Preferred Language
Articles
/
thcMP48BVTCNdQwC6WXf
Survey on intrusion detection system based on analysis concept drift: Status and future directions
...Show More Authors

Nowadays, internet security is a critical concern; the One of the most difficult study issues in network security is "intrusion detection". Fight against external threats. Intrusion detection is a novel method of securing computers and data networks that are already in use. To boost the efficacy of intrusion detection systems, machine learning and deep learning are widely deployed. While work on intrusion detection systems is already underway, based on data mining and machine learning is effective, it requires to detect intrusions by training static batch classifiers regardless considering the time-varying features of a regular data stream. Real-world problems, on the other hand, rarely fit into models that have such constraints. Furthermore, various uses in the real world, Data distributions in intrusion detection systems, for example, are non-stationary, which produce concept drift over time or non-stationary learning. The word "concept drift" is used to describe the process of changing one's mind about something in an online-supervised learning scenario, the connection between the input data and the target variable changes over time. We define adaptive learning, classify existing concept drift strategies, evaluate the most typical, distinct, and widely used approaches and algorithms, describe adaptive algorithm assessment methodology, and show a collection of examples, all of this is based on the assumption that you have a basic understanding of supervised learning. The survey examines the various aspects of concept drift in a comprehensive manner in order to think about the current fragmented "state-of-the-art". As a result, which intends to give scholars, industry analysts, and practitioners a comprehensive introduction to idea drift adaptability.

View Publication
Publication Date
Thu Dec 01 2022
Journal Name
Neuroscience Informatics
Epileptic EEG activity detection for children using entropy-based biomarkers
...Show More Authors

View Publication
Scopus (15)
Crossref (9)
Scopus Crossref
Publication Date
Thu Mar 30 2017
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Effect of Ergotamine and its Combination with Vitamin E or Melatonin on Total Antioxidant Status in Migraine Patients
...Show More Authors

Free radicals and oxidative damage caused by them have being suggested to be involved in the pathogenesis of migraine. These may result from distorted equilibrium of pro-oxidant/anti-oxidant system that continuously generates and detoxifies oxidants during normal aerobic metabolism. Escape of such system from equilibrium leads to damage of cellular elements with the depletion of cellular stores of anti-oxidants material such as glutathione and vitamin E. Therefore, free radical scavengers (vitamin E or melatonin) seems to be of potential benefit as prophylactic anti-migraine therapy by neutralizing free radicals overproduction and possibly preventing formation of highly toxic intermediates (such as nitric oxide). In addition of being pow

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Tue Dec 01 2020
Journal Name
The Saudi Dental Journal
The impact of salivary lactoperoxidase and histatin-5 on early childhood caries severity in relation to nutritional status
...Show More Authors

View Publication
Scopus (9)
Crossref (9)
Scopus Clarivate Crossref
Publication Date
Mon Nov 11 2019
Journal Name
Spe
Modeling Rate of Penetration using Artificial Intelligent System and Multiple Regression Analysis
...Show More Authors
Abstract<p>Over the years, the prediction of penetration rate (ROP) has played a key rule for drilling engineers due it is effect on the optimization of various parameters that related to substantial cost saving. Many researchers have continually worked to optimize penetration rate. A major issue with most published studies is that there is no simple model currently available to guarantee the ROP prediction.</p><p>The main objective of this study is to further improve ROP prediction using two predictive methods, multiple regression analysis (MRA) and artificial neural networks (ANNs). A field case in SE Iraq was conducted to predict the ROP from a large number of parame</p> ... Show More
View Publication Preview PDF
Crossref (7)
Crossref
Publication Date
Mon Jul 01 2019
Journal Name
Iop Conference Series: Materials Science And Engineering
On Estimation of the Stress – Strength Reliability Based on Lomax Distribution
...Show More Authors
Abstract<p>The present paper concerns with the problem of estimating the reliability system in the stress – strength model under the consideration non identical and independent of stress and strength and follows Lomax Distribution. Various shrinkage estimation methods were employed in this context depend on Maximum likelihood, Moment Method and shrinkage weight factors based on Monte Carlo Simulation. Comparisons among the suggested estimation methods have been made using the mean absolute percentage error criteria depend on MATLAB program.</p>
View Publication
Scopus (6)
Crossref (2)
Scopus Crossref
Publication Date
Fri Oct 01 2021
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Color image compression based on spatial and magnitude signal decomposition
...Show More Authors

<p>In this paper, a simple color image compression system has been proposed using image signal decomposition. Where, the RGB image color band is converted to the less correlated YUV color model and the pixel value (magnitude) in each band is decomposed into 2-values; most and least significant. According to the importance of the most significant value (MSV) that influenced by any simply modification happened, an adaptive lossless image compression system is proposed using bit plane (BP) slicing, delta pulse code modulation (Delta PCM), adaptive quadtree (QT) partitioning followed by an adaptive shift encoder. On the other hand, a lossy compression system is introduced to handle the least significant value (LSV), it is based on

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (1)
Scopus Crossref
Publication Date
Sun Mar 17 2019
Journal Name
Baghdad Science Journal
A New Cipher Based on Feistel Structure and Chaotic Maps
...Show More Authors

Chaotic systems have been proved to be useful and effective for cryptography. Through this work, a new Feistel cipher depend upon chaos systems and Feistel network structure with dynamic secret key size according to the message size have been proposed. Compared with the classical traditional ciphers like Feistel-based structure ciphers, Data Encryption Standards (DES), is the common example of Feistel-based ciphers, the process of confusion and diffusion, will contains the dynamical permutation choice boxes, dynamical substitution choice boxes, which will be generated once and hence, considered static,

            While using chaotic maps, in the suggested system, called

... Show More
View Publication Preview PDF
Scopus (22)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Tue Sep 01 2020
Journal Name
Al-khwarizmi Engineering Journal
UAV Control Based on Dual LQR and Fuzzy-PID Controller
...Show More Authors

This paper presents the design of a longitudinal controller for an autonomous unmanned aerial vehicle (UAV). This paper proposed the dual loop (inner-outer loop) control based on the intelligent algorithm. The inner feedback loop controller is a Linear Quadratic Regulator (LQR) to provide robust (adaptive) stability. In contrast, the outer loop controller is based on Fuzzy-PID (Proportional, Integral, and Derivative) algorithm to provide reference signal tracking. The proposed dual controller is to control the position (altitude) and velocity (airspeed) of an aircraft. An adaptive Unscented Kalman Filter (AUKF) is employed to track the reference signal and is decreased the Gaussian noise. The mathematical model of aircraft

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Fri Jan 10 2025
Journal Name
International Journal Of Scientific Research In Science, Engineering And Technology
Image Cryptography Based on Chebyshev Polynomials and Transposition- Substitution Transformations
...Show More Authors

The confirming of security and confidentiality of multimedia data is a serious challenge through the growing dependence on digital communication. This paper offers a new image cryptography based on the Chebyshev chaos polynomials map, via employing the randomness characteristic of chaos concept to improve security. The suggested method includes block shuffling, dynamic offset chaos key production, inter-layer XOR, and block 90 degree rotations to disorder the correlations intrinsic in image. The method is aimed for efficiency and scalability, accomplishing  complexity order for n-pixels over specific cipher rounds. The experiment outcomes depict great resistant to cryptanalysis attacks, containing statistical, differential and brut

... Show More
View Publication
Crossref
Publication Date
Thu Sep 01 2016
Journal Name
Indonesian Journal Of Electrical Engineering And Computer Science
Performance evaluation of heterogeneous network based on RED and WRED
...Show More Authors

Scopus (3)
Scopus