Preferred Language
Articles
/
pxZOn4oBVTCNdQwCeaE9
A proposal to detect computer worms (malicious codes) using data mining classification algorithms
...Show More Authors

Malicious software (malware) performs a malicious function that compromising a computer system’s security. Many methods have been developed to improve the security of the computer system resources, among them the use of firewall, encryption, and Intrusion Detection System (IDS). IDS can detect newly unrecognized attack attempt and raising an early alarm to inform the system about this suspicious intrusion attempt. This paper proposed a hybrid IDS for detection intrusion, especially malware, with considering network packet and host features. The hybrid IDS designed using Data Mining (DM) classification methods that for its ability to detect new, previously unseen intrusions accurately and automatically. It uses both anomaly and misuse detection techniques using two DM classifiers (Interactive Dichotomizer 3 (ID3) classifier and Naïve Bayesian (NB) Classifier) to verify the validity of the proposed system in term of accuracy rate. A proposed HybD dataset used in training and testing the hybrid IDS. Feature selection is used to consider the intrinsic features in classification decision, this accomplished by using three different measures: Association rules (AR) method, ReliefF measure, and Gain Ratio (GR) measure. NB classifier with AR method given the most accurate classification results (99%) with false positive (FP) rate (0%) and false negative (FN) rate (1%).

Publication Date
Sun Apr 01 2018
Journal Name
Journal Of Engineering And Applied Sciences
New Data Security Method Based on Biometrics
...Show More Authors

Merging biometrics with cryptography has become more familiar and a great scientific field was born for researchers. Biometrics adds distinctive property to the security systems, due biometrics is unique and individual features for every person. In this study, a new method is presented for ciphering data based on fingerprint features. This research is done by addressing plaintext message based on positions of extracted minutiae from fingerprint into a generated random text file regardless the size of data. The proposed method can be explained in three scenarios. In the first scenario the message was used inside random text directly at positions of minutiae in the second scenario the message was encrypted with a choosen word before ciphering

... Show More
Publication Date
Mon Oct 01 2018
Journal Name
International Journal Of Electrical And Computer Engineering
Load balance in data center SDN networks
...Show More Authors

In the last two decades, networks had been changed according to the rapid changing in its requirements. The current Data Center Networks have large number of hosts (tens or thousands) with special needs of bandwidth as the cloud network and the multimedia content computing is increased. The conventional Data Center Networks (DCNs) are highlighted by the increased number of users and bandwidth requirements which in turn have many implementation limitations. The current networking devices with its control and forwarding planes coupling result in network architectures are not suitable for dynamic computing and storage needs. Software Defined networking (SDN) is introduced to change this notion of traditional networks by decoupling control and

... Show More
Publication Date
Sun Jan 01 2023
Journal Name
2nd International Conference On Mathematical Techniques And Applications: Icmta2021
Review of clustering for gene expression data
...Show More Authors

View Publication
Crossref (2)
Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Journal Of Southwest Jiaotong University
IMPROVED STRUCTURE OF DATA ENCRYPTION STANDARD ALGORITHM
...Show More Authors

The Internet is providing vital communications between millions of individuals. It is also more and more utilized as one of the commerce tools; thus, security is of high importance for securing communications and protecting vital information. Cryptography algorithms are essential in the field of security. Brute force attacks are the major Data Encryption Standard attacks. This is the main reason that warranted the need to use the improved structure of the Data Encryption Standard algorithm. This paper proposes a new, improved structure for Data Encryption Standard to make it secure and immune to attacks. The improved structure of Data Encryption Standard was accomplished using standard Data Encryption Standard with a new way of two key gene

... Show More
Publication Date
Thu Nov 30 2023
Journal Name
Iraqi Geological Journal
Multiple and Coherent Noise Removal from X-Profile 2D Seismic Data of Southern Iraq Using Normal Move Out-Frequency Wavenumber Technique
...Show More Authors

