Preferred Language
Articles
/
ijs-6141
A Multi-Objective Evolutionary Algorithm based Feature Selection for Intrusion Detection
...Show More Authors

Nowad ays, with the development of internet communication that provides many facilities to the user leads in turn to growing unauthorized access. As a result, intrusion detection system (IDS) becomes necessary to provide a high level of security for huge amount of information transferred in the network to protect them from threats. One of the main challenges for IDS is the high dimensionality of the feature space and how the relevant features to distinguish the normal network traffic from attack network are selected. In this paper, multi-objective evolutionary algorithm with decomposition (MOEA/D) and MOEA/D with the injection of a proposed local search operator are adopted to solve the Multi-objective optimization (MOO) followed by Naïve Bayes (NB) classifier for classification purpose and judging the ability of the proposed models to distinguish between attack network traffic and normal network traffic. The performance of the proposed models is evaluated against two baseline models feature vitality based reduction method (FVBRM) and . The experiments on network security laboratory-knowledge discovery and data mining (NSL-KDD) benchmark dataset ensure the ability of the proposed MOO based models to select an optimal subset of features that has a higher discriminatory power for discriminating attack from normal over the baselines models. Furthermore, the proposed local search operator ensures its ability to harness the performance of MOO model through achieving an obvious feature reduction on average from 16.83 features to 8.54 features (i.e., approximately 50%) in addition to the increase in classifier accuracy from 98.829 to 98.859 and detection rate from 98.906 to 99.043.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Aug 30 2023
Journal Name
Iraqi Journal Of Science
Intelligent Task Scheduling Using Bat and Harmony Optimization
...Show More Authors

     Cloud computing describes computer services provided through the internet and includes a wide range of virtualization resources. Because cloud computing is made up of a sizable number of heterogeneous autonomous systems with an adaptable computational architecture, it has been widely adopted by many businesses. The scheduling and management of resource utilization, however, have become more difficult as a result of cloud computing. Task scheduling is crucial, and this procedure must schedule tasks on the  virtual machine while using the least amount of time possible. Utilizing an effective scheduling strategy enhances and expedites cloud computing services. Optimization techniques are used to resolve cloud scheduling problems.

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Thu Jun 08 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Studying Hueckel Edge Detector Using Binary Step Edge Image
...Show More Authors

Hueckel edge detector study using binary step edge image is presented. The standard algorithm that Hueckel presented, in his paper without any alteration is adopted. This paper studies a fully analysis for the algorithm efficiency, time consuming and the expected results with slide window size and edge direction. An analysis for its behavior with the changing of the slide window size (disk size) is presented. The best result is acquired when the window size equals to four pixel.  

View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Sun Apr 30 2023
Journal Name
Iraqi Journal Of Science
Automatic Numeral Recognition System Using Local Statistical and Geometrical Features
...Show More Authors

     Optical Character Recognition (OCR) research includes computer vision, artificial intelligence, and pattern recognition. Character recognition has garnered a lot of attention in the last decade due to its broad variety of uses and applications, including multiple-choice test data, business documents (e.g., ID cards, bank notes, passports, etc.), and automatic number plate recognition. This paper introduces an automatic recognition system for printed numerals. The automatic reading system is based on extracting local statistical and geometrical features from the text image. Those features are represented by eight vectors extracted from each digit. Two of these features are local statistical (A, A th), and six are local

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Tue Jun 15 2021
Journal Name
Al-academy
The artistic treatment of the expatriate character in the fictional film: آسيا جبار خلف
...Show More Authors

Although cinema is moving towards art, it has dealt with the character since the beginning of the discovery of cinematic art in films such as (Doctor Caligari's cabin) and most German expressive films in the third decade of the twentieth century, but the interest of cinema is growing in the estranged human personality, meaning that this character It lives by its alienation from the environment and society that surrounds it, because our present days have witnessed on the material and moral level more social breakdowns such as wars and disasters, and the sharp contradiction in the social and economic level of people themselves or between different societies, or between the individual and his community, and new social relations have increas

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jun 04 2017
Journal Name
Baghdad Science Journal
Texture Analysis of smear of Leukemia Blood Cells after Exposing to Cold Plasma
...Show More Authors

Plasma physics and digital image processing technique (DIPT) were utilized in this research to show the effect of the cold plasma (plasma needle) on blood cells. The second order statistical features were used to study this effect. Different samples were used to reach the aim of this paper; the patients have leukemia and their leukocytes number was abnormal. By studying the results of statistical features (mean, variance, energy and entropy), it is concluded that the blood cells of the sample showed a good response to the cold plasma.

