Preferred Language
Articles
/
ijs-5829
An Approach Based on Decision Tree and Self-Organizing Map For Intrusion Detection
...Show More Authors

In modern years, internet and computers were used by many nations all overhead the world in different domains. So the number of Intruders is growing day-by-day posing a critical problem in recognizing among normal and abnormal manner of users in the network. Researchers have discussed the security concerns from different perspectives. Network Intrusion detection system which essentially analyzes, predicts the network traffic and the actions of users, then these behaviors will be examined either anomaly or normal manner. This paper suggested Deep analyzing system of NIDS to construct network intrusion detection system and detecting the type of intrusions in traditional network. The performance of the proposed system was evaluated by using Kdd cup 99 dataset. The experimental results displayed that the proposed module are best suited due to their high detection rate with false alarm rate.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat May 08 2021
Journal Name
Iraqi Journal Of Science
Software Fault Estimation Tool Based on Object-Oriented Metrics
...Show More Authors

A fault is an error that has effects on system behaviour. A software metric is a value that represents the degree to which software processes work properly and where faults are more probable to occur. In this research, we study the effects of removing redundancy and log transformation based on threshold values for identifying faults-prone classes of software. The study also contains a comparison of the metric values of an original dataset with those after removing redundancy and log transformation. E-learning and system dataset were taken as case studies. The fault ratio ranged from 1%-31% and 0%-10% for the original dataset and 1%-10% and 0%-4% after removing redundancy and log transformation, respectively. These results impacted direct

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Fri Dec 30 2022
Journal Name
Iraqi Journal Of Science
Photoconductive Detector Based on Graphene Doping with Silver Nanoparticles
...Show More Authors

      Graphene (Gr) decorated with silver nanoparticles (Ag NPs) were used to fabricate a wideband range photodetector. Silicon (Si) and porous silicon (PS) were used as a substrate to deposit Gr /Ag NPs by drop-casting technique. Silver nanoparticles (Ag NPs) were prepared using the chemical method. As well as the dispersion of silver NPs is achieved by a simple chemistry process on the surface of Gr.

    The optical, structure and electrical characteristics of AgNPs and Gr decorated with Ag NPs were characterized by ultraviolet-visible spectroscopy (UV-Vis), x-ray diffraction (XRD).  The X-ray diffraction (XRD) spectrum of Ag NPs exhibited 2θ values (38.1o, 44.3 o, 64.5 o and 77.7

... Show More
View Publication Preview PDF
Scopus (5)
Crossref (4)
Scopus Crossref
Publication Date
Fri Sep 01 2023
Journal Name
Al-khwarizmi Engineering Journal
Tracked Robot Control with Hand Gesture Based on MediaPipe
...Show More Authors

Hand gestures are currently considered one of the most accurate ways to communicate in many applications, such as sign language, controlling robots, the virtual world, smart homes, and the field of video games. Several techniques are used to detect and classify hand gestures, for instance using gloves that contain several sensors or depending on computer vision. In this work, computer vision is utilized instead of using gloves to control the robot's movement. That is because gloves need complicated electrical connections that limit user mobility, sensors may be costly to replace, and gloves can spread skin illnesses between users. Based on computer vision, the MediaPipe (MP) method is used. This method is a modern method that is discover

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Wed Jul 03 2024
Journal Name
Al-rafidain Journal Of Medical Sciences ( Issn 2789-3219 )
Bioavailability of Bilastine Oral Self-nanoemulsion: Comparative Study with Commercial Formula in Rats
...Show More Authors

Bilastine (BL) is a novel non-sedating second-generation antihistamine, and its bioavailability is about 60%. Objective: To compare the bioavailability of prepared oral self-nanoemulsions of BL (BL-SNE) with that of pure BL and marketed tablets. Methods: Four groups of Wistar rats were used in this study, each with six rats weighing between 200 and 250 g. They were treated orally using a a gavage tube. The groups were fed either with conventional tablets ("Alerbix®") after being ground and dispersed with deionized water (DIW), treated with BL-SNE or fed with pure BL powder suspension. The fourth group did not receive any medication. The concentration of BL in the rat’s plasma was measured using HPLC. We used Trandolapril as an an interna

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Wed Dec 11 2019
Journal Name
Aip Conference Proceedings
Quantization approach to steganography perceptual color spaces
...Show More Authors

In this study, we present a new steganography method depend on quantizing the perceptual color spaces bands. Four perceptual color spaces are used to test the new method which is HSL, HSV, Lab and Luv, where different algorithms to calculate the last two-color spaces are used. The results reveal the validity of this method as a steganoic method and analysis for the effects of quantization and stegano process on the quality of the cover image and the quality of the perceptual color spaces bands are presented.

