Preferred Language
Articles
/
ijs-9320
Hybrid Fuzzy Logic and Artificial Bee Colony Algorithm for Intrusion Detection and Classification
...Show More Authors

In recent years, with the growing size and the importance of computer networks, it is very necessary to provide adequate protection for users data from snooping through the use of one of the protection techniques: encryption, firewall and intrusion detection systems etc. Intrusion detection systems is considered one of the most important components in the computer networks that deal with Network security problems. In this research, we suggested the intrusion detection and classification system through merging Fuzzy logic and Artificial Bee Colony Algorithm. Fuzzy logic has been used to build a classifier which has the ability to distinguish between the behavior of the normal user and behavior of the intruder. The artificial bee colony algorithm has been used to build the classifier which was used to classify the intrusion into one of the main types (DoS, R2L , U2R, Prob). The proposed system has the ability to detect and classify intrusion at high speed with a small percentage of false alarms as well as to detect the new attacks. The NSL-KDD dataset used in the training and testing the proposed system.The results of experiments showed that the efficiency of the proposed system performance were (97.59%) for the intrusion detection, and (0.12%) for the false alarms. Also, the Classification rates for classes (DoS, R2L,U2R,Prob) were (97.19, 77.09, 98.43, 93.23) Respectively, which is considered a superior performance comparing with other methods in the literature.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Feb 06 2019
Journal Name
National Academy Science Letters
The Detection Limit of PCR Amplification for Cryptosporidium spp. Oocysts in Fecal Samples
...Show More Authors

View Publication
Scopus (3)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Wed Mar 10 2021
Journal Name
Baghdad Science Journal
Gel clot assay used for detection of candida spp onfection in urinary tract
...Show More Authors

the study including isolation and identification of candida spp causing UTIs from patintes coming to al-yarmouk hospital

View Publication Preview PDF
Publication Date
Tue Feb 01 2022
Journal Name
Iraqi Journal Of Science
Seismic Interpretation for Hydrocarbon Traps Detection of Warka-Zakura Area South of Iraq
...Show More Authors

This research represents a reflection seismic study (structural and stratigraphic) for a (852) km2 area located in the south of Iraq within the administrative border of the province of Al-Muthanna and Qadisiyah province ,by using 2-D seismic data from Oil Exploration company three main seismic reflectors are picked, these are (Zubair and Yamama) Formations which they deposited during the Cretaceous age , and (Gotnia) Formation which deposited during Jurassic age .Structural maps of Formations are prepared to obtain the location and direction of the sedimentary basin and shoreline ,time, velocity and depth maps are drawn depending on the structural interpretation of the picked reflectors and show several structural feature as nose structu

... Show More
View Publication Preview PDF
Publication Date
Wed Nov 27 2019
Journal Name
Iraqi Journal Of Science
An Improved Segmentation Technique for Early Detection of Exudates of Diabetic Retinopathy Disease
...Show More Authors

Diabetic retinopathy (DR) is a diabetes- caused disease that is associated with  leakage of fluid from the blood vessels into the retina, leading to its damage. It is one of the most common diseases that can lead to weak vision and even blindness. Exudates is a clear indication of diabetic retinopathy, which is the main cause of blindness in people with diabetes. Therefore, early detection of exudates is a crucial and essential step to prevent blindness and vision loss is in the analysis of digital diabetic retinopathy systems. This paper presents an improved approach for detection of exudates in retina image using supervised-unsupervised Minimum Distance (MD) segmentation method. The suggested system includes three stages; First, a

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Mon Feb 14 2022
Journal Name
Iraqi Journal Of Science
Gravity Field Interpretation for Subsurface Faults Detection in A Region Located SW- Iraq
...Show More Authors

This research deals with processing and Interpretation of Bouguer anomaly gravity field, using two dimensional filtering techniques to separate the residual gravity field from the Bouguer gravity map for a part of Najaf Ashraf province in Iraq. The residual anomaly processed in order to reduce noise and give a more comprehensive vision about subsurface linear structures. Results for descriptive interpretation presented as colored surfaces and contour maps in order to locate directions and extensions of linear features which may interpret as faults. A comparison among gravity residual field , 1st derivative and horizontal gradient made along a profile across the study area in order to assign the exact location of a major fault. Furthermor

