Preferred Language
Articles
/
pxZOn4oBVTCNdQwCeaE9
A proposal to detect computer worms (malicious codes) using data mining classification algorithms
...Show More Authors

Malicious software (malware) performs a malicious function that compromising a computer system’s security. Many methods have been developed to improve the security of the computer system resources, among them the use of firewall, encryption, and Intrusion Detection System (IDS). IDS can detect newly unrecognized attack attempt and raising an early alarm to inform the system about this suspicious intrusion attempt. This paper proposed a hybrid IDS for detection intrusion, especially malware, with considering network packet and host features. The hybrid IDS designed using Data Mining (DM) classification methods that for its ability to detect new, previously unseen intrusions accurately and automatically. It uses both anomaly and misuse detection techniques using two DM classifiers (Interactive Dichotomizer 3 (ID3) classifier and Naïve Bayesian (NB) Classifier) to verify the validity of the proposed system in term of accuracy rate. A proposed HybD dataset used in training and testing the hybrid IDS. Feature selection is used to consider the intrinsic features in classification decision, this accomplished by using three different measures: Association rules (AR) method, ReliefF measure, and Gain Ratio (GR) measure. NB classifier with AR method given the most accurate classification results (99%) with false positive (FP) rate (0%) and false negative (FN) rate (1%).

Publication Date
Wed Apr 01 2015
Journal Name
Al–bahith Al–a'alami
Methods of US propaganda in Iraq- A Study of Coalition Provisional Authority and US Army Data after 2003
...Show More Authors

with an organized propaganda campaign. This military campaign was helped to formulate its speech by many institutions, research centers, and knowledge and intelligence circles in order to mobilize public opinion gain supporters and face the opponents by different means depending on a variety of styles to achieve its required effects. 
          After the US occupation of Iraq, US media fighters sought to influence the Iraqi public opinion and making them convinced them of the important presence of US military forces in Iraq which necessitated finding its justification through the use of persuasive techniques in its intensive propaganda campaigns. 
  This research discusses the most important

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Oct 26 2022
Journal Name
Membranes
Classification of Nanomaterials and the Effect of Graphene Oxide (GO) and Recently Developed Nanoparticles on the Ultrafiltration Membrane and Their Applications: A Review
...Show More Authors

The emergence of mixed matrix membranes (MMMs) or nanocomposite membranes embedded with inorganic nanoparticles (NPs) has opened up a possibility for developing different polymeric membranes with improved physicochemical properties, mechanical properties and performance for resolving environmental and energy-effective water purification. This paper presents an overview of the effects of different hydrophilic nanomaterials, including mineral nanomaterials (e.g., silicon dioxide (SiO2) and zeolite), metals oxide (e.g., copper oxide (CuO), zirconium dioxide (ZrO2), zinc oxide (ZnO), antimony tin oxide (ATO), iron (III) oxide (Fe2O3) and tungsten oxide (WOX)), two-dimensional transition (e.g., MXene), metal–organic framework (MOFs), c

... Show More
View Publication
Scopus (57)
Crossref (48)
Scopus Clarivate Crossref
Publication Date
Sun Jan 01 2023
Journal Name
2nd International Conference On Mathematical Techniques And Applications: Icmta2021
Review of clustering for gene expression data
...Show More Authors

View Publication
Crossref (2)
Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Journal Of Southwest Jiaotong University
IMPROVED STRUCTURE OF DATA ENCRYPTION STANDARD ALGORITHM
...Show More Authors

The Internet is providing vital communications between millions of individuals. It is also more and more utilized as one of the commerce tools; thus, security is of high importance for securing communications and protecting vital information. Cryptography algorithms are essential in the field of security. Brute force attacks are the major Data Encryption Standard attacks. This is the main reason that warranted the need to use the improved structure of the Data Encryption Standard algorithm. This paper proposes a new, improved structure for Data Encryption Standard to make it secure and immune to attacks. The improved structure of Data Encryption Standard was accomplished using standard Data Encryption Standard with a new way of two key gene

... Show More
Publication Date
Sun Apr 01 2018
Journal Name
Journal Of Engineering And Applied Sciences
New Data Security Method Based on Biometrics
...Show More Authors

Merging biometrics with cryptography has become more familiar and a great scientific field was born for researchers. Biometrics adds distinctive property to the security systems, due biometrics is unique and individual features for every person. In this study, a new method is presented for ciphering data based on fingerprint features. This research is done by addressing plaintext message based on positions of extracted minutiae from fingerprint into a generated random text file regardless the size of data. The proposed method can be explained in three scenarios. In the first scenario the message was used inside random text directly at positions of minutiae in the second scenario the message was encrypted with a choosen word before ciphering

