Preferred Language
Articles
/
jBZerIoBVTCNdQwCnaJd
BotDetectorFW: an optimized botnet detection framework based on five features-distance measures supported by comparisons of four machine learning classifiers using CICIDS2017 dataset
...Show More Authors

<p><span>A Botnet is one of many attacks that can execute malicious tasks and develop continuously. Therefore, current research introduces a comparison framework, called BotDetectorFW, with classification and complexity improvements for the detection of Botnet attack using CICIDS2017 dataset. It is a free online dataset consist of several attacks with high-dimensions features. The process of feature selection is a significant step to obtain the least features by eliminating irrelated features and consequently reduces the detection time. This process implemented inside BotDetectorFW using two steps; data clustering and five distance measure formulas (cosine, dice, driver &amp; kroeber, overlap, and pearson correlation) using C#, followed by selecting the best N features used as input into four classifier algorithms evaluated using machine learning (WEKA); multilayerperceptron, JRip, IBK, and random forest. In BotDetectorFW, the thoughtful and diligent cleaning of the dataset within the preprocessing stage beside the normalization, binary clustering of its features, followed by the adapting of feature selection based on suitable feature distance techniques, and finalized by testing of selected classification algorithms. All together contributed in satisfying the high-performance metrics using fewer features number (8 features as a minimum) compared to and outperforms other methods found in the literature that adopted (10 features or higher) using the same dataset. Furthermore, the results and performance evaluation of BotDetectorFM shows a competitive impact in terms of classification accuracy (ACC), precision (Pr), recall (Rc), and f-measure (F1) metrics.</span></p>

Scopus Crossref
View Publication
Publication Date
Fri Dec 01 2023
Journal Name
Iraqi Journal Of Physics
Polluted Water Sensor Based on Carbon Quantum Dots/Alq3 Using Drop Casting and Spin Coating Techniques
...Show More Authors

Water quality sensors have recently received a lot of attention due to their impact on human health. Due to their distinct features, environmental sensors are based on carbon quantum dots (CQDs). In this study, CQDs were prepared using the electro-chemical method, where the structural and optical properties were studied. These quantum dots were used in the environmental sensor application after mixing them with three different materials: CQDs, Alq3 polymer and CQDs and Alq3 solutions using two different methods: drop casting and spin coating, and depositing them on silicon. The sensitivity of the water pollutants was studied for each case of the prepared samples after measuring the change in resistance of the samples at a temperature of

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Fri Aug 29 2025
Journal Name
Journal Of Physical Education
The Effect of Inclusion Style Using Electronic Device On Learning Front and Side Movement in Squash For Beginners Aged 13 – 15 Years Old
...Show More Authors

View Publication
Publication Date
Thu Sep 13 2018
Journal Name
Baghdad Science Journal
An Efficient Numerical Method for Solving Volterra-Fredholm Integro-Differential Equations of Fractional Order by Using Shifted Jacobi-Spectral Collocation Method
...Show More Authors

The aim of this article is to solve the Volterra-Fredholm integro-differential equations of fractional order numerically by using the shifted Jacobi polynomial collocation method. The Jacobi polynomial and collocation method properties are presented. This technique is used to convert the problem into the solution of linear algebraic equations. The fractional derivatives are considered in the Caputo sense. Numerical examples are given to show the accuracy and reliability of the proposed technique.

View Publication Preview PDF
Scopus (6)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Sun Sep 04 2011
Journal Name
Baghdad Science Journal
An Embedded Data Using Slantlet Transform
...Show More Authors

Data hiding is the process of encoding extra information in an image by making small modification to its pixels. To be practical, the hidden data must be perceptually invisible yet robust to common signal processing operations. This paper introduces a scheme for hiding a signature image that could be as much as 25% of the host image data and hence could be used both in digital watermarking as well as image/data hiding. The proposed algorithm uses orthogonal discrete wavelet transforms with two zero moments and with improved time localization called discrete slantlet transform for both host and signature image. A scaling factor ? in frequency domain control the quality of the watermarked images. Experimental results of signature image

