Preferred Language
Articles
/
jBZerIoBVTCNdQwCnaJd
BotDetectorFW: an optimized botnet detection framework based on five features-distance measures supported by comparisons of four machine learning classifiers using CICIDS2017 dataset
...Show More Authors

<p><span>A Botnet is one of many attacks that can execute malicious tasks and develop continuously. Therefore, current research introduces a comparison framework, called BotDetectorFW, with classification and complexity improvements for the detection of Botnet attack using CICIDS2017 dataset. It is a free online dataset consist of several attacks with high-dimensions features. The process of feature selection is a significant step to obtain the least features by eliminating irrelated features and consequently reduces the detection time. This process implemented inside BotDetectorFW using two steps; data clustering and five distance measure formulas (cosine, dice, driver &amp; kroeber, overlap, and pearson correlation) using C#, followed by selecting the best N features used as input into four classifier algorithms evaluated using machine learning (WEKA); multilayerperceptron, JRip, IBK, and random forest. In BotDetectorFW, the thoughtful and diligent cleaning of the dataset within the preprocessing stage beside the normalization, binary clustering of its features, followed by the adapting of feature selection based on suitable feature distance techniques, and finalized by testing of selected classification algorithms. All together contributed in satisfying the high-performance metrics using fewer features number (8 features as a minimum) compared to and outperforms other methods found in the literature that adopted (10 features or higher) using the same dataset. Furthermore, the results and performance evaluation of BotDetectorFM shows a competitive impact in terms of classification accuracy (ACC), precision (Pr), recall (Rc), and f-measure (F1) metrics.</span></p>

Scopus Crossref
View Publication
Publication Date
Tue Jul 01 2014
Journal Name
International Journal Of Artificial Intelligence And Mechatronics
Building a Three-Axis CNC Milling Machine Control System
...Show More Authors

CNC machines are widely used in production fields since they produce similar parts in a minimum time, at higher speed and with possibly minimum error. A control system is designed, implemented and tested to control the operation of a laboratory CNC milling machine having three axes that are moved by using a stepper motor attached to each axis. The control system includes two parts, hardware part and software part, the hardware part used a PC (works as controller) connected to the CNC machine through its parallel port by using designed interface circuit. The software part includes the algorithms needed to control the CNC. The sample needs to be machined is drawn by using one of the drawing software like AUTOCAD or 3D MAX and is saved in a we

... Show More
View Publication Preview PDF
Publication Date
Mon Jan 20 2025
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Assessing Landsat Processing Levels and Support Vector Machine Classification
...Show More Authors

The availability of different processing levels for satellite images makes it important to measure their suitability for classification tasks. This study investigates the impact of the Landsat data processing level on the accuracy of land cover classification using a support vector machine (SVM) classifier. The classification accuracy values of Landsat 8 (LS8) and Landsat 9 (LS9) data at different processing levels vary notably. For LS9, Collection 2 Level 2 (C2L2) achieved the highest accuracy of (86.55%) with the polynomial kernel of the SVM classifier, surpassing the Fast Line-of-Sight Atmospheric Analysis of Spectral Hypercubes (FLAASH) at (85.31%) and Collection 2 Level 1 (C2L1) at (84.93%). The LS8 data exhibits similar behavior. Conv

... Show More
View Publication
Publication Date
Sat Nov 01 2014
Journal Name
Journal Of Next Generation Information Technology
The effect of the smoothing filter on an image encrypted by the blowfish algorithm then hiding it in a BMP image
...Show More Authors

order to increase the level of security, as this system encrypts the secret image before sending it through the internet to the recipient (by the Blowfish method). As The Blowfish method is known for its efficient security; nevertheless, the encrypting time is long. In this research we try to apply the smoothing filter on the secret image which decreases its size and consequently the encrypting and decrypting time are decreased. The secret image is hidden after encrypting it into another image called the cover image, by the use of one of these two methods" Two-LSB" or" Hiding most bits in blue pixels". Eventually we compare the results of the two methods to determine which one is better to be used according to the PSNR measurs

View Publication Preview PDF
Publication Date
Fri Aug 12 2022
Journal Name
Journal Of Research In Medical And Dental Science
Effects of Ozonated Water on Micro Leakage between Enamel and Fissure Sealants Prepared by Different Etching Technique (An in vitro Study)
...Show More Authors

Effects of Ozonated Water on Micro Leakage between Enamel and Fissure Sealants Prepared by Different Etching Technique (An in vitro Study), Baraa M Jabar*, Muna S Khalaf

