Preferred Language
Articles
/
ijs-9320
Hybrid Fuzzy Logic and Artificial Bee Colony Algorithm for Intrusion Detection and Classification
...Show More Authors

In recent years, with the growing size and the importance of computer networks, it is very necessary to provide adequate protection for users data from snooping through the use of one of the protection techniques: encryption, firewall and intrusion detection systems etc. Intrusion detection systems is considered one of the most important components in the computer networks that deal with Network security problems. In this research, we suggested the intrusion detection and classification system through merging Fuzzy logic and Artificial Bee Colony Algorithm. Fuzzy logic has been used to build a classifier which has the ability to distinguish between the behavior of the normal user and behavior of the intruder. The artificial bee colony algorithm has been used to build the classifier which was used to classify the intrusion into one of the main types (DoS, R2L , U2R, Prob). The proposed system has the ability to detect and classify intrusion at high speed with a small percentage of false alarms as well as to detect the new attacks. The NSL-KDD dataset used in the training and testing the proposed system.The results of experiments showed that the efficiency of the proposed system performance were (97.59%) for the intrusion detection, and (0.12%) for the false alarms. Also, the Classification rates for classes (DoS, R2L,U2R,Prob) were (97.19, 77.09, 98.43, 93.23) Respectively, which is considered a superior performance comparing with other methods in the literature.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Feb 07 2025
Journal Name
Journal Of Administration And Economics
Using dynamic Fuzzy programming to control the storage of some Department of Commerce stores
...Show More Authors

In this research was to use the method of classic dynamic programming (CDP) and the method of fuzzy dynamic programming (FDP) to controlling the inventory in N periods and only one substance ,in order to minimize the total cost and determining the required quantity in warehouse rusafa principal of the ministry of commerce . A comparison was made between the two techniques، We found that the value of fuzzy total cost is less than that the value of classic total cost

View Publication
Publication Date
Thu Mar 30 2023
Journal Name
Iraqi Journal Of Science
Monitoring of environmental variations of marshes in Iraq using Adaptive classification method.
...Show More Authors

The object of the presented study was to monitor the changes that had happened
in the main features (water, vegetation, and soil) of Al-Hammar Marsh region. To
fulfill this goal, different satellite images had been used in different times, MSS
1973, TM 1990, ETM+ 2000 and MODIS 2010. K-Means which is unsupervised
classification and Neural Net which is supervised classification was used to classify
the satellite images 0Tand finally by use 0Tadaptive classification 0Twhich is0T3T 0T3Tapply
s0Tupervised classification on the unsupervised classification. ENVI soft where used
in this study.

View Publication Preview PDF
Publication Date
Sun Feb 17 2019
Journal Name
Iraqi Journal Of Physics
Classification of the galaxy Milky Way using variable precision rough sets technique
...Show More Authors

Astronomy image is regarded main source of information to discover outer space, therefore to know the basic contain for galaxy (Milky way), it was classified using Variable Precision Rough Sets technique to determine the different region within galaxy according different color in the image. From classified image we can determined the percentage for each class and then what is the percentage mean. In this technique a good classified image result and faster time required to done the classification process.

View Publication Preview PDF
Crossref
Publication Date
Sun Dec 04 2016
Journal Name
Baghdad Science Journal
Classification of Elliptic Cubic Curves Over The Finite Field of Order Nineteen
...Show More Authors

Plane cubics curves may be classified up to isomorphism or projective equivalence. In this paper, the inequivalent elliptic cubic curves which are non-singular plane cubic curves have been classified projectively over the finite field of order nineteen, and determined if they are complete or incomplete as arcs of degree three. Also, the maximum size of a complete elliptic curve that can be constructed from each incomplete elliptic curve are given.

