Botnet is a malicious activity that tries to disrupt traffic of service in a server or network and causes great harm to the network. In modern years, Botnets became one of the threads that constantly evolving. IDS (intrusion detection system) is one type of solutions used to detect anomalies of networks and played an increasing role in the computer security and information systems. It follows different events in computer to decide to occur an intrusion or not, and it used to build a strategic decision for security purposes. The current paper
Information security in data storage and transmission is increasingly important. On the other hand, images are used in many procedures. Therefore, preventing unauthorized access to image data is crucial by encrypting images to protect sensitive data or privacy. The methods and algorithms for masking or encoding images vary from simple spatial-domain methods to frequency-domain methods, which are the most complex and reliable. In this paper, a new cryptographic system based on the random key generator hybridization methodology by taking advantage of the properties of Discrete Cosine Transform (DCT) to generate an indefinite set of random keys and taking advantage of the low-frequency region coefficients after the DCT stage to pass them to
... Show MoreThe current study aims to test the impact of green training and development on sustainable performance and explore its effects within and outside the Iraqi Ministry of Environment. The main research problem revolves around the question of the extent of implementing green training and development and sustainable performance in the ministry (What is the nature of the relationship between green training and development and sustainable performance in the ministry?). To clarify the relationship between the research variables, two main hypotheses were formulated along with sub-hypotheses. The study also aims to assess the level of the ministry's interest in the research variables and provide key recommendations to enhance sustainable performan
... Show MoreSince there is no market for bond issuance by companies in the Iraqi market and the difficulty of borrowing, companies must resort to proprietary financing to finance their investments. However, in the framework of the literature of financial management, the type of financing used by the company sends signals to investors and therefore reflected on the market value. Therefore, the problem of the study revolves around the variables of the study (Equity financing within the framework the signal theory, price of common stock in the Iraqi market).
The study aims to verify the impact of the capital increase through the issuance of new stock on the price of
... Show MoreIn this paper, RBF-based multistage auto-encoders are used to detect IDS attacks. RBF has numerous applications in various actual life settings. The planned technique involves a two-part multistage auto-encoder and RBF. The multistage auto-encoder is applied to select top and sensitive features from input data. The selected features from the multistage auto-encoder is wired as input to the RBF and the RBF is trained to categorize the input data into two labels: attack or no attack. The experiment was realized using MATLAB2018 on a dataset comprising 175,341 case, each of which involves 42 features and is authenticated using 82,332 case. The developed approach here has been applied for the first time, to the knowledge of the authors, to dete
... Show MoreMost recent studies have focused on using modern intelligent techniques spatially, such as those
developed in the Intruder Detection Module (IDS). Such techniques have been built based on modern
artificial intelligence-based modules. Those modules act like a human brain. Thus, they should have had the
ability to learn and recognize what they had learned. The importance of developing such systems came after
the requests of customers and establishments to preserve their properties and avoid intruders’ damage. This
would be provided by an intelligent module that ensures the correct alarm. Thus, an interior visual intruder
detection module depending on Multi-Connect Architecture Associative Memory (MCA)
This paper presents a hybrid energy resources (HER) system consisting of solar PV, storage, and utility grid. It is a challenge in real time to extract maximum power point (MPP) from the PV solar under variations of the irradiance strength. This work addresses challenges in identifying global MPP, dynamic algorithm behavior, tracking speed, adaptability to changing conditions, and accuracy. Shallow Neural Networks using the deep learning NARMA-L2 controller have been proposed. It is modeled to predict the reference voltage under different irradiance. The dynamic PV solar and nonlinearity have been trained to track the maximum power drawn from the PV solar systems in real time.
Moreover, the proposed controller i
... Show MoreThe theme of this Study presents analysis and discuss to the "Share the framework for assessing inflation," a practical study in a sample of joint stock companies listed on the Iraq Stock Exchange for the years (2009-2013). To determine the extent of the disparity between the nominal value of shares (Nominal Value) before deducting inflation and the real value (Real Value) per share, after deducting inflation in the case of zero growth. The study relied on annual reports of the companies of the research sample of the Iraq Stock Exchange, as well as the Iraqi Securities Commission. Besides the annual reports issued by the Ministry of Planning, as well as annual reports and statistical bulletin issued by the Central Bank of Iraq. It is fra
... Show MoreAlzheimer's disease (AD) increasingly affects the elderly and is a major killer of those 65 and over. Different deep-learning methods are used for automatic diagnosis, yet they have some limitations. Deep Learning is one of the modern methods that were used to detect and classify a medical image because of the ability of deep Learning to extract the features of images automatically. However, there are still limitations to using deep learning to accurately classify medical images because extracting the fine edges of medical images is sometimes considered difficult, and some distortion in the images. Therefore, this research aims to develop A Computer-Aided Brain Diagnosis (CABD) system that can tell if a brain scan exhibits indications of
... Show More