Preferred Language
Articles
/
joe-2223
Development an Anomaly Network Intrusion Detection System Using Neural Network
...Show More Authors

Most intrusion detection systems are signature based that work similar to anti-virus but they are unable to detect the zero-day attacks. The importance of the anomaly based IDS has raised because of its ability to deal with the unknown attacks. However smart attacks are appeared to compromise the detection ability of the anomaly based IDS. By considering these weak points the proposed
system is developed to overcome them. The proposed system is a development to the well-known payload anomaly detector (PAYL). By
combining two stages with the PAYL detector, it gives good detection ability and acceptable ratio of false positive. The proposed system improve the models recognition ability in the PAYL detector, for a filtered unencrypted HTTP subset traffic of DARPA 1999 data set, from 55.234% in the PAYL system alone to 99.94% in the proposed system; due to the existence of the neural network self-organizing map (SOM). In addition SOM decreases the ratio of false positive from 44.676% in the PAYL system alone to 5.176% in the proposed system. The proposed system provides 80% detection ability of smart worms that are meant to invade the PAYL detector in the PAYL system alone, due to the existence of the randomization stage in the proposed system.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue May 01 2018
Journal Name
Journal Of Engineering
Design of an Optimal Integral Backstepping Controller for a Quadcopter
...Show More Authors

In this paper, an Integral Backstepping Controller (IBC) is designed and optimized for full control, of rotational and translational dynamics, of an unmanned Quadcopter (QC). Before designing the controller, a mathematical model for the QC is developed in a form appropriate for the IBC design. Due to the underactuated property of the QC, it is possible to control the QC Cartesian positions (X, Y, and Z) and the yaw angle through ordering the desired values for them. As for the pitch and roll angles, they are generated by the position controllers. Backstepping Controller (BC) is a practical nonlinear control scheme based on Lyapunov design approach, which can, therefore, guarantee the convergence of the position tracking

... Show More
View Publication Preview PDF
Crossref (9)
Crossref
Publication Date
Fri Apr 01 2022
Journal Name
Baghdad Science Journal
An Evolutionary Algorithm for Solving Academic Courses Timetable Scheduling Problem
...Show More Authors

Scheduling Timetables for courses in the big departments in the universities is a very hard problem and is often be solved by many previous works although results are partially optimal. This work implements the principle of an evolutionary algorithm by using genetic theories to solve the timetabling problem to get a random and full optimal timetable with the ability to generate a multi-solution timetable for each stage in the collage. The major idea is to generate course timetables automatically while discovering the area of constraints to get an optimal and flexible schedule with no redundancy through the change of a viable course timetable. The main contribution in this work is indicated by increasing the flexibility of generating opti

... Show More
View Publication Preview PDF
Scopus (18)
Crossref (8)
Scopus Clarivate Crossref
Publication Date
Sat Jul 09 2022
Journal Name
Wireless Communications And Mobile Computing
An Optimized Approach for Industrial IoT Based on Edge Computing
...Show More Authors

The Internet of Things (IoT) is an information network that connects gadgets and sensors to allow new autonomous tasks. The Industrial Internet of Things (IIoT) refers to the integration of IoT with industrial applications. Some vital infrastructures, such as water delivery networks, use IIoT. The scattered topology of IIoT and resource limits of edge computing provide new difficulties to traditional data storage, transport, and security protection with the rapid expansion of the IIoT. In this paper, a recovery mechanism to recover the edge network failure is proposed by considering repair cost and computational demands. The NP-hard problem was divided into interdependent major and minor problems that could be solved in polynomial t

... Show More
View Publication
Scopus (4)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Fri Apr 01 2016
Journal Name
Nurse Education Today
Diabetes knowledge of nurses in different countries: An integrative review
...Show More Authors

View Publication
Scopus (48)
Crossref (46)
Scopus Clarivate Crossref
Publication Date
Mon Jan 13 2020
Journal Name
International Journal Of Productivity And Performance Management
An examination of talent management processes in Australian higher education
...Show More Authors
Purpose

The purpose of this paper is to understand the best processes that are currently used in managing talent in Australian higher education (HE) and to examine the policies in terms of talent management processes (TMPs) that are derived from objective one. Pragmatic benefits for academic institutions focused on enhancing talent.

