Preferred Language
Articles
/
jih-320
Reducing False Notification in Identifying Malicious Application Programming Interface(API) to Detect Malwares Using Artificial Neural Network with Discriminant Analysis
...Show More Authors

 This paper argues the accuracy of behavior based detection systems, in which the Application Programming Interfaces (API) calls are analyzed and monitored. The work identifies the problems that affecting the accuracy of such detection models. The work was extracted (4744) API call through analyzing. The new approach provides an accurate discriminator and can reveal malicious API in PE malware up to 83.2%. Results of this work evaluated with Discriminant Analysis

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Aug 03 2024
Journal Name
Proceedings Of Ninth International Congress On Information And Communication Technology
Offline Signature Verification Based on Neural Network
...Show More Authors

The investigation of signature validation is crucial to the field of personal authenticity. The biometrics-based system has been developed to support some information security features.Aperson’s signature, an essential biometric trait of a human being, can be used to verify their identification. In this study, a mechanism for automatically verifying signatures has been suggested. The offline properties of handwritten signatures are highlighted in this study which aims to verify the authenticity of handwritten signatures whether they are real or forged using computer-based machine learning techniques. The main goal of developing such systems is to verify people through the validity of their signatures. In this research, images of a group o

... Show More
Publication Date
Mon Nov 01 2010
Journal Name
Journal Of Systems And Software
Development of Java based RFID application programmable interface for heterogeneous RFID system
...Show More Authors

View Publication
Scopus (7)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Fri Sep 30 2011
Journal Name
Iraqi Journal Of Science
Using the band ratio classification method to detect the regions that need to remove sedimentation in Tigris River
...Show More Authors

LandSat Satellite ETM+ image have been analyzed to detect the different depths of regions inside the Tigris river in order to detect the regions that need to remove sedimentation in Baghdad in Iraq Country. The scene consisted of six bands (without the thermal band), It was captured in March ٢٠٠١. The variance in depth is determined by applying the rationing technique on the bands ٣ and ٥. GIS ٩. ١ program is used to apply the rationing technique and determined the results.

View Publication
Publication Date
Thu Nov 30 2023
Journal Name
Iraqi Journal Of Science
An Artificial Intelligence-based Proactive Network Forensic Framework
...Show More Authors

     is at an all-time high in the modern period, and the majority of the population uses the Internet for all types of communication. It is great to be able to improvise like this. As a result of this trend, hackers have become increasingly focused on attacking the system/network in numerous ways. When a hacker commits a digital crime, it is examined in a reactive manner, which aids in the identification of the perpetrators. However, in the modern period, it is not expected to wait for an attack to occur. The user anticipates being able to predict a cyberattack before it causes damage to the system. This can be accomplished with the assistance of the proactive forensic framework presented in this study. The proposed system combines

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Mon Jul 18 2022
Journal Name
Ieee Access
Moderately Multispike Return Neural Network for SDN Accurate Traffic Awareness in Effective 5G Network Slicing
...Show More Authors

Due to the huge variety of 5G services, Network slicing is promising mechanism for dividing the physical network resources in to multiple logical network slices according to the requirements of each user. Highly accurate and fast traffic classification algorithm is required to ensure better Quality of Service (QoS) and effective network slicing. Fine-grained resource allocation can be realized by Software Defined Networking (SDN) with centralized controlling of network resources. However, the relevant research activities have concentrated on the deep learning systems which consume enormous computation and storage requirements of SDN controller that results in limitations of speed and accuracy of traffic classification mechanism. To fill thi

... Show More
Scopus (11)
Crossref (8)
Scopus Clarivate Crossref
Publication Date
Sat Oct 01 2022
Journal Name
Biomedicine And Chemical Sciences
Conventional PCR versus Culture Method to Detect Common Fungal Pathogens in Patients with Respiratory Diseases
...Show More Authors

The study aimed to assess the frequency of invasive fungal infection in patients with respiratory diseases by conventional and molecular methods. This study included 117 Broncho alveolar lavage (BAL) samples were collected from patients with respiratory disease (79 male and 38 female) with ages ranged between (20-80) years, who attended Medicine Baghdad Teaching hospital and AL-Emamain AL-Khadhymian Medical City, during the period from September 2019 to April 2020. The results in PCR versus culture methods in this study showed that out of 117 samples of fungal infections 30(25.6 %) were detected by culture method, while the 24(20.5%) samples were detected by PCR technique, the most commonly diagnosed pathogenic fungi is Candida spp.

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Tue Oct 08 2002
Journal Name
Iraqi Journal Of Laser
Design Considerations of Laser Source in a Ring Network Based on Fiber Distributed Data Interface (FDDI)
...Show More Authors

This work presents the use of laser diode in the fiber distributed data interface FDDI networks. FDDI uses optical fiber as a transmission media. This solves the problems resulted from the EMI, and noise. In addition it increases the security of transmission. A network with a ring topology consists of three computers was designed and implemented. The timed token protocol was used to achieve and control the process of communication over the ring. Nonreturn to zero inversion (NRZI) modulation was carried out as a part of the physical (PHY) sublayer. The optical system consists of a laser diode with wavelength of 820 nm and 2.5 mW maximum output power as a source, optical fiber as a channel, and positive intrinsic negative (PIN) photodiode

... Show More
View Publication Preview PDF
Publication Date
Wed Jan 01 2014
Journal Name
International Journal Of Computer Applications
Mobile Position Estimation based on Three Angles of Arrival using an Interpolative Neural Network
...Show More Authors

In this paper, the memorization capability of a multilayer interpolative neural network is exploited to estimate a mobile position based on three angles of arrival. The neural network is trained with ideal angles-position patterns distributed uniformly throughout the region. This approach is compared with two other analytical methods, the average-position method which relies on finding the average position of the vertices of the uncertainty triangular region and the optimal position method which relies on finding the nearest ideal angles-position pattern to the measured angles. Simulation results based on estimations of the mobile position of particles moving along a nonlinear path show that the interpolative neural network approach outperf

... Show More
Publication Date
Sun Aug 30 2015
Journal Name
Statistical Analysis Of The Relations Between Api,specific Gravity And Sulfur Content In The Universal Crude Oil
Statistical Analysis of the Relations between API, Specific Gravity and Sulfur Content in the Universal Crude Oil
...Show More Authors

Publication Date
Fri Feb 01 2019
Journal Name
Environmental Technology & Innovation
The use of Artificial Neural Network (ANN) for modeling of Cu (II) ion removal from aqueous solution by flotation and sorptive flotation process
...Show More Authors

View Publication
Scopus (25)
Crossref (26)
Scopus Clarivate Crossref