Preferred Language
Articles
/
qxf9Po8BVTCNdQwC4GW7
Toward Constructing a Balanced Intrusion Detection Dataset

Several Intrusion Detection Systems (IDS) have been proposed in the current decade. Most datasets which associate with intrusion detection dataset suffer from an imbalance class problem. This problem limits the performance of classifier for minority classes. This paper has presented a novel class imbalance processing technology for large scale multiclass dataset, referred to as BMCD. Our algorithm is based on adapting the Synthetic Minority Over-Sampling Technique (SMOTE) with multiclass dataset to improve the detection rate of minority classes while ensuring efficiency. In this work we have been combined five individual CICIDS2017 dataset to create one multiclass dataset which contains several types of attacks. To prove the efficiency of our algorithm, several machine learning algorithms have been applied on combined dataset with and without using BMCD algorithm. The experimental results have concluded that BMCD provides an effective solution to imbalanced intrusion detection and outperforms the state-of-the-art intrusion detection methods.

Crossref
View Publication
Publication Date
Tue Jun 01 2021
Journal Name
Swarm And Evolutionary Computation
A review of heuristics and metaheuristics for community detection in complex networks: Current usage, emerging development and future directions

Sensibly highlighting the hidden structures of many real-world networks has attracted growing interest and triggered a vast array of techniques on what is called nowadays community detection (CD) problem. Non-deterministic metaheuristics are proved to competitively transcending the limits of the counterpart deterministic heuristics in solving community detection problem. Despite the increasing interest, most of the existing metaheuristic based community detection (MCD) algorithms reflect one traditional language. Generally, they tend to explicitly project some features of real communities into different definitions of single or multi-objective optimization functions. The design of other operators, however, remains canonical lacking any inte

... Show More
Scopus (46)
Crossref (35)
Scopus Clarivate Crossref
Publication Date
Tue Jun 01 2021
Journal Name
Swarm And Evolutionary Computation
Scopus (46)
Crossref (35)
Scopus Clarivate Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Lecture Notes In Electrical Engineering
Scopus Crossref
View Publication
Publication Date
Wed Nov 07 2018
Journal Name
Iraqi National Journal Of Nursing Specialties
Assessment of Nurses' Practices Toward Infection Control Standardized Precautions in Azady Teaching Hospital in the City of Kirkuk

Objective: The aim of the present study is to assess the practices of nurses towards standard precautions at Azady
Teaching Hospital in the City of Kirkuk.
Methodology: A descriptive study, which uses the assessment approach and it was conducted on nurses from January
18th, 2009 to September 30th, 2009, using non-probability sampling a purposive sample of (37) subject (male and
female nurses) who worked at surgical wards in Azady Teaching Hospital in Kirkuk city was selected. Two study
instruments were utilized for proper data collection [questionnaire and observational checklist]; a questionnaire was
developed for the purpose of the study. It was comprised of two parts which included the nurses' demographic
characte

... Show More
View Publication Preview PDF
Publication Date
Sun Apr 30 2023
Journal Name
Iraqi Journal Of Science
Detection of A Possible Subsurface Water Seepage Using 2D Electrical Resistivity Imaging Survey at a site in Al-Khwarizmi College of Engineering, University of Baghdad, Iraq

     Unknown subsurface leaking water sources and possible subsurface seepage from a sewage tank in a garden at Al-Khawarizmi engineering college, University of Baghdad, were detected in this study. The 2D electrical resistivity imaging. The ERI survey is carried out along two lines, 60m and 50m long, with an electrode spacing of 1 m, forming a cross using the Wenner-Schlumberger array configuration. Line 1 is 60m, while line 2 is 50m. Soil samples were collected from line 1 at positions of electrode 34, which shows a high resistivity value, and electrode 55, which shows low resistivity, for laboratory analysis. Robust inversion and modelling processes showed relative change and high contrast in interpreted resistivities. Soil analy

... Show More
Scopus Crossref
View Publication Preview PDF
Publication Date
Mon Dec 01 2014
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Towards Perceptions building a descriptive and procedural for the knowledge assets at the center of learning and growth for the techniques of Balanced Score card in the light of the strategic map concepts to achieve the strategic and operational: requirements of the contemporary business

Abstract:

   Witness the current business environment changes rapidly reflected on the performance of the facility wishing to stay , which is no longer style reaction enough to handle installations with their environment , and quickly began to lose its luster with the emergence of a message and the vision of contemporary business environment from a set of parts interacting with each other and the concept of behavioral includes all dimensions of performance, it is imperative to adopt a system installations influence variables and positive interaction through the development of strategic plans and the use of implementation and follow-up strategies to ensure the effectiveness of the method for meas

... Show More
Crossref
View Publication Preview PDF
Publication Date
Wed Aug 30 2023
Journal Name
Iraqi Journal Of Science
Review of Smishing Detection Via Machine Learning

     Smishing is a cybercriminal attack targeting mobile Short Message Service (SMS) devices that contains a malicious link, phone number, or email. The attacker intends to use this message to steal the victim's sensitive information, such as passwords, bank account details, and credit cards. One method of combating smishing is to raise awareness and educate users about the various tactics used by SMS phishers. But even so, this method has been criticized for becoming inefficient because smishing tactics are continually evolving. A more promising anti-smishing method is to use machine learning. This paper introduces a number of machine learning algorithms that can be used for detecting smishing. Furthermore, the differences and simil

... Show More
Scopus (2)
Crossref (1)
Scopus Crossref
View Publication Preview PDF
Publication Date
Tue Aug 23 2022
Journal Name
Int. J. Nonlinear Anal. Appl.
Face mask detection based on algorithm YOLOv5s

Determining the face of wearing a mask from not wearing a mask from visual data such as video and still, images have been a fascinating research topic in recent decades due to the spread of the Corona pandemic, which has changed the features of the entire world and forced people to wear a mask as a way to prevent the pandemic that has calmed the entire world, and it has played an important role. Intelligent development based on artificial intelligence and computers has a very important role in the issue of safety from the pandemic, as the Topic of face recognition and identifying people who wear the mask or not in the introduction and deep education was the most prominent in this topic. Using deep learning techniques and the YOLO (”You on

... Show More
Publication Date
Thu Feb 28 2019
Journal Name
Multimedia Tools And Applications
Scopus (40)
Crossref (33)
Scopus Clarivate Crossref
View Publication
Publication Date
Fri Feb 17 2023
Journal Name
Journal Of Al-qadisiyah For Computer Science And Mathematics
Deploying Facial Segmentation Landmarks for Deepfake Detection

Deepfake is a type of artificial intelligence used to create convincing images, audio, and video hoaxes and it concerns celebrities and everyone because they are easy to manufacture. Deepfake are hard to recognize by people and current approaches, especially high-quality ones. As a defense against Deepfake techniques, various methods to detect Deepfake in images have been suggested. Most of them had limitations, like only working with one face in an image. The face has to be facing forward, with both eyes and the mouth open, depending on what part of the face they worked on. Other than that, a few focus on the impact of pre-processing steps on the detection accuracy of the models. This paper introduces a framework design focused on this asp

... Show More
Crossref (1)
Crossref
View Publication Preview PDF