Preferred Language
Articles
/
joe-2223
Development an Anomaly Network Intrusion Detection System Using Neural Network
...Show More Authors

Most intrusion detection systems are signature based that work similar to anti-virus but they are unable to detect the zero-day attacks. The importance of the anomaly based IDS has raised because of its ability to deal with the unknown attacks. However smart attacks are appeared to compromise the detection ability of the anomaly based IDS. By considering these weak points the proposed
system is developed to overcome them. The proposed system is a development to the well-known payload anomaly detector (PAYL). By
combining two stages with the PAYL detector, it gives good detection ability and acceptable ratio of false positive. The proposed system improve the models recognition ability in the PAYL detector, for a filtered unencrypted HTTP subset traffic of DARPA 1999 data set, from 55.234% in the PAYL system alone to 99.94% in the proposed system; due to the existence of the neural network self-organizing map (SOM). In addition SOM decreases the ratio of false positive from 44.676% in the PAYL system alone to 5.176% in the proposed system. The proposed system provides 80% detection ability of smart worms that are meant to invade the PAYL detector in the PAYL system alone, due to the existence of the randomization stage in the proposed system.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Dec 20 2021
Journal Name
Baghdad Science Journal
Generative Adversarial Network for Imitation Learning from Single Demonstration
...Show More Authors

Imitation learning is an effective method for training an autonomous agent to accomplish a task by imitating expert behaviors in their demonstrations. However, traditional imitation learning methods require a large number of expert demonstrations in order to learn a complex behavior. Such a disadvantage has limited the potential of imitation learning in complex tasks where the expert demonstrations are not sufficient. In order to address the problem, we propose a Generative Adversarial Network-based model which is designed to learn optimal policies using only a single demonstration. The proposed model is evaluated on two simulated tasks in comparison with other methods. The results show that our proposed model is capable of completing co

... Show More
View Publication Preview PDF
Scopus Clarivate Crossref
Publication Date
Thu Jan 30 2020
Journal Name
Journal Of Engineering
Design and Analysis WIMAX Network Based on Coverage Planning
...Show More Authors

In this paper, wireless network is planned; the network is predicated on the IEEE 802.16e standardization by WIMAX. The targets of this paper are coverage maximizing, service and low operational fees. WIMAX is planning through three approaches. In approach one; the WIMAX network coverage is major for extension of cell coverage, the best sites (with Band Width (BW) of 5MHz, 20MHZ per sector and four sectors per each cell). In approach two, Interference analysis in CNIR mode. In approach three of the planning, Quality of Services (QoS) is tested and evaluated. ATDI ICS software (Interference Cancellation System) using to perform styling. it shows results in planning area covered 90.49% of the Baghdad City and used 1000 mob

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Apr 01 2013
Journal Name
International Journal Of Electrical, Electronics And Telecommunication Engineering
Performance Analysis of xPON Network for Different Queuing Models
...Show More Authors

Passive optical network (PON) is a point to multipoint, bidirectional, high rate optical network for data communication. Different standards of PONs are being implemented, first of all PON was ATM PON (APON) which evolved in Broadband PON (BPON). The two major types are Ethernet PON (EPON) and Gigabit passive optical network (GPON). PON with these different standards is called xPON. To have an efficient performance for the last two standards of PON, some important issues will considered. In our work we will integrate a network with different queuing models such M/M/1 and M/M/m model. After analyzing IPACT as a DBA scheme for this integrated network, we modulate cycle time, traffic load, throughput, utilization and overall delay

... Show More
View Publication Preview PDF
Publication Date
Mon Feb 04 2019
Journal Name
Journal Of The College Of Education For Women
Classification of Rural Road Network in Al-Najaf Governorate
...Show More Authors

This study has dealt with, the issue of classification of rural road network , in addition to prepare a suggested for the classification for this network in Iraq , this classification account , the specifications and characteristics of rural roads, population, and the range taking of settlements , then this classification was applied on the rural road network in the Najaf province there are four categories of classification ,the first is major arterial rural roads divided into two major arterial and minor arterial roads , while the second category collected roads which was divided into minor arterial roads and main collected roads. The third category was represented by Local Roads , it has been divided into paved roads and unpaved, the f