View Publication Preview PDF
Scopus (23)
Crossref (1)
Scopus Crossref
Publication Date
Tue Sep 29 2020
Journal Name
Iraqi Journal Of Science
Shadow Elimination in Soccer Game Video using Background Subtraction and Sobel Operators
...Show More Authors

Object detection in real time is considered as a challenging problem. However, it is very important in a wide range of applications, especially in field of multimedia. The players and ball are the most important objects in soccer game videos and detecting them is a challenging task because of many difficulties, such as shadow and illumination, ball size, ball occluded by players or merged with lines, and similar appearance of players. To overcome these problems, we present a new system to detect the players and ball in real-time by using background subtraction and Sobel detection. The results were more accurate and approximately two times faster than those using only background subtraction.

View Publication Preview PDF
Scopus (1)
Crossref (2)
Scopus Crossref
Publication Date
Thu Apr 01 2021
Journal Name
Pakistan Journal Of Statistics
Estimation intensity radiation of chest X-ray (CXR) with application
...Show More Authors

In this research we assumed that the number of emissions by time (𝑡) of radiation particles is distributed poisson distribution with parameter (𝑡), where  < 0 is the intensity of radiation. We conclude that the time of the first emission is distributed exponentially with parameter 𝜃, while the time of the k-th emission (𝑘 = 2,3,4, … . . ) is gamma distributed with parameters (𝑘, 𝜃), we used a real data to show that the Bayes estimator 𝜃 ∗ for 𝜃 is more efficient than 𝜃̂, the maximum likelihood estimator for 𝜃 by using the derived variances of both estimators as a statistical indicator for efficiency

Preview PDF
Scopus
Publication Date
Fri Jul 01 2022
Journal Name
Iraqi Journal Of Science
Pre-Planning of Casing Seat Position to Choose Optimum Equivalent Circulation Density to prevent lost circulation
...Show More Authors

Loss of drilling fluid in the Nasiriyah oil field can be considered as a big,
serious, and expensive problem at the same time, therefore accurate and integrated
program must be prepared before start drilling in layers that are likely to get loss
circulation. From the available data of well Ns-13, the area of loss was detected in
five layers, which are Dammam, Um- radoma, Tayarat, Shiranish and Hartha since
these layers contain natural cracks and high porosity represented by vugs.
Methods of prevention have been identified by specifying the minimum values
of drilling parameters to reduce hydrostatic pressure, thus reducing equivalent
density of drilling mud during the circulation, depths of casing shoes is
deter

... Show More
View Publication Preview PDF
Publication Date
Sat Jan 01 2022
Journal Name
Turkish Journal Of Physiotherapy And Rehabilitation
classification coco dataset using machine learning algorithms
...Show More Authors

In this paper, we used four classification methods to classify objects and compareamong these methods, these are K Nearest Neighbor's (KNN), Stochastic Gradient Descentlearning (SGD), Logistic Regression Algorithm(LR), and Multi-Layer Perceptron (MLP). Weused MCOCO dataset for classification and detection the objects, these dataset image wererandomly divided into training and testing datasets at a ratio of 7:3, respectively. In randomlyselect training and testing dataset images, converted the color images to the gray level, thenenhancement these gray images using the histogram equalization method, resize (20 x 20) fordataset image. Principal component analysis (PCA) was used for feature extraction, andfinally apply four classification metho

... Show More
Publication Date
Fri Dec 01 2017
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The Role of Benford’s law to appreciation the risk in financial transactions: Application study in Baghdad University
...Show More Authors

The financial fraud considers part of large concept to management and financial corruption, the financial fraud is appeared especially after corporate, that is Emerge agency theory, that is because recognize relationship between the management company and stakeholder, that is through group from constriction in order to block the management to fraud practice, that on the basis was choose another party in order fraud this practice and give opinion on financial statement, that consider basis decision making from stakeholder to basis the report auditor about creditability this is statement that reflect real activity for the company.The Auditor in order to lead work him Full professionalism to must using group from control Techniques, that is

... Show More
View Publication
Crossref