Preferred Language
Articles
/
ijs-5551
An Internet of Things Botnet Detection Model Using Regression Analysis and Linear Discrimination Analysis

The Internet of Things (IoT) has become a hot area of research in recent years due to the significant advancements in the semiconductor industry, wireless communication technologies, and the realization of its ability in numerous applications such as smart homes, health care, control systems, and military. Furthermore, IoT devices inefficient security has led to an increase cybersecurity risks such as IoT botnets, which have become a serious threat. To counter this threat there is a need to develop a model for detecting IoT botnets.

This paper's contribution is to formulate the IoT botnet detection problem and introduce multiple linear regression (MLR) for modelling IoT botnet features with discriminating capability and alleviating the challenges of IoT detection. In addition, a linear discrimination analysis (LDA) model for distinguishing between normal activities and IoT botnets was developed.

Network-based detection of IoT (N-BaIoT) dataset was used to evaluate the performance of the proposed IoT botnet detection model in terms of accuracy, precision, and detection rate.  Experimental results revealed that the proposed IoT botnet detection model provides a relevant feature subset and preserves high accuracy when compared with state-of-the-art and baseline methods, particularly LDA.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Aug 26 2019
Journal Name
Iraqi Journal Of Science
Textural Analysis of Liver Tumor using Watershed Segmentation based on Statistical and Geometrical features

The liver diseases can define as the tumor or disorder that can affect the liver and causes deformation in its shape. The early detection and diagnose of the tumor using CT medical images, helps the detector to specify the tumor perfectly. This search aims to detect and classify the liver tumor depending on the use of a computer (image processing and textural analysis) helps in getting an accurate diagnosis. The methods which are used in this search depend on creating a binary mask used to separate the liver from the origins of the other in the CT images. The threshold has been used as an early segmentation. A Process, the watershed process is used as a classification technique to isolate the tumor which is cancer and cyst.

&nbsp

... Show More
Scopus (2)
Crossref (2)
Scopus Crossref
View Publication Preview PDF
Publication Date
Mon Jun 01 2015
Journal Name
Journal Of Economics And Administrative Sciences
Constructing fuzzy linear programming model with practical application

This paper deals with constructing a model of fuzzy linear programming with application on fuels product of Dura- refinery , which consist of seven products that have direct effect ondaily consumption . After Building the model which consist of objective function represents the selling prices ofthe products and fuzzy productions constraints and fuzzy demand constraints addition to production requirements constraints , we used program of ( WIN QSB )  to find the optimal solution

Crossref
View Publication Preview PDF
Publication Date
Thu May 11 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Statistical Analysis of Duration of Hospitalization

      This research is mostly concerned of exploration analysis of a random sample of data from Al-sadder hospital.  We examine duration of hospital stay (DHS) and investigate any significant difference in duration between sex, age groups, occupation, patients’ condition at admission, and patients’ condition at discharge

View Publication
Publication Date
Wed Aug 31 2022
Journal Name
Iraqi Journal Of Science
Data Mining Methods for Extracting Rumors Using Social Analysis Tools

       Rumors are typically described as remarks whose true value is unknown. A rumor on social media has the potential to spread erroneous information to a large group of individuals. Those false facts will influence decision-making in a variety of societies. In online social media, where enormous amounts of information are simply distributed over a large network of sources with unverified authority, detecting rumors is critical. This research proposes that rumor detection be done using Natural Language Processing (NLP) tools as well as six distinct Machine Learning (ML) methods (Nave Bayes (NB), random forest (RF), K-nearest neighbor (KNN), Logistic Regression (LR), Stochastic Gradient Descent (SGD) and Decision Tree (

... Show More
Scopus (1)
Scopus Crossref
View Publication Preview PDF
Publication Date
Wed Mar 18 2020
Journal Name
Baghdad Science Journal
New Versions of Liu-type Estimator in Weighted and non-weighted Mixed Regression Model

This paper considers and proposes new estimators that depend on the sample and on prior information in the case that they either are equally or are not equally important in the model. The prior information is described as linear stochastic restrictions. We study the properties and the performances of these estimators compared to other common estimators using the mean squared error as a criterion for the goodness of fit. A numerical example and a simulation study are proposed to explain the performance of the estimators.

