Preferred Language
Articles
/
qxf9Po8BVTCNdQwC4GW7
Toward Constructing a Balanced Intrusion Detection Dataset

Several Intrusion Detection Systems (IDS) have been proposed in the current decade. Most datasets which associate with intrusion detection dataset suffer from an imbalance class problem. This problem limits the performance of classifier for minority classes. This paper has presented a novel class imbalance processing technology for large scale multiclass dataset, referred to as BMCD. Our algorithm is based on adapting the Synthetic Minority Over-Sampling Technique (SMOTE) with multiclass dataset to improve the detection rate of minority classes while ensuring efficiency. In this work we have been combined five individual CICIDS2017 dataset to create one multiclass dataset which contains several types of attacks. To prove the efficiency of our algorithm, several machine learning algorithms have been applied on combined dataset with and without using BMCD algorithm. The experimental results have concluded that BMCD provides an effective solution to imbalanced intrusion detection and outperforms the state-of-the-art intrusion detection methods.

Crossref
View Publication
Publication Date
Tue Apr 02 2024
Journal Name
Advances In Systems Science And Applications
Scopus
View Publication
Publication Date
Sat Jul 31 2021
Journal Name
Iraqi Journal Of Science
A Decision Tree-Aware Genetic Algorithm for Botnet Detection

     In this paper, the botnet detection problem is defined as a feature selection problem and the genetic algorithm (GA) is used to search for the best significant combination of features from the entire search space of set of features. Furthermore, the Decision Tree (DT) classifier is used as an objective function to direct the ability of the proposed GA to locate the combination of features that can correctly classify the activities into normal traffics and botnet attacks. Two datasets  namely the UNSW-NB15 and the Canadian Institute for Cybersecurity Intrusion Detection System 2017 (CICIDS2017), are used as evaluation datasets. The results reveal that the proposed DT-aware GA can effectively find the relevant

... Show More
Scopus (3)
Crossref (1)
Scopus Crossref
View Publication Preview PDF
Publication Date
Tue Apr 30 2024
Journal Name
Iraqi Journal Of Science
Credit Card Fraud Detection Challenges and Solutions: A Review

     Credit card fraud has become an increasing problem due to the growing reliance on electronic payment systems and technological advances that have improved fraud techniques. Numerous financial institutions are looking for the best ways to leverage technological advancements to provide better services to their end users, and researchers used various protection methods to provide security and privacy for credit cards. Therefore, it is necessary to identify the challenges and the proposed solutions to address them.  This review provides an overview of the most recent research on the detection of fraudulent credit card transactions to protect those transactions from tampering or improper use, which includes imbalance classes, c

... Show More
Scopus (1)
Scopus Crossref
Publication Date
Wed Nov 20 2024
Journal Name
Revista Iberoamericana De Psicología Del Ejercicio Y El Deporte, Issn 1886-8576, Vol. 18, Nº. 1, 2023, Págs. 19-29
Constructing A Measure of Psychological Disability and Its Relationship to Some Basic Skills and Fixed Playing Situations for Youth Football Players Under (19) Years Old

Autorías: Muwafaq Obayes Khudhair, Sanaa Rabeea Abed, Hayder Talib Jasim. Localización: Revista iberoamericana de psicología del ejercicio y el deporte. Nº. 1, 2023. Artículo de Revista en Dialnet.

View Publication Preview PDF
Publication Date
Sun Feb 25 2024
Journal Name
Baghdad Science Journal
The Effect Of Optimizers On The Generalizability Additive Neural Attention For Customer Support Twitter Dataset In Chatbot Application

When optimizing the performance of neural network-based chatbots, determining the optimizer is one of the most important aspects. Optimizers primarily control the adjustment of model parameters such as weight and bias to minimize a loss function during training. Adaptive optimizers such as ADAM have become a standard choice and are widely used for their invariant parameter updates' magnitudes concerning gradient scale variations, but often pose generalization problems. Alternatively, Stochastic Gradient Descent (SGD) with Momentum and the extension of ADAM, the ADAMW, offers several advantages. This study aims to compare and examine the effects of these optimizers on the chatbot CST dataset. The effectiveness of each optimizer is evaluat

... Show More
Scopus (1)
Scopus Crossref
View Publication Preview PDF
Publication Date
Sun Dec 31 2023
Journal Name
Journal Of Pioneering Medical Science
Nurses' Perception Toward Therapeutic Strategies for Children with Pneumonia

Background: Pneumonia is the common lower respiratory tract infection among pediatrics, especially under five; it is a common cause of under-five children morbidity and mortality. Objectives of study: To identify nurses' perceptions toward therapeutic strategies for children with pneumonia and to find the association between their perceptions and their demographic variables. Methods: A Convenient sample of 46 nurses in Baghdad city from three hospitals) Kadhimiya Hospital for Children, Central Teaching Hospital of Pediatrics, and Child Welfare Teaching Hospital) included in the study to identify their perceptions regarding pneumonia in children. Results: The results of the study present that most of the nurses' participants in the a

... Show More
Crossref
View Publication
Publication Date
Sun Feb 10 2019
Journal Name
Journal Of The College Of Education For Women
People of China's Economic Diplomacy Toward Japan 1949-1972

Chinese policy was characterized in general toward Japan caution and fear and try to
mobilize all energies and alliances possible in order to interact and deal with that neighbor
foe, has that policy been in all its aspects to the enticements of regional and local conflicts, as
well as international variables that were the hardest and most influential on them.
The importance of the choice of the People of China's economic diplomacy toward the
study of Japan during the period of the Cold War is that each of them was in transition, China
at that time was barely beyond the midst of a civil war (1945-1949) led to the split into two
states: China, led by the People Mao Tse-Tung and Beijing as its capital, the National Chi

... Show More
View Publication Preview PDF
Publication Date
Fri Jun 30 2023
Journal Name
Iraqi National Journal Of Nursing Specialties
Assessment of Old Age behaviors toward Cardiovascular Health Promotion

        Abstract:

Objective: To assess old age behaviors toward cardiovascular health promotion. Find out the association between old age behaviors toward cardiovascular health promotion with certain sociodemographic characteristic and type of geriatric home.

Methodology:  A descriptive study is conducted throughout the period of (April 12th 2022 to august 22nd, 2023) presented to assess of old age behaviors toward cardiovascular health promotion. Purposive sample of (140) old age were selected from males and female’s participants from public and private Geriatric Homes at Baghdad city questi

... Show More
Crossref (1)
Crossref
View Publication Preview PDF
Publication Date
Sat Aug 01 2015
Journal Name
2015 37th Annual International Conference Of The Ieee Engineering In Medicine And Biology Society (embc)
Scopus (27)
Crossref (15)
Scopus Crossref
View Publication
Publication Date
Sun Jul 09 2023
Journal Name
Journal Of Engineering
New Approach in Detection MAC Spoofing in a WiFi LAN

Medium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the

... Show More
Crossref
View Publication Preview PDF