Design/methodology/approach

This study selects the mixed method as its research design. In the qualitative study, there were three methods: brainstorming, focus group and individual interviews, followed by the quantitative questionnaire

... Show More
View Publication
Scopus (25)
Crossref (20)
Scopus Clarivate Crossref
Publication Date
Fri Jul 01 2016
Journal Name
Journal Of Economics And Administrative Sciences
The strengthening of strategic intelligence through an applied effective reality survey of strategic information systems An applied research in mobile companies in the Kurdistan Region
...Show More Authors

Abstract

Purpose: The research attempts to Stand on the reality of the effective application of of strategic information systems in telecommunications companies in the Kurdistan Region, and what is the amount of the impact of such systems on promoting of Strategic Intelligence.

Design/Methodology/Approach: The Applied method has been used, In order to achieve the objectives of the research has been the development of a questionnaire prepared for this purpose and then distributed to (11) Company of Iraqi communications operating in Kurdistan Region companies, it has been used questionnaire to collect data in order to develop

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Jan 27 2026
Journal Name
Journal Of Baghdad College Of Dentistry
An Evaluation of Antimicrobial Efficacy of Steralium, co+steralium, and 5% Sodium Hypochlorite against Enterococcus Faecalis Biofilm Formed on Tooth Substrate: (An in Vitro Study)
...Show More Authors

Background: Enterococcus faecalis is emerging as an important endodontic pathogen, which can persist in the environment for extended periods after treatment and may cause endodontic failure. It is known to produce biofilms, a community of bacteria enclosed within a protective polymeric matrix. This study aimed to establish whether the biofilm formation by Enterococcus faecalis can be inhibited with steralium, co+steralium, and 5% sodium hypochlorite in the root surface environment. Materials and Methods: Extracted human teeth were biomechanically prepared, vertically sectioned, placed in the tissue culture wells exposing the root canal surface to E. faecalis to form a biofilm. At the end of the 3rd and 6th weeks, all groups were treated fo

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jul 27 2022
Journal Name
International Journal Of Health Sciences
Detection of coxsackie virus B and measurement level of Tumor necrosis factor alpha in patients suffered in T1DM with coxsackie virus infection
...Show More Authors

Objective. Infection with Coxsackie virus. This virus that damages pancreatic cells, has long been linked to the onset of insulin-dependent diabetic mellitus (IDDM). Pro-inflammatory cytokines can be produced as a result of this illness. Tumor necrosis factor-a is one of these pro-inflammatory cytokines. Materials and Methods. Blood sample were collected from 180 Iraqi participants. Ninety of them is type 1 diabetic patients and other 90 is healthy control .both groups were tested for the incidence of Coxsackie virus B IgG. So the patients groups is divided to two groups according to sero positivity of CVB-IgG .all 180 patients tested to measure of level of TNF-α. Results. The Results showed increasing in levels of TNF-α in CBV po

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon May 01 2023
Journal Name
3 Biotech
Detection of orthodontically induced inflammatory root resorption-associated biomarkers from the gingival crevicular fluid by proteomics analysis: a randomized-controlled clinical trial
...Show More Authors

View Publication
Crossref (3)
Crossref
Publication Date
Wed Apr 01 2020
Journal Name
Translational Andrology And Urology
Robotic-assisted magnetic resonance imaging ultrasound fusion results in higher significant cancer detection compared to cognitive prostate targeting in biopsy naive men
...Show More Authors

View Publication
Scopus (15)
Crossref (15)
Scopus Clarivate Crossref