Preferred Language
Articles
/
thcMP48BVTCNdQwC6WXf
Survey on intrusion detection system based on analysis concept drift: Status and future directions
...Show More Authors

Nowadays, internet security is a critical concern; the One of the most difficult study issues in network security is "intrusion detection". Fight against external threats. Intrusion detection is a novel method of securing computers and data networks that are already in use. To boost the efficacy of intrusion detection systems, machine learning and deep learning are widely deployed. While work on intrusion detection systems is already underway, based on data mining and machine learning is effective, it requires to detect intrusions by training static batch classifiers regardless considering the time-varying features of a regular data stream. Real-world problems, on the other hand, rarely fit into models that have such constraints. Furthermore, various uses in the real world, Data distributions in intrusion detection systems, for example, are non-stationary, which produce concept drift over time or non-stationary learning. The word "concept drift" is used to describe the process of changing one's mind about something in an online-supervised learning scenario, the connection between the input data and the target variable changes over time. We define adaptive learning, classify existing concept drift strategies, evaluate the most typical, distinct, and widely used approaches and algorithms, describe adaptive algorithm assessment methodology, and show a collection of examples, all of this is based on the assumption that you have a basic understanding of supervised learning. The survey examines the various aspects of concept drift in a comprehensive manner in order to think about the current fragmented "state-of-the-art". As a result, which intends to give scholars, industry analysts, and practitioners a comprehensive introduction to idea drift adaptability.

View Publication
Publication Date
Sun Dec 31 2023
Journal Name
College Of Islamic Sciences
The heart between the scientific and legal concept
...Show More Authors

 

summary of the research

The heart is the pine-shaped flesh on the left side of the chest. The moral gentleness in this flesh is called the home of perception, reason and understanding, as well as the place of desires and passions, so it turns between one desire and another between good and evil. As for its parts, it consists of four main parts called chambers, two rooms on the right As for the two chambers below, it is called the ventricle, the heart works regularly and accurately to pump blood and distribute it to all parts of the body and vital organs. And the Holy Quran divided the types of heart into two main types of healthy hearts, which are types (healthy, hidden, living....)

And the second type is sick hea

... Show More
View Publication Preview PDF
Publication Date
Thu Aug 31 2023
Journal Name
Journal Européen Des Systèmes Automatisés​
An IoT and Machine Learning-Based Predictive Maintenance System for Electrical Motors
...Show More Authors

The rise of Industry 4.0 and smart manufacturing has highlighted the importance of utilizing intelligent manufacturing techniques, tools, and methods, including predictive maintenance. This feature allows for the early identification of potential issues with machinery, preventing them from reaching critical stages. This paper proposes an intelligent predictive maintenance system for industrial equipment monitoring. The system integrates Industrial IoT, MQTT messaging and machine learning algorithms. Vibration, current and temperature sensors collect real-time data from electrical motors which is analyzed using five ML models to detect anomalies and predict failures, enabling proactive maintenance. The MQTT protocol is used for efficient com

... Show More
View Publication
Scopus (23)
Crossref (13)
Scopus Crossref
Publication Date
Sun Sep 14 2025
Journal Name
Journal Of Engineering
Design and Implementation of ICT-Based Recycle-Rewarding System for Green Environment
...Show More Authors

View Publication
Publication Date
Thu Dec 01 2011
Journal Name
Iraqi Journal Of Physics
Electronic diagnostics system for the analysis of laser beam profile
...Show More Authors

In this work the analysis of laser beam profile system ,using a two dimensional CCD (Charge Coupled Device) arrays, is established. The system is capable of producing video graphics that give a two dimensional image of laser beam. The video graphics system creates color distribution that represent the intensity distribution of the laser beam or the energy profile of the beam. The software used is capable of analyzing and displaying the profile in four different methods that is , color code intensity contouring , intensity shareholding, intensity cross section along two dimension x-y, and three dimensional plot of the beam intensity given in the same display.

