Preferred Language
Articles
/
joe-1666
An Empirical Investigation on Snort NIDS versus Supervised Machine Learning Classifiers
...Show More Authors

With the vast usage of network services, Security became an important issue for all network types. Various techniques emerged to grant network security; among them is Network Intrusion Detection System (NIDS). Many extant NIDSs actively work against various intrusions, but there are still a number of performance issues including high false alarm rates, and numerous undetected attacks. To keep up with these attacks, some of the academic researchers turned towards machine learning (ML) techniques to create software that automatically predict intrusive and abnormal traffic, another approach is to utilize ML algorithms in enhancing Traditional NIDSs which is a more feasible solution since they are widely spread. To upgrade the detection rates of current NIDSs, thorough analyses are essential to identify where ML predictors outperform them. The first step is to provide assessment of most used NIDS worldwide, Snort, and comparing its performance with ML classifiers. This paper provides an empirical study to evaluate performance of Snort and four supervised ML classifiers, KNN, Decision Tree, Bayesian net and Naïve Bays against network attacks, probing, Brute force and DoS. By measuring Snort metric, True Alarm Rate, F-measure, Precision and Accuracy and compares them with the same metrics conducted from applying ML algorithms using Weka tool. ML classifiers show an elevated performance with over 99% correctly classified instances for most algorithms, While Snort intrusion detection system shows a degraded classification of about 25% correctly classified instances, hence identifying Snort weaknesses towards certain attack types and giving leads on how to overcome those weaknesses. 

es.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Mar 01 2020
Journal Name
Baghdad Science Journal
An Application of Non-additive Measures and Corresponding Integrals in Tourism Management
...Show More Authors

Non-additive measures and corresponding integrals originally have been introduced by Choquet in 1953 (1) and independently defined by Sugeno in 1974 (2) in order to extend the classical measure by replacing the additivity property to non-additive property. An important feature of non –additive measures and fuzzy integrals is that they can represent the importance of individual information sources and interactions among them. There are many applications of non-additive measures and fuzzy integrals such as image processing, multi-criteria decision making, information fusion, classification, and pattern recognition. This paper presents a mathematical model for discussing an application of non-additive measures and corresp

... Show More
View Publication Preview PDF
Scopus (13)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Thu Mar 21 2019
Journal Name
J. Eng. Appl. Sci
Developing an Arabic handwritten recognition system by means of artificial neural network
...Show More Authors

The matter of handwritten text recognition is as yet a major challenge to mainstream researchers. A few ways deal with this challenge have been endeavored in the most recent years, for the most part concentrating on the English pre-printed or handwritten characters space. Consequently, the need to effort a research concerning to Arabic texts handwritten recognition. The Arabic handwriting presents unique technical difficulties because it is cursive, right to left in writing and the letters convert its shapes and structures when it is putted at initial, middle, isolation or at the end of words. In this study, the Arabic text recognition is developed and designed to recognize image of Arabic text/characters. The proposed model gets a single l

... Show More
Publication Date
Sat Feb 02 2019
Journal Name
Journal Of The College Of Education For Women
Design of an Electron Gun Using two Electrod Low Aberration Immersion Lens
...Show More Authors

Abstract
A two electrode immersion electrostatic lens used in the design
of an electron gun, with small aberration, has been designed using
the finite element method (FEM). By choosing the appropriate
geometrical shape of there electrodes the potential V(r,z) and the
axial potential distribution have been computed using the FEM to
solve Laplace's equation.
The trajectory of the electron beam and the optical properties of
this lens combination of electrodes have been computed under
different magnification conditions (Zero and infinite magnification
conditions) from studying the properties of the designed electron
gun can be supplied with Abeam current of 5.7*10-6 A , electron
gun with half acceptance

... Show More
View Publication Preview PDF
Publication Date
Tue Mar 12 2019
Journal Name
Journal Of Global Pharma Technology,
Bentonite as an adsorption surface for bromothymol blue dye from aqueous solution
...Show More Authors