View Publication Preview PDF
Publication Date
Mon Mar 27 2023
Journal Name
8th Engineering And 2nd International Conference For College Of Engineering – University Of Baghdad: Coec8-2021 Proceedings
Experimental study of natural convection heat transfer on an enclosure partially filled porous medium heated from below by constant heat flux
...Show More Authors

This study reports on natural convection heat transfer in a square enclosure of length (L=20 cm) with a saturated porous medium (solid glass beads) having same fluid (air) at lower horizontal layer and free air fill in the rest of the cavity's space. The experimental work has been performed under the effects of heating from bottom by constant heat flux q=150,300,450,600 W/m2 for four porous layers thickness Hp (2.5,5,7.5,1) cm and three heaters length δ(20,14,7) cm. The top enclosure wall was good insulated and the two side walls were symmetrically cooled at constant temperature. Four layers of porous media with small porosity, Rayleigh number range (60.354 - 241.41) and (Da) 3.025x10-8 has been investigated. The obtained data of temperatu

... Show More
View Publication
Scopus (3)
Crossref (4)
Scopus Crossref
Publication Date
Sun Jul 01 2018
Journal Name
Computers And Electronics In Agriculture
Detection of charcoal rot (Macrophomina phaseolina) toxin effects in soybean (Glycine max) seedlings using hyperspectral spectroscopy
...Show More Authors

View Publication
Scopus (16)
Crossref (13)
Scopus Clarivate Crossref
Publication Date
Mon Sep 30 2024
Journal Name
Iraqi Journal Of Science
Overlapping Structure Detection in Protein-Protein Interaction Networks Using a Modified Version of Particle Swarm Optimization
...Show More Authors

In today's world, the science of bioinformatics is developing rapidly, especially with regard to the analysis and study of biological networks. Scientists have used various nature-inspired algorithms to find protein complexes in protein-protein interaction (PPI) networks. These networks help scientists guess the molecular function of unknown proteins and show how cells work regularly. It is very common in PPI networks for a protein to participate in multiple functions and belong to many complexes, and as a result, complexes may overlap in the PPI networks. However, developing an efficient and reliable method to address the problem of detecting overlapping protein complexes remains a challenge since it is considered a complex and har

... Show More
View Publication
Scopus Crossref
Publication Date
Fri Mar 01 2019
Journal Name
Al-khwarizmi Engineering Journal
Reverse Engineering Representation Using an Image Processing Modification
...Show More Authors

In the reverse engineering approach, a massive amount of point data is gathered together during data acquisition and this leads to larger file sizes and longer information data handling time. In addition, fitting of surfaces of these data point is time-consuming and demands particular skills. In the present work a method for getting the control points of any profile has been presented. Where, many process for an image modification was explained using Solid Work program, and a parametric equation of the profile that proposed has been derived using Bezier technique with the control points that adopted. Finally, the proposed profile was machined using 3-aixs CNC milling machine and a compression in dimensions process has been occurred betwe

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Mon May 01 2023
Journal Name
Clinical And Experimental Dental Research
Atypical clinical features of post COVID‐19 mucormycosis: A case series
...Show More Authors
Abstract<sec><title>Objectives

This case series aims to evaluate patients affected with post COVID‐19 mucormycosis from clinical presentation to surgical and pharmacological treatment to improve the disease prognosis.

Material and Methods

This case series was conducted at a specialized surgery hospital in Baghdad Medical City for over 10 months. Fifteen cases who had mild to severe COVID‐19 infections followed by symptoms similar to aggressive periodontitis, such as mobility and bone resorption around the multiple maxillary teeth, were included in this case series.

Results ... Show More
View Publication Preview PDF
Scopus (1)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Wed Sep 15 2021
Journal Name
Al-academy
Design features of medicine box packaging for children: منى محمود حسين
...Show More Authors

Graphic design constitutes the human necessity for the design action, so there is no design achievement that is not considered in its founding project and its final realization as a response to a specific necessity. As a result of knowledge, which is the product of experience and is the result of applied science, design is based on observation, study and development, leading to the main goal, which is the utilitarian and aesthetic function that is put into the final consideration of design, and drug packaging design has an important role in all marketing fields, as companies compete with each other to attract the largest number Possible from consumers in a way that guarantees them material profit, and in order to achieve this, it always

... Show More
View Publication Preview PDF
Crossref