Preferred Language
Articles
/
ijs-9320
Hybrid Fuzzy Logic and Artificial Bee Colony Algorithm for Intrusion Detection and Classification
...Show More Authors

In recent years, with the growing size and the importance of computer networks, it is very necessary to provide adequate protection for users data from snooping through the use of one of the protection techniques: encryption, firewall and intrusion detection systems etc. Intrusion detection systems is considered one of the most important components in the computer networks that deal with Network security problems. In this research, we suggested the intrusion detection and classification system through merging Fuzzy logic and Artificial Bee Colony Algorithm. Fuzzy logic has been used to build a classifier which has the ability to distinguish between the behavior of the normal user and behavior of the intruder. The artificial bee colony algorithm has been used to build the classifier which was used to classify the intrusion into one of the main types (DoS, R2L , U2R, Prob). The proposed system has the ability to detect and classify intrusion at high speed with a small percentage of false alarms as well as to detect the new attacks. The NSL-KDD dataset used in the training and testing the proposed system.The results of experiments showed that the efficiency of the proposed system performance were (97.59%) for the intrusion detection, and (0.12%) for the false alarms. Also, the Classification rates for classes (DoS, R2L,U2R,Prob) were (97.19, 77.09, 98.43, 93.23) Respectively, which is considered a superior performance comparing with other methods in the literature.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Jun 01 2020
Journal Name
Journal Of Engineering
Artificial Neural Network (ANN) for Prediction of Viscosity Reduction of Heavy Crude Oil using Different Organic Solvents
...Show More Authors

The increase globally fossil fuel consumption as it represents the main source of energy around the world, and the sources of heavy oil more than light, different techniques were used to reduce the viscosity and increase mobility of heavy crude oil. this study focusing on the experimental tests  and modeling with Back Feed Forward Artificial Neural Network (BFF-ANN) of the dilution technique to reduce a  heavy oil viscosity that was collected from the south- Iraq oil fields using organic solvents, organic diluents with different weight percentage  (5, 10 and  20 wt.% )  of  (n-heptane, toluene, and a mixture of  different ratio

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Wed Mar 10 2021
Journal Name
Baghdad Science Journal
Ranking Function to Solve a Fuzzy Multiple Objective Function
...Show More Authors

In this paper two ranking functions are employed to treat the fuzzy multiple objective (FMO) programming model, then using two kinds of membership function, the first one is trapezoidal fuzzy (TF) ordinary membership function, the second one is trapezoidal fuzzy weighted membership function. When the objective function is fuzzy, then should transform and shrinkage the fuzzy model to traditional model, finally solving these models to know which one is better

View Publication Preview PDF
Scopus (11)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Sun Jan 01 2023
Journal Name
International Journal Of Data And Network Science
The effects of big data, artificial intelligence, and business intelligence on e-learning and business performance: Evidence from Jordanian telecommunication firms
...Show More Authors

This study sought to investigate the impacts of big data, artificial intelligence (AI), and business intelligence (BI) on Firms' e-learning and business performance at Jordanian telecommunications industry. After the samples were checked, a total of 269 were collected. All of the information gathered throughout the investigation was analyzed using the PLS software. The results show a network of interconnections can improve both e-learning and corporate effectiveness. This research concluded that the integration of big data, AI, and BI has a positive impact on e-learning infrastructure development and organizational efficiency. The findings indicate that big data has a positive and direct impact on business performance, including Big

... Show More
View Publication
Scopus (29)
Crossref (23)
Scopus Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Baghdad Science Journal
Classification of Arabic Alphabets Using a Combination of a Convolutional Neural Network and the Morphological Gradient Method
...Show More Authors

The field of Optical Character Recognition (OCR) is the process of converting an image of text into a machine-readable text format. The classification of Arabic manuscripts in general is part of this field. In recent years, the processing of Arabian image databases by deep learning architectures has experienced a remarkable development. However, this remains insufficient to satisfy the enormous wealth of Arabic manuscripts. In this research, a deep learning architecture is used to address the issue of classifying Arabic letters written by hand. The method based on a convolutional neural network (CNN) architecture as a self-extractor and classifier. Considering the nature of the dataset images (binary images), the contours of the alphabet