Scopus
Publication Date
Tue Feb 01 2022
Journal Name
Baghdad Science Journal
An Efficient Algorithm for Fuzzy Linear Fractional Programming Problems via Ranking Function
...Show More Authors

In many applications such as production, planning, the decision maker is important in optimizing an objective function that has fuzzy ratio two functions which can be handed using fuzzy fractional programming problem technique. A special class of optimization technique named fuzzy fractional programming problem is considered in this work when the coefficients of objective function are fuzzy. New ranking function is proposed and used to convert the data of the fuzzy fractional programming problem from fuzzy number to crisp number so that the shortcoming when treating the original fuzzy problem can be avoided. Here a novel ranking function approach of ordinary fuzzy numbers is adopted for ranking of triangular fuzzy numbers with simpler an

... Show More
View Publication Preview PDF
Scopus (11)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Mon Mar 01 2010
Journal Name
College Of Education For Women Journal
The Quest for an Ideal Beauty in Toni Morrison The Bluest Eye
...Show More Authors

In The Bluest Eye (1970) , Toni Morrison addresses a timeless problem of white racial dominance in the United States and points to the impact it has on the life of black females growing up in the 1930's. Morrison in this novel explores how Western standards of ideal beauty are created and propagated with and among the black community. The novel not only portrays the lives of those whose dark skinned and negroid features blight their lives; it also shows how the standards of white beauty are imposed on black youth to cause a damage of one's self-love and esteem which usually occurs when beauty goes unrecognized

View Publication
Publication Date
Wed Oct 20 2021
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
An Estimation of Survival and Hazard Rate Functions of Exponential Rayleigh Distribution
...Show More Authors

In this paper, we used the maximum likelihood estimation method to find the estimation values ​​for survival and hazard rate functions of the Exponential Rayleigh distribution based on a sample of the real data for lung cancer and stomach cancer obtained from the Iraqi Ministry of Health and Environment, Department of Medical City, Tumor Teaching Hospital, depending on patients' diagnosis records and number of days the patient remains in the hospital until his death.

View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sat Jul 01 2023
Journal Name
International Journal Of Intelligent Engineering And Systems
An Efficient Cryptosystem for Image Using 1D and 2D Logistic Chaotic Maps
...Show More Authors

View Publication Preview PDF
Scopus (4)
Crossref (2)
Scopus Crossref
Publication Date
Wed Sep 01 2021
Journal Name
Baghdad Science Journal
An Efficient Image Encryption Using a Dynamic, Nonlinear and Secret Diffusion Scheme
...Show More Authors

The growing use of tele

This paper presents a new secret diffusion scheme called Round Key Permutation (RKP) based on the nonlinear, dynamic and pseudorandom permutation for encrypting images by block, since images are considered particular data because of their size and their information, which are two-dimensional nature and characterized by high redundancy and strong correlation. Firstly, the permutation table is calculated according to the master key and sub-keys. Secondly, scrambling pixels for each block to be encrypted will be done according the permutation table. Thereafter the AES encryption algorithm is used in the proposed cryptosystem by replacing the linear permutation of ShiftRows step with the nonlinear and secret pe

... Show More
View Publication Preview PDF
Scopus (2)
Scopus Clarivate Crossref
Publication Date
Sun Feb 25 2024
Journal Name
Baghdad Science Journal
An Adaptive Harmony Search Part-of-Speech tagger for Square Hmong Corpus
...Show More Authors

Data-driven models perform poorly on part-of-speech tagging problems with the square Hmong language, a low-resource corpus. This paper designs a weight evaluation function to reduce the influence of unknown words. It proposes an improved harmony search algorithm utilizing the roulette and local evaluation strategies for handling the square Hmong part-of-speech tagging problem. The experiment shows that the average accuracy of the proposed model is 6%, 8% more than HMM and BiLSTM-CRF models, respectively. Meanwhile, the average F1 of the proposed model is also 6%, 3% more than HMM and BiLSTM-CRF models, respectively.

View Publication Preview PDF
Scopus (3)
Crossref (1)
Scopus Crossref