Multiple eliminations (de-multiple) are one of seismic processing steps to remove their effects and delineate the correct primary refractors. Using normal move out to flatten primaries is the way to eliminate multiples through transforming these data to frequency-wavenumber domain. The flatten primaries are aligned with zero axis of the frequency-wavenumber domain and any other reflection types (multiples and random noise) are distributed elsewhere. Dip-filter is applied to pass the aligned data and reject others will separate primaries from multiple after transforming the data back from frequency-wavenumber domain to time-distance domain. For that, a suggested name for this technique as normal move out- frequency-wavenumber domain

... Show More
View Publication
Scopus (1)
Scopus Crossref
Publication Date
Fri Sep 17 2021
Journal Name
Journal Of Petroleum Exploration And Production Technology
Characterization of flow units, rock and pore types for Mishrif Reservoir in West Qurna oilfield, Southern Iraq by using lithofacies data
...Show More Authors
Abstract<p>This study has been accomplished by testing three different models to determine rocks type, pore throat radius, and flow units for Mishrif Formation in West Qurna oilfield in Southern Iraq based on Mishrif full diameter cores from 20 wells. The three models that were used in this study were Lucia rocks type classification, Winland plot was utilized to determine the pore throat radius depending on the mercury injection test (r35), and (FZI) concepts to identify flow units which enabled us to recognize the differences between Mishrif units in these three categories. The study of pore characteristics is very significant in reservoir evaluation. It controls the storage mechanism and reservoir fluid prope</p> ... Show More
View Publication
Scopus (21)
Crossref (20)
Scopus Clarivate Crossref
Publication Date
Tue Jun 30 2015
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Using Microbubbles to Improve Transmission Oil in Pipes
...Show More Authors

Drag reduction (DR) techniques are used to improve the flow by spare the flow energy. The applications of DR are conduits in oil pipelines, oil well operations and flood water disposal, many techniques for drag reduction are used. One of these techniques is microbubbles.  In this work, reduce of drag percent occurs by using a small bubbles of air pumped in the fluid transported. Gasoil is used as liquid transporting in the pipelines and air pumped as microbubbles. This study shows that the maximum value of drag reduction is 25.11%.

View Publication Preview PDF
Publication Date
Tue Dec 31 2019
Journal Name
Journal Of Economics And Administrative Sciences
A Try to combine more than approaches and competitive strategies to achieve a sustainable competitive advantage.
...Show More Authors

The objective of this research paper is two-fold. The first is a precise reading of the theoretical underpinnings of each of the strategic approaches: "Market approach" for (M. Porter), and the alternative resource-based approach (R B V), advocates for the idea that the two approaches are complementary. Secondly, we will discuss the possibility of combining the two competitive strategies: cost leadership and differentiation. Finally, we propose a consensual approach that we call "dual domination". 

View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Wed Jan 01 2014
Journal Name
Journal Of The College Of Languages (jcl)
The Influence of Manipulating the Virtual Library in Comparison with the Individual Learning via Computer Use in English Language
...Show More Authors

The study aims at investigating the effectiveness of the Virtual Library Technology, in developing the achievement of the English Language Skills in the Center of Development and Continuous Education, in comparison with the individual learning via personal computer to investigate the students' attitude towards the use of both approaches. The population of the study includes the participants in the English Language course arranged in the Center. The sample includes 60 students who were randomly chosen from the whole population (participants in English Courses for the year 2009-2010). The sample is randomly chosen and divided into two experimental groups. The first group has learned through classroom technology; while the other group has l

... Show More
View Publication Preview PDF
Publication Date
Tue Oct 25 2022
Journal Name
Minar Congress 6
HANDWRITTEN DIGITS CLASSIFICATION BASED ON DISCRETE WAVELET TRANSFORM AND SPIKE NEURAL NETWORK
...Show More Authors

In this paper, a handwritten digit classification system is proposed based on the Discrete Wavelet Transform and Spike Neural Network. The system consists of three stages. The first stage is for preprocessing the data and the second stage is for feature extraction, which is based on Discrete Wavelet Transform (DWT). The third stage is for classification and is based on a Spiking Neural Network (SNN). To evaluate the system, two standard databases are used: the MADBase database and the MNIST database. The proposed system achieved a high classification accuracy rate with 99.1% for the MADBase database and 99.9% for the MNIST database

View Publication Preview PDF