Preferred Language
Articles
/
pBf1CpIBVTCNdQwCLJ2q
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a new RNA encoding method and ResNet50 Model, where the encoding is done by splitting the training records into different groups. These groups are protocol, service, flag, and digit, and each group is represented by the number of RNA characters that can represent the group's values. The RNA encoding phase converts network traffic records into RNA sequences, allowing for a comprehensive representation of the dataset. The detection model, utilizing the ResNet architecture, effectively tackles training challenges and achieves high detection rates for different attack types. The KDD-Cup99 Dataset is used for both training and testing. The testing dataset includes new attacks that do not appear in the training dataset, which means the system can detect new attacks in the future. The efficiency of the suggested anomaly intrusion detection system is done by calculating the detection rate (DR), false alarm rate (FAR), and accuracy. The achieved DR, FAR, and accuracy are equal to 96.24%, 6.133%, and 95.99%. The experimental results exhibit that the RNA encoding method can improve intrusion detection.

Scopus Crossref
View Publication
Publication Date
Tue Mar 30 2021
Journal Name
Baghdad Science Journal
Delivery Route Management based on Dijkstra Algorithm
...Show More Authors

For businesses that provide delivery services, the efficiency of the delivery process in terms of punctuality is very important. In addition to increasing customer trust, efficient route management, and selection are required to reduce vehicle fuel costs and expedite delivery. Some small and medium businesses still use conventional methods to manage delivery routes. Decisions to manage delivery schedules and routes do not use any specific methods to expedite the delivery settlement process. This process is inefficient, takes a long time, increases costs and is prone to errors. Therefore, the Dijkstra algorithm has been used to improve the delivery management process. A delivery management system was developed to help managers and drivers

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Clarivate Crossref
Publication Date
Thu Aug 01 2019
Journal Name
International Journal Of Machine Learning And Computing
Emotion Recognition System Based on Hybrid Techniques
...Show More Authors

Emotion recognition has important applications in human-computer interaction. Various sources such as facial expressions and speech have been considered for interpreting human emotions. The aim of this paper is to develop an emotion recognition system from facial expressions and speech using a hybrid of machine-learning algorithms in order to enhance the overall performance of human computer communication. For facial emotion recognition, a deep convolutional neural network is used for feature extraction and classification, whereas for speech emotion recognition, the zero-crossing rate, mean, standard deviation and mel frequency cepstral coefficient features are extracted. The extracted features are then fed to a random forest classifier. In

... Show More
View Publication Preview PDF
Scopus (15)
Crossref (12)
Scopus Crossref
Publication Date
Sat Aug 03 2024
Journal Name
Proceedings Of Ninth International Congress On Information And Communication Technology
Offline Signature Verification Based on Neural Network
...Show More Authors

The investigation of signature validation is crucial to the field of personal authenticity. The biometrics-based system has been developed to support some information security features.Aperson’s signature, an essential biometric trait of a human being, can be used to verify their identification. In this study, a mechanism for automatically verifying signatures has been suggested. The offline properties of handwritten signatures are highlighted in this study which aims to verify the authenticity of handwritten signatures whether they are real or forged using computer-based machine learning techniques. The main goal of developing such systems is to verify people through the validity of their signatures. In this research, images of a group o

... Show More
Publication Date
Fri Sep 22 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Design Active Filter Based on Genetic Algorithm
...Show More Authors

The  lossy-FDNR  based  aclive  fil ter has an  important   property among  many  design  realizations. 'This includes  a significant reduction in component count particularly in the number  of OP-AMP which consumes   power.  However  the·  problem  of  this   type  is the  large component spreads  which affect the fdter performance.