View Publication Preview PDF
Scopus Clarivate Crossref
Publication Date
Wed Dec 15 2021
Journal Name
Arab World English Journal
Aggressive Language in Literature: A Pragmatic Approach
...Show More Authors

Aggression is a negative form of an anti-social behavior. It is produced because of a particular reason, desire, want, need, or due to the psychological state of the aggressor. It injures others physically or psychologically. Aggressive behaviors in human interactions cause discomfort and disharmony among interlocutors. The paper aims to identify how aggressive language manifests itself in the data under scrutiny in terms of the pragmatic paradigm. Two British literary works are the data; namely, Look Back in Anger by John Osborne (1956), and The Birthday Party by Harold Pinter (1957). This paper endeavors to answer the question of how aggressive language is represented in literature pragmatically? It is hoped to be significant to

... Show More
View Publication Preview PDF
Clarivate Crossref
Publication Date
Sat Dec 31 2016
Journal Name
Al-kindy College Medical Journal
Selective Approach in Managing Penetrating Neck Injury
...Show More Authors

Background: Penetrating Neck Injuries (PNI) management represents a challenge to most surgeons in civilian trauma, in weighing selective versus mandatory exploration of all cases in different circumstances. Data are encouraging surgeons to adopt the former approach.Objectives: The study aims to assess the selective approach in our war and terror time events in Al-Yarmouk teaching hospital.Type of the study:A retrospective study. Methods: Data of patients presented to the Thoracic and Vascular ward in Al-Yarmouk teaching hospital with PNI were assessed retrospectively, from March 2013 to March 2015, and analyzed for epidemiology, mechanism of trauma, management methods, associated organ injuries, complications and mortality. Results: Amon

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Apr 30 2022
Journal Name
Iraqi Journal Of Science
Biometric Identification System Based on Contactless Palm-Vein Using Residual Attention Network
...Show More Authors

Palm vein recognition technology is a one of the most effective biometric technologies for personal identification. Palm acquisition techniques are either contact-based or contactless-based. The contactless-based palm vein system is considered more accurate and efficient when used in modern applications, but it may suffer from problems like pose variations and the delay in the matching process. This paper proposes a contactless-based identification system for palm vein that involves two main steps; First, the central region of the palm is cropped using fast extract region of interest algorithm, then the features are extracted and classified using altered structure of Residual Attention Network, which is a developed version of convolution

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (1)
Scopus Crossref
Publication Date
Fri Jul 01 2022
Journal Name
Advanced Powder Technology
Modification of FAU zeolite as an active heterogeneous catalyst for biodiesel production and theoretical considerations for kinetic modeling
...Show More Authors

View Publication
Scopus (25)
Crossref (25)
Scopus Clarivate Crossref
Publication Date
Thu Jan 13 2022
Journal Name
Iraqi Journal Of Science
Detection of Cadmium and Chromium in some Facial Cosmetics
...Show More Authors

This study was done to compare among 120 new and used cosmetic brands to determine the heavy metals concentrations (Cadmium, Chromium) in (face foundation, powder and blushers). Sixty new cosmetic products were bought from local markets in Baghdad city (twenty different brands foe each cosmetic products), while sixty used cosmetic products were collected from Iraqi women and they had been stored for a long time. This study proved that not all analyzed cosmetic products containing heavy metals concentrations and all concentrations are under Iraqi acceptable limits except one new blusher product which contained chromium with (28 ppm), but all used cosmetic products have shown better results in concentrations of heavy metals than new produc

... Show More
View Publication Preview PDF