Scopus (4)
Crossref (2)
Scopus Clarivate Crossref
View Publication Preview PDF
Publication Date
Sun Feb 25 2024
Journal Name
Baghdad Science Journal
Sentiment Analysis on Roman Urdu Students’ Feedback Using Enhanced Word Embedding Technique

 

Students’ feedback is crucial for educational institutions to assess the performance of their teachers, most opinions are expressed in their native language, especially for people in south Asian regions. In Pakistan, people use Roman Urdu to express their reviews, and this applied in the education domain where students used Roman Urdu to express their feedback. It is very time-consuming and labor-intensive process to handle qualitative opinions manually. Additionally, it can be difficult to determine sentence semantics in a text that is written in a colloquial style like Roman Urdu. This study proposes an enhanced word embedding technique and investigates the neural word Embedding (Word2Vec and Glove) to determine which perfo

... Show More
Scopus (2)
Crossref (2)
Scopus Crossref
View Publication Preview PDF
Publication Date
Wed Nov 20 2024
Journal Name
Journal Of Administration And Economics
Bayesian Method in Classification Regression Tree to estimate nonparametric additive model compared with Logistic Model with Application

The use of Bayesian approach has the promise of features indicative of regression analysis model classification tree to take advantage of the above information by, and ensemble trees for explanatory variables are all together and at every stage on the other. In addition to obtaining the subsequent information at each node in the construction of these classification tree. Although bayesian estimates is generally accurate, but it seems that the logistic model is still a good competitor in the field of binary responses through its flexibility and mathematical representation. So is the use of three research methods data processing is carried out, namely: logistic model, and model classification regression tree, and bayesian regression tree mode

... Show More
View Publication Preview PDF
Publication Date
Wed Aug 10 2022
Journal Name
Mathematics
Modeling and Analysis of the Influence of Fear on the Harvested Modified Leslie–Gower Model Involving Nonlinear Prey Refuge

Understanding the effects of fear, quadratic fixed effort harvesting, and predator-dependent refuge are essential topics in ecology. Accordingly, a modified Leslie–Gower prey–predator model incorporating these biological factors is mathematically modeled using the Beddington–DeAngelis type of functional response to describe the predation processes. The model’s qualitative features are investigated, including local equilibria stability, permanence, and global stability. Bifurcation analysis is carried out on the temporal model to identify local bifurcations such as transcritical, saddle-node, and Hopf bifurcation. A comprehensive numerical inquiry is carried out using MATLAB to verify the obtained theoretical findings and und

... Show More
Scopus (9)
Crossref (2)
Scopus Clarivate Crossref
View Publication
Publication Date
Mon Mar 01 2021
Journal Name
Journal Of Physics: Conference Series
fMRI and Artifact computation and Analysis
Abstract<p>Over the years, the field of Medical Imagology has gained considerable importance. The number of neuroimaging studies conducted using functional magnetic resonance imaging (fMRI) has been exploding in recent years. fMRI survey gives to rise to large amounts of noisy data with a complex spatiotemporal correlation structure. Statistics play great role in clarifying the features of the data and gain results that can be used and explain by neuroscientists. Several types of artifacts can happen through a functional magnetic resonance imaging (fMRI) scanner Because of software or hardware problems, physical limitation or human physiologic phenomenon. Several of them can negatively affect di</p> ... Show More
Scopus (2)
Crossref (2)
Scopus Crossref
View Publication
Publication Date
Tue Dec 01 2020
Journal Name
Journal Of Economics And Administrative Sciences
Robust estimation of multiple linear regression parameters in the presence of a problem of heterogeneity of variance and outliers values

Often times, especially in practical applications, it is difficult to obtain data that is not tainted by a problem that may be related to the inconsistency of the variance of error or any other problem that impedes the use of the usual methods represented by the method of the ordinary least squares (OLS), To find the capabilities of the features of the multiple linear models, This is why many statisticians resort to the use of estimates by immune methods Especially with the presence of outliers, as well as the problem of error Variance instability, Two methods of horsepower were adopted, they are the robust weighted least square(RWLS)& the two-step robust weighted least square method(TSRWLS), and their performance was verifie

... Show More
Crossref
View Publication Preview PDF