Preferred Language
Articles
/
voavo4YBIXToZYALzpsk
Intrusion detection method for internet of things based on the spiking neural network and decision tree method
...Show More Authors

The prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices’ power usage. Also, a rand order code (ROC) technique is used with SNN to detect cyber-attacks. The proposed method is evaluated by comparing its performance with two other methods: IDS-DNN and IDS-SNNTLF by using three performance metrics: detection accuracy, latency, and energy usage. The simulation results have shown that IDS-SNNDT attained low power usage and less latency in comparison with IDS-DNN and IDS-SNNTLF methods. Also, IDS-SNNDT has achieved high detection accuracy for cyber-attacks in contrast with IDS-SNNTLF.

Preview PDF
Quick Preview PDF
Publication Date
Fri Oct 26 2018
Journal Name
Journal Of Planner And Development
Alternative Methods for Decreasing Infrastructure Deficiencies in Iraq
...Show More Authors

View Publication Preview PDF
Publication Date
Sun Dec 07 2008
Journal Name
Baghdad Science Journal
Optimal Color Model for Information Hidingin Color Images
...Show More Authors

In present work the effort has been put in finding the most suitable color model for the application of information hiding in color images. We test the most commonly used color models; RGB, YIQ, YUV, YCbCr1 and YCbCr2. The same procedures of embedding, detection and evaluation were applied to find which color model is most appropriate for information hiding. The new in this work, we take into consideration the value of errors that generated during transformations among color models. The results show YUV and YIQ color models are the best for information hiding in color images.

View Publication Preview PDF
Crossref
Publication Date
Wed Dec 31 2014
Journal Name
Iraqi Journal For Computers And Informatics
Gate Control System for New Iraqi License Plate
...Show More Authors

This paper presents an approach to license plate localization and recognition. A proposed method is designed to control the opening of door gate based on the recognition of the license plates number in Iraq. In general the system consists of four stages; Image capturing, License plate cropping, character segmentation and character recognition. In the first stage, the vehicle photo is taken from standard camera placed on the door gate with a specific distance from the front of vehicle to be processed by our system. Then, the detection method searches for the matching of the license plate in the image with a standard plate. The segmentation stage is performed by is using edge detection. Then character recognition, done by comparing with templ

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sat Sep 08 2018
Journal Name
Proceedings Of The 2018 International Conference On Computing And Big Data
3D Parallel Coordinates for Multidimensional Data Cube Exploration
...Show More Authors

Visual analytics becomes an important approach for discovering patterns in big data. As visualization struggles from high dimensionality of data, issues like concept hierarchy on each dimension add more difficulty and make visualization a prohibitive task. Data cube offers multi-perspective aggregated views of large data sets and has important applications in business and many other areas. It has high dimensionality, concept hierarchy, vast number of cells, and comes with special exploration operations such as roll-up, drill-down, slicing and dicing. All these issues make data cubes very difficult to visually explore. Most existing approaches visualize a data cube in 2D space and require preprocessing steps. In this paper, we propose a visu

... Show More
View Publication
Scopus (3)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Mon Dec 12 2022
Journal Name
Geodesy And Cartography
SPATIOTEMPORAL ANALYSIS FOR FIGHTING COVID-19 IN IRAQ
...Show More Authors

At the end of 2019, a new form of Coronavirus (later dubbed COVID-19) emerged in China and quickly spread to other regions of the globe. Despite the virus’s unique and unknown characteristics, it is a widely distributed infectious illness. Finding the geographical distribution of the virus transmission is therefore critical for epidemiologists and governments in order to respond to the illness epidemic rapidly and effectively. Understanding the dynamics of COVID-19’s spatial distribution can help to understand the pandemic’s scope and effects, as well as decision-making, planning, and community action aimed at preventing transmission. The main focus of this study is to investigate the geographic patterns of COVID-19 disseminat

... Show More
View Publication
Scopus (1)
Scopus Crossref
Publication Date
Thu Mar 01 2012
Journal Name
International Journal Of Innovative Computing, Information And Control
ITTP: A new transport protocol for VoIP applications
...Show More Authors

View Publication
Scopus (14)
Scopus
Publication Date
Sat Aug 15 2015
Journal Name
Iraqi Dental Journal
Standardized Protocol for Endodontic Treatment (Iraqi Endodontic Society)
...Show More Authors

The establishment of a high quality service in oral health care achieved by a member of dental professional is an important feature of any system of peer review in dentistry. This protocol attempts to discuss two crucial elements (I) suitability and feasibility of treatment modality and (II) quality of treatment performed to Iraqi patients. The Iraq endodontic society is designing a standardized protocol for endodontic treatment following the quality guidelines of European society of Endodontology (2006) to meet the highest standard of care generally given by competent practitioners. The Iraqi endodontic society has the expertise and professional responsibility clinically relevant to empower the dental profession through creating significan

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Wed May 12 2021
Journal Name
Annals Of The Romanian Society For Cell Biology
Hashimoto's Thyroiditis Increases Risk for Differentiated Thyroid Carcinoma
...Show More Authors

Background: Hashimoto's thyroiditis has been found to coexist with differentiated thyroid cancer in surgical specimens, but an association between the two conditions has been discounted by the medical literature. So, we performed this research to determine any potential relationship between Hashimoto's thyroiditis and the risk of developing differentiated thyroid cancer in clinical status. we assessed the related clinical factors linking these conditions, especially serum thyroid-stimulating hormone concentration, family history of thyroid disease, gender& young age group. Aim of study: to determine that hashimoto’s thyroiditis increases risk for differentiated thyroid carcinoma. Patients and method: This study is a Cross-sectiona

... Show More
View Publication Preview PDF
Publication Date
Thu Dec 01 2011
Journal Name
2011 Developments In E-systems Engineering
Enhanced Computation Time for Fast Block Matching Algorithm
...Show More Authors

View Publication
Scopus (1)
Scopus Crossref
Publication Date
Mon Mar 08 2021
Journal Name
Baghdad Science Journal
Shield Calculation Design for gamma-ray sterilzer plant
...Show More Authors

The present calculation covers the building shield during irradiation process and under water storage of three milion curries Cobalt-60 radiation source the calculation results in design requirement of 8m depth of water in the source stoeage pool

View Publication Preview PDF