... Show More
Publication Date
Mon Oct 01 2018
Journal Name
International Journal Of Electrical And Computer Engineering
Load balance in data center SDN networks
...Show More Authors

In the last two decades, networks had been changed according to the rapid changing in its requirements. The current Data Center Networks have large number of hosts (tens or thousands) with special needs of bandwidth as the cloud network and the multimedia content computing is increased. The conventional Data Center Networks (DCNs) are highlighted by the increased number of users and bandwidth requirements which in turn have many implementation limitations. The current networking devices with its control and forwarding planes coupling result in network architectures are not suitable for dynamic computing and storage needs. Software Defined networking (SDN) is introduced to change this notion of traditional networks by decoupling control and

... Show More
Publication Date
Thu Oct 01 2020
Journal Name
Journal Of Engineering
Using a novel approach to determine the pore pressure of West Qurna 15 oil well in South of Iraq
...Show More Authors

Pore pressure means the pressure of the fluid filling the pore space of formations. When pore pressure is higher than hydrostatic pressure, it is named abnormal pore pressure or overpressure. When abnormal pressure occurred leads to many severe problems such as well kick, blowout during the drilling, then, prediction of this pressure is crucially essential to reduce cost and to avoid drilling problems that happened during drilling when this pressure occurred. The purpose of this paper is the determination of pore pressure in all layers, including the three formations (Yamama, Suliay, and Gotnia) in a deep exploration oil well in West Qurna field specifically well no. WQ-15 in the south of Iraq. In this study, a new appro

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Tue Sep 01 2020
Journal Name
Baghdad Science Journal
Using Dates Leaves Midribs to Prepare Hierarchical Structures Incorporating Porous Carbon and Zeolite A Composites for Cesium137Cs Ion Exchange
...Show More Authors

This study synthesized zeolite 4A, and hierarchical composite structure consisting of zeolite 4A- carbon were successfully prepared. Hydrothermal method was used to grow a layer of zeolite 4A over porous carbon surfaces to enhance mass transfer and increase surface area of zeolite. The products then were used to remove radioactive cesium137Cs from liquid wastewater. Iraqi dates leaves midribs (DM) were used as locally available agricultural waste to prepare low- cost porous carbon, using carbonization method in tubular furnace at 900C for two hours. Hierarchical porous structures including zeolite are prepared by mechanically activating the carbon surface via Ultrasonicating nanoparticles suspension of ground zeolite type 4A.F

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (6)
Scopus Clarivate Crossref
Publication Date
Wed Dec 30 2020
Journal Name
Modern Sport
The effect of special exercises using rubber ropes to develop special endurance and achieve a 200-meter freestyle swimming
...Show More Authors

Swimming has now become the focus of attention of specialists, which has led to the search for the best methods and various methods of training, which rely heavily on scientific research and studies, through the use of proper planning and a comprehensive scientific and practical vision in the preparation and training process for this game. Some studies have proven that  The use of training methods has a positive role in the athletic training of the swimmer, provided that these methods are used in the correct way according to the scientific principles of training and with the loads and stresses that serve the specialized activity, i.e. the swimming distance. The study aimed at the follow 1- Preparing exercises using elastic ro

... Show More
Crossref (1)
Crossref
Publication Date
Thu Aug 01 2024
Journal Name
The American Journal Of Management And Economics Innovations
THE ROLE OF ECONOMIC DATA ANALYSIS IN MANAGING MEDIUM AND SMALL COMPANIES TO MAKE STRATEGIC DECISIONS AND IMPROVE PERFORMANCE: AN ANALYTICAL STUDY
...Show More Authors

Economic analysis plays a pivotal role in managerial decision-making processes. This analysis is predicated on deeply understanding economic forces and market factors influencing corporate strategies and decisions. This paper delves into the role of economic data analysis in managing small and medium-sized enterprises (SMEs) to make strategic decisions and enhance performance. The study underscores the significance of this approach and its impact on corporate outcomes. The research analyzes annual reports from three companies: Al-Mahfaza for Mobile and Internet Financial Payment and Settlement Services Company Limited, Al-Arab for Electronic Payment Company, and Iraq Electronic Gateway for Financial Services Company. The paper concl

... Show More
View Publication Preview PDF
Crossref