UNSW-NB15

... Show More
Crossref (2)
Crossref
View Publication
Publication Date
Sun Jun 20 2021
Journal Name
Baghdad Science Journal
Performance Evaluation of Intrusion Detection System using Selected Features and Machine Learning Classifiers

Some of the main challenges in developing an effective network-based intrusion detection system (IDS) include analyzing large network traffic volumes and realizing the decision boundaries between normal and abnormal behaviors. Deploying feature selection together with efficient classifiers in the detection system can overcome these problems.  Feature selection finds the most relevant features, thus reduces the dimensionality and complexity to analyze the network traffic.  Moreover, using the most relevant features to build the predictive model, reduces the complexity of the developed model, thus reducing the building classifier model time and consequently improves the detection performance.  In this study, two different sets of select

... Show More
Scopus (17)
Crossref (14)
Scopus Clarivate Crossref
View Publication Preview PDF
Publication Date
Tue Jan 31 2023
Journal Name
International Journal Of Nonlinear Analysis And Applications
Survey on intrusion detection system based on analysis concept drift: Status and future directions

Nowadays, internet security is a critical concern; the One of the most difficult study issues in network security is "intrusion detection". Fight against external threats. Intrusion detection is a novel method of securing computers and data networks that are already in use. To boost the efficacy of intrusion detection systems, machine learning and deep learning are widely deployed. While work on intrusion detection systems is already underway, based on data mining and machine learning is effective, it requires to detect intrusions by training static batch classifiers regardless considering the time-varying features of a regular data stream. Real-world problems, on the other hand, rarely fit into models that have such constraints. Furthermor

... Show More
View Publication
Publication Date
Wed Jun 27 2018
Journal Name
Iraqi Journal Of Science
The Impact of the Extreme Air Temperatures on the Characteristics of Iraq Weather

     Air Temperature is mainly affect the condition of temporal and spatial weather. This influence may be very high on some weather variables such as pressure, humidity and winds, also the Extreme of these variables can be considered as an indicator of the impact and intensity of the pressure systems. The data of the European Centre for Medium-Range Weather Forecasts (ECMWF) during the summer months (June, July and August) of the period (2006 - 2017) were used to extract the Extreme ​​of Daily Maximum Temperatures (EDMT) for four stations in Iraq (Baghdad, Basra, Khanaqin and AL-Rutba). The results that the number of extreme cases characteristics is nine, one of which is the beginning of the season, and the other

... Show More
View Publication Preview PDF
Publication Date
Wed Jul 01 2020
Journal Name
Journal Of Engineering
Development of Iraqi License Plate Recognition System based on Canny Edge Detection Method

In recent years, there has been expanding development in the vehicular part and the number of vehicles moving on the road in all the sections of the country. Vehicle number plate identification based on image processing is a dynamic area of this work; this technique is used for security purposes such as tracking of stolen cars and access control to restricted areas. The License Plate Recognition System (LPRS) exploits a digital camera to capture vehicle plate numbers is used as input to the proposed recognition system. Basically, the developing system is consist of three phases, vehicle license plate localization, character segmentation, and character recognition, the License Plate (LP) detection is presented using canny

... Show More
Crossref (4)
Crossref
View Publication Preview PDF
Publication Date
Wed May 17 2023
Journal Name
Journal Of Engineering
Numerical Study of Solar Chimney with Absorber at Different Locations

Heat transfer process and fluid flow in a solar chimney used for natural ventilation are investigated numerically in the present work. Solar chimney was tested by selecting different positions of absorber namely: at the back side, front side, and at the middle of the air gap. CFD analysis based on finite volume method is used to predict the thermal performance, and air flow in two dimensional solar chimney under unsteady state condition, to identify the effect of different parameters such as solar radiation. Results show that a solar chimney with absorber at the middle of the air gap gives better ventilation performance. A comparison between the numerical and previous experimental results shows fair agreement.

Crossref (4)
Crossref
View Publication Preview PDF
Publication Date
Wed May 24 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
D.C. Conductivity of a-InAs Films Prepared at Different Thickness

 The behaviour of the electrical conductivity (σ) and the activation energies (Ea1, Ea2) have been investigated on a-InAs thin films as a function of thickness (250,350,450,550,650) nm, before and after heat treatment. The films were annealed at (373, 423, 473) K for one hour.          The films contain two types of transport mechanisms, and the electrical conductivity (σ) increases whereas the activation energy (Ea) would decrease as the films thickness increases.
 

View Publication Preview PDF
Publication Date
Mon May 09 2022
Journal Name
مجلة كلية التربية الاساسية الجامعة المستنصرية
Publication Date
Wed Dec 18 2019
Journal Name
Baghdad Science Journal
Detection of Nutrients and Major Ions at Al Muthanna Storage Site Soil

In the early 90s military operations and United Nations Special Commission “UNSCOM” teams have been destroyed the past Iraqi chemical program. Both operations led an extensive number of scattered remnants of contaminated areas. The quantities of hazardous materials, incomplete destructed materials, and toxic chemicals were sealed in two bunkers. Deficiency of appropriate destruction technology led to spreading the contamination around the storage site. This paper aims to introduce the environmental detection of the contamination in the storage site area using geospatial analysis technique. The environmental contamination level of nutrients and major ions such as sulphate (SO4), potassium (K), sodium (Na), magnesi

... Show More
Scopus Clarivate Crossref
View Publication Preview PDF