... Show More
View Publication Preview PDF
Publication Date
Mon Jan 01 2024
Journal Name
Ieee Transactions On Emerging Topics In Computational Intelligence
Reservoir Network With Structural Plasticity for Human Activity Recognition
...Show More Authors

View Publication
Scopus (1)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Wed Feb 27 2019
Journal Name
Journal Of Nano Research
A Specific NH<sub>3</sub> Gas Sensor of a Thick MWCNTs-OH Network for Detection at Room Temperature
...Show More Authors

NH3 gas sensor was fabricated based on deposited of Functionalized Multi-Walled Carbon Nanotubes (MWCNTs-OH) suspension on filter paper substrates using suspension filtration method. The structural, morphological and optical properties of the MWCNTs film were characterized by XRD, AFM and FTIR techniques. XRD measurement confirmed that the structure of MWCNTs is not affected by the preparation method. The AFM images reflected highly ordered network in the form of a mat. The functional groups and types of bonding have appeared in the FTIR spectra. The fingerprint (C-C stretch) of MWCNTs appears in 1365 cm-1, and the backbone of CNTs observed at 1645 cm-1. A homemade sensi

... Show More
View Publication
Scopus (19)
Crossref (18)
Scopus Clarivate Crossref
Publication Date
Thu Mar 19 2015
Journal Name
Al-academy
Transformations in The Process of Mass Communication Using the International Network of Information (Internet): انتصار رسمي موسى
...Show More Authors

Summarized the idea of research is marked by "changes in the process of mass communication by using the international network of information" by specifying what data networking and mass communication is the transformation processes in the mass communication network where research aims to:1. Diagnostic data and transformations in the process of mass communication network.2. Provide a contact form commensurate with the characteristic mass of the International Network of electronic information, and research found to provide a communicative model called the (human contact network). In short (HCN) Humanity Communication Net also reached conclusions concerning the search process and communicative transformations and changes that have taken pla

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jan 01 2021
Journal Name
Review Of International Geographical Education
Evaluating the performance of project management using network diagrams methods: A case study in the Ramadi Municipality
...Show More Authors

This study came for the reason that some project administrations still do not follow the appropriate scientific methods that enable them to perform their work in a manner that achieves the goals for which those projects arise, in addition to exceeding the planned times and costs, so this study aims to apply the methods of network diagrams in Planning, scheduling and monitoring the project of constructing an Alzeuot intersection bridge in the city of Ramadi, as the research sample, being one of the strategic projects that are being implemented in the city of Ramadi, as well as being one of the projects that faced during its implementation Several of problems, the project problem was studied according to scientific methods through the applica

... Show More
Scopus (1)
Scopus
Publication Date
Sun Dec 06 2009
Journal Name
Baghdad Science Journal
Study of the Porosity of Certain pharmaceutical Tablets using Mercury Intrusion Porosimeter
...Show More Authors

Porosity and pore structure are important characteristics of pharmaceutical tablets, since they influence the physical properties, such as mechanical strength, density and disintegration time. This paper is an attempt to investigate the pore structure of four different paracetamol tablets based on mercury porosimetry. The intrusion volumes of mercury were used to calculate the pore diameter, pore volume and pore size distribution. The result obtained indicate that the variation of the pore volume in the tablets followed the sequence:- S.D.I. Iraq? Pharmacare,Dubai-U.A.E.? Bron and Burk(UK) London?Lark Laboratories(India), while the variation of surface area followed the sequence:- S.D.I. Iraq? Lark Laboratories(India)? Pharmacare,Dubai-U.A

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sat Jan 01 2022
Journal Name
Indonesian Journal Of Electrical Engineering And Computer Science
Construct an efficient distributed denial of service attack detection system based on data mining techniques
...Show More Authors

<span>Distributed denial-of-service (DDoS) attack is bluster to network security that purpose at exhausted the networks with malicious traffic. Although several techniques have been designed for DDoS attack detection, intrusion detection system (IDS) It has a great role in protecting the network system and has the ability to collect and analyze data from various network sources to discover any unauthorized access. The goal of IDS is to detect malicious traffic and defend the system against any fraudulent activity or illegal traffic. Therefore, IDS monitors outgoing and incoming network traffic. This paper contains a based intrusion detection system for DDoS attack, and has the ability to detect the attack intelligently, dynami

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (2)
Scopus Crossref