... Show More
View Publication Preview PDF
Crossref (1)
Scopus Crossref
Publication Date
Wed Aug 17 2022
Journal Name
Aip Conference Proceedings
The effect of using Gaussian, Kurtosis and LogCosh as kernels in ICA on the satellite classification accuracy
...Show More Authors

This study focusses on the effect of using ICA transform on the classification accuracy of satellite images using the maximum likelihood classifier. The study area represents an agricultural area north of the capital Baghdad - Iraq, as it was captured by the Landsat 8 satellite on 12 January 2021, where the bands of the OLI sensor were used. A field visit was made to a variety of classes that represent the landcover of the study area and the geographical location of these classes was recorded. Gaussian, Kurtosis, and LogCosh kernels were used to perform the ICA transform of the OLI Landsat 8 image. Different training sets were made for each of the ICA and Landsat 8 images separately that used in the classification phase, and used to calcula

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Fri Jun 29 2018
Journal Name
Journal Of Engineering
Experimental Study and Analysis on Degradation of Oily Sludge from Process Equipment by Continuous Hybrid Treatment
...Show More Authors

It is well known that petroleum refineries are considered the largest generator of oily sludge which may cause serious threats to the environment if disposed of without treatment. Throughout the present research, it can be said that a hybrid process including ultrasonic treatment coupled with froth floatation has been shown as a green efficient treatment of oily sludge waste from the bottom of crude oil tanks in Al-Daura refinery and able to get high yield of base oil recovery which is 65% at the optimum operating conditions (treatment time = 30 min, ultrasonic wave amplitude = 60 micron, and (solvent: oily sludge) ratio = 4). Experimental results showed that 83% of the solvent used was recovered meanwhile the main water

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sat Jan 01 2022
Journal Name
Geotechnical Engineering And Sustainable Construction
Stability and Seismic Performance of Tall Steel Structures with Hybrid Energy Absorbers Including P-Delta Effect
...Show More Authors

View Publication
Scopus (1)
Scopus Crossref
Publication Date
Tue Jul 01 2014
Journal Name
Computer Engineering And Intelligent Systems
Static Analysis Based Behavioral API for Malware Detection using Markov Chain
...Show More Authors

Researchers employ behavior based malware detection models that depend on API tracking and analyzing features to identify suspected PE applications. Those malware behavior models become more efficient than the signature based malware detection systems for detecting unknown malwares. This is because a simple polymorphic or metamorphic malware can defeat signature based detection systems easily. The growing number of computer malwares and the detection of malware have been the concern for security researchers for a large period of time. The use of logic formulae to model the malware behaviors is one of the most encouraging recent developments in malware research, which provides alternatives to classic virus detection methods. To address the l

... Show More
Publication Date
Tue Sep 30 2014
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Analytical Model for Detection the Tilt in Originally Oil Water Contacts
...Show More Authors

Many carbonate reservoirs in the world show a tilted in originally oil-water contact (OOWC) which requires a special consideration in the selection of the capillary pressure curves and an understanding of reservoir fluids distribution while initializing the reservoir simulation models.
An analytical model for predicting the capillary pressure across the interface that separates two immiscible fluids was derived from reservoir pressure transient analysis. The model reflected the entire interaction between the reservoir-aquifer fluids and rock properties measured under downhole reservoir conditions.
This model retained the natural coupling of oil reservoirs with the aquifer zone and treated them as an explicit-region composite system

... Show More
View Publication Preview PDF
Publication Date
Mon Jan 01 2018
Journal Name
Matec Web Of Conferences
Brain Tumour Detection using Fine-Tuning Mechanism for Magnetic Resonance Imaging
...Show More Authors

In this paper, new brain tumour detection method is discovered whereby the normal slices are disassembled from the abnormal ones. Three main phases are deployed including the extraction of the cerebral tissue, the detection of abnormal block and the mechanism of fine-tuning and finally the detection of abnormal slice according to the detected abnormal blocks. Through experimental tests, progress made by the suggested means is assessed and verified. As a result, in terms of qualitative assessment, it is found that the performance of proposed method is satisfactory and may contribute to the development of reliable MRI brain tumour diagnosis and treatments.

View Publication
Scopus (1)
Scopus Crossref