Preferred Language
Articles
/
ijs-9320
Hybrid Fuzzy Logic and Artificial Bee Colony Algorithm for Intrusion Detection and Classification
...Show More Authors

In recent years, with the growing size and the importance of computer networks, it is very necessary to provide adequate protection for users data from snooping through the use of one of the protection techniques: encryption, firewall and intrusion detection systems etc. Intrusion detection systems is considered one of the most important components in the computer networks that deal with Network security problems. In this research, we suggested the intrusion detection and classification system through merging Fuzzy logic and Artificial Bee Colony Algorithm. Fuzzy logic has been used to build a classifier which has the ability to distinguish between the behavior of the normal user and behavior of the intruder. The artificial bee colony algorithm has been used to build the classifier which was used to classify the intrusion into one of the main types (DoS, R2L , U2R, Prob). The proposed system has the ability to detect and classify intrusion at high speed with a small percentage of false alarms as well as to detect the new attacks. The NSL-KDD dataset used in the training and testing the proposed system.The results of experiments showed that the efficiency of the proposed system performance were (97.59%) for the intrusion detection, and (0.12%) for the false alarms. Also, the Classification rates for classes (DoS, R2L,U2R,Prob) were (97.19, 77.09, 98.43, 93.23) Respectively, which is considered a superior performance comparing with other methods in the literature.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Sep 08 2020
Journal Name
Baghdad Science Journal
Improved throughput of Elliptic Curve Digital Signature Algorithm (ECDSA) processor implementation over Koblitz curve k-163 on Field Programmable Gate Array (FPGA)
...Show More Authors

            The widespread use of the Internet of things (IoT) in different aspects of an individual’s life like banking, wireless intelligent devices and smartphones has led to new security and performance challenges under restricted resources. The Elliptic Curve Digital Signature Algorithm (ECDSA) is the most suitable choice for the environments due to the smaller size of the encryption key and changeable security related parameters. However, major performance metrics such as area, power, latency and throughput are still customisable and based on the design requirements of the device.

The present paper puts forward an enhancement for the throughput performance metric by p

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Fri Dec 31 2021
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
ULATRAVIOLET ABSORBANCE SEPECTRA FOR ANTIBIOTIC DERIVATIVES (AMINO GLYCOSIDES) USED IN MEDICAL AND PHARMACEUTICAL INDUSTRY: ULATRAVIOLET ABSORBANCE SEPECTRA FOR ANTIBIOTIC DERIVATIVES (AMINO GLYCOSIDES) USED IN MEDICAL AND PHARMACEUTICAL INDUSTRY
...Show More Authors

Ultraviolet spectrophotometric studies for antibiotic (amino glycoside) derivatives including, Neomycin, Streptomycin, Gentamycin and Kanamycin with special reagents, which are benzoyl chloride; benzene sulfonyl chloride, toluenesulfonyl chloride and phthalic anhydride were made. Amino glycosides derivatives were followed through measurements of the ultraviolet absorbance (A) from which the absorptivity (ε) of the complexes was deduced and molar absorbances using Ultraviolet for products and calculate the number of reagents molecule that combine to amino glycosides.

View Publication Preview PDF
Publication Date
Thu May 28 2020
Journal Name
Iraqi Journal Of Science
Dynamical Analysis Within-Host and Between-Host for HIV\AIDS with the Application of Optimal Control Strategy: Dynamical analysis within-host and between-host for an HIV\AIDS
...Show More Authors

The aims of this paper is investigating the spread of AIDS both within-host, through the contact between healthy cells with free virus inside the body, and between-host, through sexual contact among individuals and external sources of infectious. The outbreak of AIDS is described by a mathematical model consisting of two stages. The first stage describes the within-host spread of AIDS and is represented by the first three equations. While the second stage describes the between-host spread of AIDS and represented by the last four equations. The existence, uniqueness and boundedness of the solution of the model are discussed and all possible equilibrium points are determined. The local asymptotic stability (LAS) of the model is studied, wh

... Show More
View Publication Preview PDF
Scopus (6)
Crossref (3)
Scopus Crossref
Publication Date
Sun Sep 06 2015
Journal Name
Baghdad Science Journal
Calculation of Radial Electron-Electron Distribution function and Expectation Values for Li-Atom in Excited States 1s 2p, 1s 3p and 1s 3d
...Show More Authors

The electron correlation for inter-shells (1s 2p), (1s 3p) and (1s 3d) was described by the inter-particle radial distribution function f(r12). It was evaluated for Li-atom in the different excited states (1s2 2p), (1s2 3p) and (1s2 3d) using Hartree-Fock approximation (HF). The inter particle expectation values for these shells were also evaluated. The calculations were performed using Mathcad 14 program.

