In recent years, with the growing size and the importance of computer networks, it is very necessary to provide adequate protection for users data from snooping through the use of one of the protection techniques: encryption, firewall and intrusion detection systems etc. Intrusion detection systems is considered one of the most important components in the computer networks that deal with Network security problems. In this research, we suggested the intrusion detection and classification system through merging Fuzzy logic and Artificial Bee Colony Algorithm. Fuzzy logic has been used to build a classifier which has the ability to distinguish between the behavior of the normal user and behavior of the intruder. The artificial bee colony algorithm has been used to build the classifier which was used to classify the intrusion into one of the main types (DoS, R2L , U2R, Prob). The proposed system has the ability to detect and classify intrusion at high speed with a small percentage of false alarms as well as to detect the new attacks. The NSL-KDD dataset used in the training and testing the proposed system.The results of experiments showed that the efficiency of the proposed system performance were (97.59%) for the intrusion detection, and (0.12%) for the false alarms. Also, the Classification rates for classes (DoS, R2L,U2R,Prob) were (97.19, 77.09, 98.43, 93.23) Respectively, which is considered a superior performance comparing with other methods in the literature.
Most species of Mollusca lives in salts water, on the shores of seas and lakes and some in fresh water, others are found in deserts, forests and forms and there are 45,000 species . They are invertebrate animals with lateral symmetry, slow-moving and a few of them are fast, like Octopus and Squid and some of them are economic importance. The class Gastropoda are considered the largest class belonging to the Phylum-Mollusca, as it contains more than 80%. Its importance follows from its great diversity and spread in all environments. It has an ecological importance because it plays an great role in ecosystems due to the diversity of its food methods between herbivorous and predatory. Studies on snails in Iraq are very few and modest. Hence
... Show MoreIn this research, a group of gray texture images of the Brodatz database was studied by building the features database of the images using the gray level co-occurrence matrix (GLCM), where the distance between the pixels was one unit and for four angles (0, 45, 90, 135). The k-means classifier was used to classify the images into a group of classes, starting from two to eight classes, and for all angles used in the co-occurrence matrix. The distribution of the images on the classes was compared by comparing every two methods (projection of one class onto another where the distribution of images was uneven, with one category being the dominant one. The classification results were studied for all cases using the confusion matrix between ev
... Show MoreIn this research, a group of gray texture images of the Brodatz database was studied by building the features database of the images using the gray level co-occurrence matrix (GLCM), where the distance between the pixels was one unit and for four angles (0, 45, 90, 135). The k-means classifier was used to classify the images into a group of classes, starting from two to eight classes, and for all angles used in the co-occurrence matrix. The distribution of the images on the classes was compared by comparing every two methods (projection of one class onto another where the distribution of images was uneven, with one category being the dominant one. The classification results were studied for all cases using the confusion matrix between every
... Show MoreImage processing applications are currently spreading rapidly in industrial agriculture. The process of sorting agricultural fruits according to their color comes first among many studies conducted in industrial agriculture. Therefore, it is necessary to conduct a study by developing an agricultural crop separator with a low economic cost, however automatically works to increase the effectiveness and efficiency in sorting agricultural crops. In this study, colored pepper fruits were sorted using a Pixy2 camera on the basis of algorithm image analysis, and by using a TCS3200 color sensor on the basis of analyzing the outer surface of the pepper fruits, thus This separation process is done by specifying the pepper according to the color of it
... Show MoreHeuristic approaches are traditionally applied to find the optimal size and optimal location of Flexible AC Transmission Systems (FACTS) devices in power systems. Genetic Algorithm (GA) technique has been applied to solve power engineering optimization problems giving better results than classical methods. This paper shows the application of GA for optimal sizing and allocation of a Static Compensator (STATCOM) in a power system. STATCOM devices used to increase transmission systems capacity and enhance voltage stability by regulate the voltages at its terminal by controlling the amount of reactive power injected into or absorbed from the power system. IEEE 5-bus standard system is used as an example to illustrate the te
... Show Moreobjectives: To investigate the polyomaviruses (BK, JC) in asymptomatic kidney transplant recipients and healthy persons as control. It is one of the first reports on serological detection and molecular characterization that describes the circulation of polyomaviruses (BKV, JCV) have been done in Iraq recently. Methodology: The present study was designed as prospective case control study was done during the period from November 2015 to August 2016. Total of 97 serum and urine samples were collected randomly from 25 healthy control person and 72 renal transplant recipients, attending Iraqi Renal Transplantatio
The present study aimed to try to find natural substances stimulate the production of bacteriocin, as well as "for detection of bacteriocin producing isolates. Two hundred and eighty ( 280) bacterial isolates, gram negative only, were collected from 760 different pathogenic samples, consist: (Urinary tract infection, septicemia, Vaginal inflammation and diarrhea). The isolated bacteria are: Escherichia coli, Klebsiella pneumonia Pseudomonas aeruginosa,, Salmonella typhi, Enterobacter cloacae, Acinetobacter baumannii, Serratia liquefaciens, Citrobacter freundii, Proteus mirabilis and Serrattia odorifera. Cup assay method was used to detect bacteriocin production. Loc
... Show MoreRegarding to the computer system security, the intrusion detection systems are fundamental components for discriminating attacks at the early stage. They monitor and analyze network traffics, looking for abnormal behaviors or attack signatures to detect intrusions in early time. However, many challenges arise while developing flexible and efficient network intrusion detection system (NIDS) for unforeseen attacks with high detection rate. In this paper, deep neural network (DNN) approach was proposed for anomaly detection NIDS. Dropout is the regularized technique used with DNN model to reduce the overfitting. The experimental results applied on NSL_KDD dataset. SoftMax output layer has been used with cross entropy loss funct
... Show More