Preferred Language
Articles
/
pBf1CpIBVTCNdQwCLJ2q
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a new RNA encoding method and ResNet50 Model, where the encoding is done by splitting the training records into different groups. These groups are protocol, service, flag, and digit, and each group is represented by the number of RNA characters that can represent the group's values. The RNA encoding phase converts network traffic records into RNA sequences, allowing for a comprehensive representation of the dataset. The detection model, utilizing the ResNet architecture, effectively tackles training challenges and achieves high detection rates for different attack types. The KDD-Cup99 Dataset is used for both training and testing. The testing dataset includes new attacks that do not appear in the training dataset, which means the system can detect new attacks in the future. The efficiency of the suggested anomaly intrusion detection system is done by calculating the detection rate (DR), false alarm rate (FAR), and accuracy. The achieved DR, FAR, and accuracy are equal to 96.24%, 6.133%, and 95.99%. The experimental results exhibit that the RNA encoding method can improve intrusion detection.

Scopus Crossref
View Publication
Publication Date
Sat Jul 09 2022
Journal Name
Wireless Communications And Mobile Computing
An Optimized Approach for Industrial IoT Based on Edge Computing
...Show More Authors

The Internet of Things (IoT) is an information network that connects gadgets and sensors to allow new autonomous tasks. The Industrial Internet of Things (IIoT) refers to the integration of IoT with industrial applications. Some vital infrastructures, such as water delivery networks, use IIoT. The scattered topology of IIoT and resource limits of edge computing provide new difficulties to traditional data storage, transport, and security protection with the rapid expansion of the IIoT. In this paper, a recovery mechanism to recover the edge network failure is proposed by considering repair cost and computational demands. The NP-hard problem was divided into interdependent major and minor problems that could be solved in polynomial t

... Show More
View Publication
Scopus (4)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Mon Mar 01 2021
Journal Name
Iop Conference Series: Materials Science And Engineering
An efficient multistage CBIR based on Squared Krawtchouk-Tchebichef polynomials
...Show More Authors
Abstract<p>Image databases are increasing exponentially because of rapid developments in social networking and digital technologies. To search these databases, an efficient search technique is required. CBIR is considered one of these techniques. This paper presents a multistage CBIR to address the computational cost issues while reasonably preserving accuracy. In the presented work, the first stage acts as a filter that passes images to the next stage based on SKTP, which is the first time used in the CBIR domain. While in the second stage, LBP and Canny edge detectors are employed for extracting texture and shape features from the query image and images in the newly constructed database. The p</p> ... Show More
View Publication
Crossref (4)
Crossref
Publication Date
Wed Apr 20 2022
Journal Name
Periodicals Of Engineering And Natural Sciences (pen)
Text image secret sharing with hiding based on color feature
...Show More Authors

View Publication
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Sun Apr 01 2018
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Information Hiding using LSB Technique based on Developed PSO Algorithm
...Show More Authors

<p>Generally, The sending process of secret information via the transmission channel or any carrier medium is not secured. For this reason, the techniques of information hiding are needed. Therefore, steganography must take place before transmission. To embed a secret message at optimal positions of the cover image under spatial domain, using the developed particle swarm optimization algorithm (Dev.-PSO) to do that purpose in this paper based on Least Significant Bits (LSB) using LSB substitution. The main aim of (Dev. -PSO) algorithm is determining an optimal paths to reach a required goals in the specified search space based on disposal of them, using (Dev.-PSO) algorithm produces the paths of a required goals with most effi

... Show More
View Publication
Scopus (19)
Crossref (5)
Scopus Crossref
Publication Date
Mon Aug 01 2022
Journal Name
Mathematics
Face Recognition Algorithm Based on Fast Computation of Orthogonal Moments
...Show More Authors

Face recognition is required in various applications, and major progress has been witnessed in this area. Many face recognition algorithms have been proposed thus far; however, achieving high recognition accuracy and low execution time remains a challenge. In this work, a new scheme for face recognition is presented using hybrid orthogonal polynomials to extract features. The embedded image kernel technique is used to decrease the complexity of feature extraction, then a support vector machine is adopted to classify these features. Moreover, a fast-overlapping block processing algorithm for feature extraction is used to reduce the computation time. Extensive evaluation of the proposed method was carried out on two different face ima