In  this  paper   Genetic   Algorithm   is  applied   to  minimize   the component  spread   (capacitance  and  resistance  p,read). The minimization of these spreads allow the fil

... Show More
View Publication Preview PDF
Publication Date
Sat Jun 01 2024
Journal Name
Journal Of Engineering
Intelligent Dust Monitoring System Based on IoT
...Show More Authors

Dust is a frequent contributor to health risks and changes in the climate, one of the most dangerous issues facing people today. Desertification, drought, agricultural practices, and sand and dust storms from neighboring regions bring on this issue. Deep learning (DL) long short-term memory (LSTM) based regression was a proposed solution to increase the forecasting accuracy of dust and monitoring. The proposed system has two parts to detect and monitor the dust; at the first step, the LSTM and dense layers are used to build a system using to detect the dust, while at the second step, the proposed Wireless Sensor Networks (WSN) and Internet of Things (IoT) model is used as a forecasting and monitoring model. The experiment DL system

... Show More
View Publication
Crossref
Publication Date
Sat Jul 08 2017
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
A Highly Sensitive Kinetic-Spectrophotometric Method for the Assay of Carbamazepine in Pure and Commercial Tablet
...Show More Authors

The study aimed to recommend a new spectrophotometric-kinetic method for determination of carbamazepine (CABZ) in its pure form and pharmaceutical forms. The proposed procedure based on the coupling of CABZ with diazotized sulfanilic acid in basic medium to yield a colored azo dye. Factors affecting the reaction yield were studied and the conditions were optimized. The colored product was followed spectrophotometrically via monitoring its absorbance at 396 nm. Under the optimized conditions, two method (the initial rate and fixed time (10 minute)) were applied for constructing the calibration graphs. The graphs were linear in concentration ranges 2.0 to 18.0 µg.mL-1 for both methods. The proposed was applied successfully in

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Dec 31 2015
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Electrolytic removal of zinc from simulated chloride wastewaters using a novel flow-by fixed bed electrochemical reactor
...Show More Authors

The cathodic deposition of zinc from simulated chloride wastewater was used to characterize the mass transport properties of a flow-by fixed bed electrochemical reactor composed of vertical stack  of stainless steel nets, operated in batch-recycle mode. The electrochemical reactor employed potential value in such a way that the zinc reduction occurred under mass transport control. This potential was determined by hydrodynamic voltammetry using a borate/chloride solution as supporting electrolyte on stainless steel rotating disc electrode. The results indicate that mass transfer coefficient (Km) increases with increasing of flow rate (Q) where .The electrochemical reactor proved to be efficient in removing zinc and was abl

... Show More
View Publication Preview PDF
Publication Date
Sat Jun 19 2021
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Serum Chitotriosidase level as a Novel Biomarker for Therapeutic Monitoring of Nephropathic Cystinosis among the Iraqi children
...Show More Authors

Background: Cystinosis is a rare autosomal recessive lysosomal storage disease with high morbidity and mortality. It is caused by mutations in the CTNS gene that encodes the cystine transporter, cystinosin, which leads to lysosomal cystine accumulation. It is the major cause of inherited Fanconi syndrome, and should be suspected in young children with failure to thrive and signs of renal proximal tubular damage. The diagnosis can be missed in infants, because not all signs of renal Fanconi syndrome are present during the first months of life. Elevated white blood cell cystine content is the cornerstone of the diagnosis. Since chitotriosidase (CHIT1 or chitinase-1) is mainly produced by activated macrophages both in normal and inflammator

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Mon May 01 2017
Journal Name
Desalination And Water Treatment
Cadmium removal from simulated chloride wastewater using a novel flow-by fixed bed electrochemical reactor: Taguchi approach
...Show More Authors

View Publication
Scopus (10)
Crossref (7)
Scopus Clarivate Crossref
Publication Date
Tue Jun 01 2021
Journal Name
Journal Of The College Of Languages (jcl)
The Construction of a National Identification in the Novel of N. Scott Momaday House Made of Dawn
...Show More Authors

The United States government allowed Native Americans to abandon their reservations in the 1950s and 1960s. The historical, social, and cultural backgrounds shaped the forms and themes of works by American Indian writers who urged people to refuse their culture's sense of shame. Moreover, their behavior corresponded with the restoration of individuals to their rituals after disappointment, loss of sense of life, and mental illness performed from the influence of mainstream American society. Among these writers, N. Scott Momaday and Leslie Marmon Silko participate in similar interest in portraying characters caught between indigenous beliefs and white mainstream standards.  

      The construction of

... Show More
View Publication Preview PDF
Crossref