Preferred Language
Articles
/
voavo4YBIXToZYALzpsk
Intrusion detection method for internet of things based on the spiking neural network and decision tree method
...Show More Authors

The prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices’ power usage. Also, a rand order code (ROC) technique is used with SNN to detect cyber-attacks. The proposed method is evaluated by comparing its performance with two other methods: IDS-DNN and IDS-SNNTLF by using three performance metrics: detection accuracy, latency, and energy usage. The simulation results have shown that IDS-SNNDT attained low power usage and less latency in comparison with IDS-DNN and IDS-SNNTLF methods. Also, IDS-SNNDT has achieved high detection accuracy for cyber-attacks in contrast with IDS-SNNTLF.

Preview PDF
Quick Preview PDF
Publication Date
Wed Feb 29 2012
Journal Name
Al-khwarizmi Engineering Journal
A New Audio Steganography System Based on Auto-Key Generator
...Show More Authors

Stenography is the art of hiding the very presence of communication by embedding secret message into innocuous looking cover document, such as digital image, videos, sound files, and other computer files that contain perceptually irrelevant or redundant information as covers or carriers to hide secret messages.

In this paper, a new Least Significant Bit (LSB) nonsequential embedding technique in wave audio files is introduced. To support the immunity of proposed hiding system, and in order to recover some weak aspect inherent with the pure implementation of stego-systems, some auxiliary processes were suggested and investigated including the use of hidden text jumping process and stream ciphering algorithm. Besides, the suggested

... Show More
View Publication Preview PDF
Publication Date
Fri Jul 01 2011
Journal Name
Engineering And Technology Journal
Off-Line Arabic Signature Recognition Based on Invariant Moments Properties
...Show More Authors

View Publication
Crossref
Publication Date
Mon Jan 01 2018
Journal Name
Al–bahith Al–a'alami
News website Analytical: study of news sites (Iraqi Media network, The Seventh Day,Huffington Post Arabic
...Show More Authors

This research focuses on the services provided by news websites (IMN, Youm7, Huffington Post Arabic) to its audience of Internet users, as well as materials posted through its pages, trying to monitor and explain them to identify their types & features, and it›s functions, whether informational or non-informational, to know the technical potential of each of the news sites, with the entry of the latest technology information. The research used the analysis method to achieve the research objectives within the period from 1/1 to 31/1/2017. The researchers used the content analysis tool as a research tool to analyze the news sites and to know the services they provide through their pages. The research was divided into three parts, the

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sun Jan 01 2023
Journal Name
International Journal Of Intelligent Systems And Applications In Engineering
Artificial Intelligence Based Statistical Process Control for Monitoring and Quality Control of Water Resources: A Complete Digital Solution
...Show More Authors

Scopus (3)
Scopus
Publication Date
Wed Jan 22 2025
Journal Name
Wasit Journal Of Sports Sciences
The impact of the Needham model on learning the skills of dribbling and handling in football for students
...Show More Authors

View Publication
Publication Date
Wed Feb 22 2017
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
DETECTION OF ENTEROTOXINS OF Staphylococcus aureus IN MILK AND LOCOLLY SOFT CHEESES IN BAGHDAD CITY: DETECTION OF ENTEROTOXINS OF Staphylococcus aureus IN MILK AND LOCOLLY SOFT CHEESES IN BAGHDAD CITY
...Show More Authors

This study aimed to detect of contamination of milk and local soft cheese with Staphylococcus aureus and their enterotoxins with attempt to detect the enterotoxin genes in some isolates of this bacteria. A total of 120 samples, 76 of raw milk and 44 of soft cheese were collected from different markets of Baghdad city. Enterotoxins in these samples were detected by VIDAS Set 2 system and it was found that enterotoxin A is present in a rate of 44.74% in milk samples and in a rate 54.50% in cheese samples. While other enterotoxins B, C, D, E were not found in any rate in any samples.
Through the study 60 isolates obtained from milk and cheeses were identified as Staphylococcus aureus by cultural, morphological and biochemical test by u

... Show More
View Publication Preview PDF
Publication Date
Tue Sep 18 2018
Journal Name
Water
A Systematic Operation Program of a Hydropower Plant Based on Minimizing the Principal Stress: Haditha Dam Case Study
...Show More Authors

Dam operation and management have become more complex recently because of the need for considering hydraulic structure sustainability and environmental protect on. An Earthfill dam that includes a powerhouse system is considered as a significant multipurpose hydraulic structure. Understanding the effects of running hydropower plant turbines on the dam body is one of the major safety concerns for earthfill dams. In this research, dynamic analysis of earthfill dam, integrated with a hydropower plant system containing six vertical Kaplan turbines (i.e., Haditha dam), is investigated. In the first stage of the study, ANSYS-CFX was used to represent one vertical Kaplan turbine unit by designing a three-dimensional (3-D) finite element (F

... Show More
View Publication
Scopus (10)
Crossref (6)
Scopus Clarivate Crossref
Publication Date
Wed May 10 2017
Journal Name
Australian Journal Of Basic And Applied Sciences
Block-based Image Steganography for Text Hiding Using YUV Color Model and Secret Key Cryptography Methods
...Show More Authors

Preview PDF
Publication Date
Wed Aug 31 2022
Journal Name
Al-kindy College Medical Journal
Detection of Parvovirus B19 DNA in pregnant Sudanese women attending The Military hospital using Nested PCR technique : Detection of Parvovirus B19 DNA in pregnant Sudanese women
...Show More Authors

Background: Parvovirus B19 is a human pathogenic virus associated with a wide range of clinical conditions. During pregnancy congenital infection with parvovirus B19 can be associated with poor outcome, including miscarriage, fetal anemia and non-immune hydrops.  

Objective: The study aimed to determine the prevalenceof Parvovirus B19 DNA in pregnant women attending the Military hospital in Khartoum, demonstrating the association between the virus and poor pregnancy outcomes.

Subjects and methods: This study was a cross sectional study, testing pregnant Sudanese women whole blood samples (n= 97) for the presence of Parvovirus B1

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Mar 04 2022
Journal Name
Pakistan Journal Of Medical And Health Science
Detection of aadA1 and aac(3)-1V resistance genes in Acinetobacter baumannii
...Show More Authors