View Publication Preview PDF
Crossref
Publication Date
Sat Nov 22 2014
Journal Name
Indian Journal Of Physics
Comparison between shell model and self-consistent mean field calculations for ground charge density distributions and elastic form factors of 12C and 16O nuclei
...Show More Authors

View Publication
Scopus (2)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Mon Mar 01 2010
Journal Name
Journal Of Economics And Administrative Sciences
Measuring and analyzing the effect of labor productivity and capital on manufacturing industries in Iraq and some Arab countries for the period 1990-2000
...Show More Authors

يلعب القطاع الصناعي التحويلي في أي قطر دوراً هاماً في تحقيق التنمية الصناعية، اذ تتحد تاثيراته فيها على طبيعة الدور المرسوم له وعلى مدى فاعلية هذا القطاع الحيوي الذي يعد اتجاه نحو التعاظم المضطرد لمستويات الانتاجية " Levels of productivity"والتنويع الانتاجي والتدفق المستمر للتجديد التكنولوجي من اهم دلائله.

ويعد مؤشر الانتاجية بصفة عامة وانتاجيتي العمل وراس المال بصفة خاصة من الم

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Sep 30 2022
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Ijarah and lease ending with ownership and its implications for the bank's profits: A case study in the Emirates Islamic Bank and Emirates NBD
...Show More Authors

The formula of Ijarah and Ijarah ending with ownership is one of the investment formulas in Islamic banks, so this research has shed light on it in order to benefit from the experiences of the research sample banks, This research aims to find a reliable way for Iraqi Islamic banks, namely (leasing and leasing ending with ownership) in order to invest their money without usurious interests, The problem of the research emerges through the lack of awareness of the Iraqi Islamic banks to work with different Islamic financing formulas and their inability to invest their money through the adoption of their administrations for different formulas, including the leasing, and this is reflected in the decrease and fluctuation of its profits, Theref

... Show More
View Publication Preview PDF
Publication Date
Sun Jul 09 2023
Journal Name
Journal Of Engineering
Comparison between Linear and Non-linear ANN Models for Predicting Water Quality Parameters at Tigris River
...Show More Authors

In this research, Artificial Neural Networks (ANNs) technique was applied in an attempt to predict the water levels and some of the water quality parameters at Tigris River in Wasit Government for five different sites. These predictions are useful in the planning, management, evaluation of the water resources in the area. Spatial data along a river system or area at different locations in a catchment area usually have missing measurements, hence an accurate prediction. model to fill these missing values is essential.
The selected sites for water quality data prediction were Sewera, Numania , Kut u/s, Kut d/s, Garaf observation sites. In these five sites models were built for prediction of the water level and water quality parameters.

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Mon Feb 04 2019
Journal Name
Journal Of The College Of Education For Women
Self-Efficacy and its Relation to the Cognitive Assessment for the Daily Disturbances for the University of Baghdad Students
...Show More Authors

The current research tackles the self-efficacy and its relation to the cognitive assessment for the daily disturbances for the University of Baghdad students. Two criteria have been adopted to achieve the objectives of the research. The sample of this study consists of 200 male and female students who were chosen randomly. The data were analyzed statistically, revealing that the university students owned their own self-efficacy as well as a cognitive assessment for the daily disturbances and they recognized them as self-threatening. The results also indicated the existence of a prediction activity in the field of the cognitive assessment to the daily disturbances selection. In light of the acquired results, the study recommends the neces

... Show More
View Publication Preview PDF
Publication Date
Fri Sep 30 2022
Journal Name
Journal Of Economics And Administrative Sciences
Comparison of Some Methods for Estimating the Survival Function and Failure Rate for the Exponentiated Expanded Power Function Distribution
...Show More Authors

 

     We have presented the distribution of the exponentiated expanded power function (EEPF) with four parameters, where this distribution was created by the exponentiated expanded method created by the scientist Gupta to expand the exponential distribution by adding a new shape parameter to the cumulative function of the distribution, resulting in a new distribution, and this method is characterized by obtaining a distribution that belongs for the exponential family. We also obtained a function of survival rate and failure rate for this distribution, where some mathematical properties were derived, then we used the method of maximum likelihood (ML) and method least squares developed  (LSD)

... Show More
View Publication Preview PDF
Crossref