View Publication Preview PDF
Publication Date
Fri Jan 01 2016
Journal Name
Machine Learning And Data Mining In Pattern Recognition
A New Strategy for Case-Based Reasoning Retrieval Using Classification Based on Association
...Show More Authors

View Publication Preview PDF
Scopus (7)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Studies In Systems, Decision And Control
The Effect of Using an Accounting Information System Based on Artificial Intelligence in Detecting Earnings Management to Enhance the Sustainability of Economic Units
...Show More Authors

This research aims to clarify the importance of an accounting information system that uses artificial intelligence to detect earnings manipulation. The research problem stems from the widespread manipulation of earning in economic entities, especially at the local level, exacerbated by the high financial and administrative corruption rates in Iraq due to fraudulent accounting practices. Since earning manipulation involves intentional fraudulent acts, it is necessary to implement preventive measures to detect and deter such practices. The main hypothesis of the research assumes that an accounting information system based on artificial intelligence cannot effectively detect the manipulation of profits in Iraqi economic entities. The researche

... Show More
View Publication
Scopus Crossref
Publication Date
Tue Aug 01 2023
Journal Name
Iop Conference Series: Earth And Environmental Science
Sustainability of Agricultural Productivity of Potato Crop in Desert Soils and Evaluation of Water Productivity Under Drip Irrigation System with Future Climate Changes
...Show More Authors

A field experiment was conducted during the spring season 2020 in Karbala proving/ Al-Sharia Distrit, located at latitude N 32° 42' 13.8" and longitude E 43° 54' 36.6" and at an altitude of 27 m above sea level. The experiment included a study of two factors: the first, Irrigation Interval, three treatments were used: irrigation treatment every 2 days, Irrigation treatment every 4 days, and Irrigation treatment every 6 days. The second factor is the addition of soil conditioners, in which four treatments were used: the control treatment without any addition, the treatment of adding bio-organic fertilizers, the treatment of adding water-conserving technology (polymer), and the treatment of adding water-conserving technology + fertilizers O

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (1)
Scopus Crossref
Publication Date
Tue Nov 01 2022
Journal Name
Rimak International Journal Of Humanities And Social Sciences
THE PRESS TREATMENT OF THE VISIT OF "POPE FRANCIS" AND ITS REPERCUSSIONS ON COMMUNITY PEACE IN IRAQ... A SURVEY STUDY...
...Show More Authors

The importance of the research from a practical point of view lies in the fact that it presents a set of statistics and data that give a clear picture of how the Iraqi newspapers (the subject of the study) deal with the visit of "Pope Francis" to Iraq ، and what are the most prominent indicators and manifestations of that visit in promoting societal peace among the Iraqi public. From a scientific point of view، the research provides another scientific addition to the media library، especially with regard to journalistic treatments and methods of framing the Arab international press for the subject of the visit، which could be a starting point for other researchers to complete qualitative research in this field. The research prob

... Show More
View Publication
Crossref
Publication Date
Wed Dec 07 2011
Journal Name
Journal Of Planner And Development
centralization and decentralization in Iraq and its future prospects
...Show More Authors

Centralization and decentralization, planning and development, and community participation in the management of its affairs and to activate all the abilities that multiple methods aimed at creating the proper environment for the growth and development of society in the place where he lives. As long as the overall trend in Iraq, represented by the Permanent Constitution of decentralization to regions and provinces, the solutions to the obstacles that may face this transition in some respects presents ways of coordination and integration between multiple levels of planning which can be exercised by the schematic in the future the organization. In this paper some of the visions and ideas that can  contribute to the organization

... Show More
View Publication Preview PDF
Publication Date
Fri Sep 23 2022
Journal Name
Specialusis Ugdymas
Text Cryptography based on Arabic Words Characters Number
...Show More Authors

Cryptography is a method used to mask text based on any encryption method, and the authorized user only can decrypt and read this message. An intruder tried to attack in many manners to access the communication channel, like impersonating, non-repudiation, denial of services, modification of data, threatening confidentiality and breaking availability of services. The high electronic communications between people need to ensure that transactions remain confidential. Cryptography methods give the best solution to this problem. This paper proposed a new cryptography method based on Arabic words; this method is done based on two steps. Where the first step is binary encoding generation used t

... Show More