... Show More
View Publication
Scopus (34)
Crossref (29)
Scopus Clarivate Crossref
Publication Date
Tue Jan 08 2019
Journal Name
Iraqi Journal Of Physics
Detection and interpretation of clouds types using visible and infrared satellite images
...Show More Authors

One of the most Interesting natural phenomena is clouds that have a very strong effect on the climate, weather and the earth's energy balance. Also clouds consider the key regulator for the average temperature of the plant. In this research monitoring and studying the cloud cover to know the clouds types and whether they are rainy or not rainy using visible and infrared satellite images. In order to interpret and know the types of the clouds visually without using any techniques, by comparing between the brightness and the shape of clouds in the same area for both the visible and infrared satellite images, where the differences in the contrasts of visible image are the albedo differences, while in the infrared images is the temperature d

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jun 01 2014
Journal Name
Baghdad Science Journal
The Effect of Annealing on The Structural and Optical Properties of Copper Oxide Thin Films Prepared by SILAR Method
...Show More Authors

Copper oxide thin films were deposited on glass substrate using Successive Ionic Layer Adsorption and Reaction (SILAR) method at room temperature. The thickness of the thin films was around 0.43?m.Copper oxide thin films were annealed in air at (200, 300 and 400°C for 45min.The film structure properties were characterized by x-ray diffraction (XRD). XRD patterns indicated the presence of polycrystalline CuO. The average grain size is calculated from the X-rays pattern, it is found that the grain size increased with increasing annealing temperature. Optical transmitter microscope (OTM) and atomic force microscope (AFM) was also used. Direct band gap values of 2.2 eV for an annealed sample and (2, 1.5, 1.4) eV at 200, 300,400oC respect

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Mon Mar 12 2018
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
The Effect of Crystallization Time and Acid Type on the Synthesis of Nano-Gamma Alumina Using Double Hydrothermal Method
...Show More Authors

Double hydrothermal method was used to prepare nano gamma alumina   using aluminum nitrate nano hydrate and sodium aluminate as an aluminum source, CTAB (cetyltrimethylammonium bromide) as surfactant, and variable acids: weak acids like; citric, and acitic acids, and strong acids like; hydrochloric and nitric acids as a bridge between aluminum salts and surfactant. Different crystallization times  12, 24, 48, and 72 hrs were applied. All the batches were prepared at pH equals to 9. XRD diffraction technique was used to investigate the crystalline nano gamma alumina pure from surfactant. N2 adsorption-desorption (BET) was used to measure the surface area and pore volume of the prepared nano alumina, the average p

... Show More
View Publication Preview PDF
Publication Date
Fri Dec 01 2017
Journal Name
Journal Of Economics And Administrative Sciences
A Comparison between Methods of Laplace Estimators and the Robust Huber for Estimate parameters logistic regression model
...Show More Authors

The logistic regression model regarded as the important regression Models ,where of the most interesting subjects in recent studies due to taking character more advanced in the process of statistical analysis .                                                

The ordinary estimating methods is failed in dealing with data that consist of the presence of outlier values and hence on the absence of such that have undesirable effect on the result.    &nbs

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Dec 24 2024
Journal Name
Malaysian Journal Of Mathematical Sciences
Exploring the Role of Hunting Cooperation, and Fear in a Prey-Predator Model with Two Age Stages
...Show More Authors

The aim of this study is to utilize the behavior of a mathematical model consisting of three-species with Lotka Volterra functional response with incorporating of fear and hunting cooperation factors with both juvenile and adult predators. The existence of equilibrium points of the system was discussed the conditions with variables. The behavior of model referred by local stability in nearness of any an equilibrium point and the conditions for the method of approximating the solution has been studied locally. We define a suitable Lyapunov function that covers every element of the nonlinear system and illustrate that it works. The effect of the death factor was observed in some periods, leading to non-stability. To confirm the theore

... Show More
View Publication
Scopus Clarivate Crossref