... Show More
View Publication Preview PDF
Publication Date
Fri Jun 30 2023
Journal Name
International Journal Of Intelligent Engineering And Systems
DeepFake Detection Improvement for Images Based on a Proposed Method for Local Binary Pattern of the Multiple-Channel Color Space
...Show More Authors

DeepFake is a concern for celebrities and everyone because it is simple to create. DeepFake images, especially high-quality ones, are difficult to detect using people, local descriptors, and current approaches. On the other hand, video manipulation detection is more accessible than an image, which many state-of-the-art systems offer. Moreover, the detection of video manipulation depends entirely on its detection through images. Many worked on DeepFake detection in images, but they had complex mathematical calculations in preprocessing steps, and many limitations, including that the face must be in front, the eyes have to be open, and the mouth should be open with the appearance of teeth, etc. Also, the accuracy of their counterfeit detectio

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (1)
Scopus Crossref
Publication Date
Mon Jun 01 2015
Journal Name
Journal Of Economics And Administrative Sciences
Constructing fuzzy linear programming model with practical application
...Show More Authors

This paper deals with constructing a model of fuzzy linear programming with application on fuels product of Dura- refinery , which consist of seven products that have direct effect ondaily consumption . After Building the model which consist of objective function represents the selling prices ofthe products and fuzzy productions constraints and fuzzy demand constraints addition to production requirements constraints , we used program of ( WIN QSB )  to find the optimal solution

View Publication Preview PDF
Crossref
Publication Date
Wed Apr 20 2022
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Modified Ranking Function to Compute Fuzzy Matrix Games
...Show More Authors

     Game theory problems (GTP) frequently occur in Economy, Business Studies, Sociology, Political Science, Military Activities, and so on are some of the subjects covered. To tackle the uncertainty in Games, the analysis of games in which the payoffs are represented by fuzzy numbers (FN) will benefit from fuzzy set theory (FST).

The purpose of this paper is to develop an efficient technique for solving constraint matrix games (MG) with payoff trapezoidal fuzzy numbers (TFN). The description of the new ranking method is introduced for a constrained matrix with TFN and values. Stock market forecasting has been one of the most important research areas for decades. Stock market values are volatile, non-linear, complicated and ch

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jan 01 2023
Journal Name
Ssrn Electronic Journal
Increasing Safety in Highways Transit Systems by Using Ethical Artificial Intelligence AI
...Show More Authors

“Smart city” projects have become fully developed and are actively using video analytics. Our study looks at how video analytics from surveillance cameras can help manage urban areas, making the environment safer and residents happier. Every year hundreds of people fall on subway and railway lines. The causes of these accidents include crowding, fights, sudden health problems such as dizziness or heart attacks, as well as those who intentionally jump in front of trains. These accidents may not cause deaths, but they cause delays for tens of thousands of passengers. Sometimes passers-by have time to react to the event and try to prevent it, or contact station personnel, but computers can react faster in such situations by using ethical

... Show More
View Publication
Crossref
Publication Date
Sat Apr 01 2023
Journal Name
Baghdad Science Journal
Honeyword Generation Using a Proposed Discrete Salp Swarm Algorithm
...Show More Authors

Honeywords are fake passwords that serve as an accompaniment to the real password, which is called a “sugarword.” The honeyword system is an effective password cracking detection system designed to easily detect password cracking in order to improve the security of hashed passwords. For every user, the password file of the honeyword system will have one real hashed password accompanied by numerous fake hashed passwords. If an intruder steals the password file from the system and successfully cracks the passwords while attempting to log in to users’ accounts, the honeyword system will detect this attempt through the honeychecker. A honeychecker is an auxiliary server that distinguishes the real password from the fake passwords and t

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (1)
Scopus Crossref