View Publication Preview PDF
Crossref
Publication Date
Fri Dec 01 2023
Journal Name
Al-khwarizmi Engineering Journal
Working Memory Classification Enhancement of EEG Activity in Dementia: A Comparative Study
...Show More Authors

The purpose of the current investigation is to distinguish between working memory ( ) in five patients with vascular dementia ( ), fifteen post-stroke patients with mild cognitive impairment ( ), and fifteen healthy control individuals ( ) based on background electroencephalography (EEG) activity. The elimination of EEG artifacts using wavelet (WT) pre-processing denoising is demonstrated in this study. In the current study, spectral entropy ( ), permutation entropy ( ), and approximation entropy ( ) were all explored. To improve the  classification using the k-nearest neighbors ( NN) classifier scheme, a comparative study of using fuzzy neighbourhood preserving analysis with -decomposition ( ) as a dimensionality reduction technique an

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jan 01 2020
Journal Name
International Journal Of Advance Science And Technology
MR Images Classification of Alzheimer's Disease Based on Deep Belief Network Method
...Show More Authors

Background/Objectives: The purpose of this study was to classify Alzheimer’s disease (AD) patients from Normal Control (NC) patients using Magnetic Resonance Imaging (MRI). Methods/Statistical analysis: The performance evolution is carried out for 346 MR images from Alzheimer's Neuroimaging Initiative (ADNI) dataset. The classifier Deep Belief Network (DBN) is used for the function of classification. The network is trained using a sample training set, and the weights produced are then used to check the system's recognition capability. Findings: As a result, this paper presented a novel method of automated classification system for AD determination. The suggested method offers good performance of the experiments carried out show that the

... Show More
Publication Date
Sun Apr 02 2023
Journal Name
Mathematical Modelling Of Engineering Problems
Traffic Classification of IoT Devices by Utilizing Spike Neural Network Learning Approach
...Show More Authors

Whenever, the Internet of Things (IoT) applications and devices increased, the capability of the its access frequently stressed. That can lead a significant bottleneck problem for network performance in different layers of an end point to end point (P2P) communication route. So, an appropriate characteristic (i.e., classification) of the time changing traffic prediction has been used to solve this issue. Nevertheless, stills remain at great an open defy. Due to of the most of the presenting solutions depend on machine learning (ML) methods, that though give high calculation cost, where they are not taking into account the fine-accurately flow classification of the IoT devices is needed. Therefore, this paper presents a new model bas

... Show More
View Publication
Scopus (4)
Crossref (3)
Scopus Crossref
Publication Date
Mon Aug 31 2015
Journal Name
Journal Of Theoretical And Applied Information Technology
EXAM QUESTIONS CLASSIFICATION BASED ON BLOOM’S TAXONOMY COGNITIVE LEVEL USING CLASSIFIERS COMBINATION
...Show More Authors

Preview PDF
Scopus (66)
Scopus
Publication Date
Tue Nov 30 2021
Journal Name
Iraqi Journal Of Science
ESJF Algorithm to Improve Cloud Environment: Cloud computing
...Show More Authors

Nowadays, after the technological development in societies, cloud computing has become one of the most important technologies. It provides users with software, hardware, and platform as remote services over the Internet. The increasing number of cloud users has caused a critical problem in how the clients receive cloud services when the cloud is in a state of instability, as it cannot provide required services and, thus, a delay occurs. Therefore, an algorithm was proposed to provide high efficiency and stability to work, because all existing tasks must operate without delay. The proposed system is an enhancement shortest job first algorithm (ESJF) using a time slice, which works by taking a task in the shortest time first and then the l

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (2)
Scopus Crossref
Publication Date
Fri Jan 26 2024
Journal Name
Iraqi Journal Of Science
Modify Symmetric Block Cipher Algorithm Using Generated Digital 3D Fractal Image
...Show More Authors

The principal goal guiding any designed encryption algorithm must be security against unauthorized attackers. Within the last decade, there has been a vast increase in the communication of digital computer data in both the private and public sectors. Much of this information has a significant value; therefore it does require the protection by design strength algorithm to cipher it. This algorithm defines the mathematical steps required to transform data into a cryptographic cipher and also to transform the cipher back to the original form. The Performance and security level is the main characteristics that differentiate one encryption algorithm from another. In this paper suggested a new technique to enhance the performance of the Data E

... Show More
View Publication Preview PDF