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Apr 01 2017
Journal Name
Image & Video Processing
Enhancement of LBP-based face identification system by adopting preprocessing techniques
...Show More Authors

Face Identification system is an active research area in these years. However, the accuracy and its dependency in real life systems are still questionable. Earlier research in face identification systems demonstrated that LBP based face recognition systems are preferred than others and give adequate accuracy. It is robust against illumination changes and considered as a high-speed algorithm. Performance metrics for such systems are calculated from time delay and accuracy. This paper introduces an improved face recognition system that is build using C++ programming language with the help of OpenCV library. Accuracy can be increased if a filter or combinations of filters are applied to the images. The accuracy increases from 95.5% (without ap

... Show More
View Publication
Publication Date
Sun Jul 06 2014
Journal Name
Journal Of Educational And Psychological Researches
The Intellectual Stress and Its Relationship with Personality' s Five Major Factors of Counselors
...Show More Authors

The current study aims at identifying:

1-The intellectual stress of counselors according to gender variable (male, female ).

2-The five major  factors of the  Counselor's  Personality.

3-  The relationship between intellectual stress and the five major factors of the councilors' personality and according to gender variable (male, female ).

4-The significant differences in the relationship between intellectual stress and the five major factors of the councilors' personality and according to gender variable  (male, female ).

The sample of the study includes (260) counselors (130 male

... Show More
View Publication Preview PDF
Publication Date
Sun Jan 01 2017
Journal Name
Aro-the Scientific Journal Of Koya University
A Comparative Study for String Metrics and the Feasibility of Joining them as Combined Text Similarity Measures
...Show More Authors

View Publication
Crossref (1)
Crossref
Publication Date
Sat Aug 01 2015
Journal Name
Euphrates Journal Of Agricultural Science
MEASURES OF SPECIFIC PRODUCTIVITY, ACTUAL TIME, APPEARANCE AND TILLAGE DEVIATION FOR TWO PLOWS MOSTLY USED IN IRAQ
...Show More Authors

Experiment was conducted in Baghdad, three factor were used in this research included Two types of Plows included moldboard and disk plows which represented the main plot, Three forward speeds of the tillage was the second factor included 1.85, 3.75 and 5.62 km / h which represented sup plot , and Three levels of Soil Moisture was third factor included 21, 18 and 14 % in all of Vertical and Lateral Plowing Deviation, Practical and specific productivity, actual time for plowing one donam and appearance (goodness) of Tillage represented by the number of clods > 10 cm in silt clay loam soil with depth 22 cm were studied. the experiment was used Split – split plot design under randomized complete block design with three replications and Le

... Show More
Publication Date
Thu Jan 31 2019
Journal Name
Journal Of The College Of Education For Women
Iraqi-US relations in the light of the strategic framework agreement
...Show More Authors

The United States has stood by Iraq and supported militarily and morally, but the relationship did not quickly be strained again before August 1990, when the oldest former political system in Iraq after Iraqi troops entered the territory of Kuwait, the United States stood beside Kuwait because the two parties link military ties opted States United to support the Kuwaiti side relying on the resolutions passed by the UN security Council, the United States and found in this issue right opportunity to execute the mechanics of meddling in Iraqi affairs and the various means of political, economic, military, and methods for dealing with Iraq, especially after finding the impediment standing in front of the implementation of its goals The strat

... Show More
View Publication Preview PDF
Publication Date
Sat Jun 01 2024
Journal Name
Journal Of Engineering
Copy Move Image Forgery Detection using Multi-Level Local Binary Pattern Algorithm
...Show More Authors

Digital image manipulation has become increasingly prevalent due to the widespread availability of sophisticated image editing tools. In copy-move forgery, a portion of an image is copied and pasted into another area within the same image. The proposed methodology begins with extracting the image's Local Binary Pattern (LBP) algorithm features. Two main statistical functions, Stander Deviation (STD) and Angler Second Moment (ASM), are computed for each LBP feature, capturing additional statistical information about the local textures. Next, a multi-level LBP feature selection is applied to select the most relevant features. This process involves performing LBP computation at multiple scales or levels, capturing textures at different

... Show More
Crossref