Preferred Language
Articles
/
voavo4YBIXToZYALzpsk
Intrusion detection method for internet of things based on the spiking neural network and decision tree method
...Show More Authors

The prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices’ power usage. Also, a rand order code (ROC) technique is used with SNN to detect cyber-attacks. The proposed method is evaluated by comparing its performance with two other methods: IDS-DNN and IDS-SNNTLF by using three performance metrics: detection accuracy, latency, and energy usage. The simulation results have shown that IDS-SNNDT attained low power usage and less latency in comparison with IDS-DNN and IDS-SNNTLF methods. Also, IDS-SNNDT has achieved high detection accuracy for cyber-attacks in contrast with IDS-SNNTLF.

Preview PDF
Quick Preview PDF
Publication Date
Sat Nov 01 2014
Journal Name
I-manager's Journal On Information Technology
AN ENHANCED METHOD FOR SPRITE EXTRACTING
...Show More Authors

The extracting of personal sprite from the whole image faced many problems in separating the sprite edge from the unneeded parts, some image software try to automate this process, but usually they couldn't find the edge or have false result. In this paper, the authors have made an enhancement on the use of Canny edge detection to locate the sprite from the whole image by adding some enhancement steps by using MATLAB. Moreover, remove all the non-relevant information from the image by selecting only the sprite and place it in a transparent background. The results of comparing the Canny edge detection with the proposed method shows improvement in the edge detection.

Publication Date
Mon Sep 01 2014
Journal Name
Proceedings Of Ieee East-west Design & Test Symposium (ewdts 2014)
Qubit method for diagnosing digital systems
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Wed Feb 08 2023
Journal Name
Iraqi Journal Of Science
Efficient Method for Color Iris Localization
...Show More Authors

Iris detection is considered as challenging image processing task. In this study efficient method was suggested to detect iris and recognition it. This method depending on seed filling algorithm and circular area detection, where the color image converted to gray image, and then the gray image is converted to binary image. The seed filling is applied of the binary image and the position of detected object binary region (ROI) is localized in term of it is center coordinates are radii (i.e., the inner and out radius). To find the localization efficiency of suggested method has been used the coefficient of variation (CV) for radius iris for evaluation. The test results indicated that is suggested method is good for the iris detection.

View Publication Preview PDF
Publication Date
Mon Apr 20 2020
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Spectrophotometric Method for the Estimation of Ceftriaxone in Pure Form and Pharmaceuticals
...Show More Authors

Ceftriaxone sodium were one of the widely antibacterial drugs used. Azo dye derivatization of diazonium salt that formed via the reaction between ceftriaxone with hydrochloric acid and sodium nitrite was developed for the on-research drug analysis then coupling with each one 2,5-dimethylphenol (2,5-DMP) and 4-tertbutylphenol (4-TBP) respectively in the alkaline media. The developed diazonium coupling methods include an optimization study. The results show a limit of detection and limit of quantification 0.482, 0.284 µg/mL, and 1.607, 0.945 µg/mL using 2,5-DMP and 4-TBP reagents respectively. Moreover, the recovery % obtained was 100.89%, and 103.37% at linear concentration range 3.0 – 50, and 10 – 30 µg/mL, with mo

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Mon Jun 17 2019
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
A Study of Positive and Negative Parity States in 114Te nucleus by the Interacting Boson Model .IBM by Neural Network(Back propagation multi-layer neural network) .
...Show More Authors

Positive and negative parity states for 114Te have been studied applying the vibration al limit U(5) of Interacting boson model (IBM- 1 ) . The present results have shown their good agreement with experimental data in addition to the determination of the spin/parity of new energy levels are not assigned experimentally as the levels 0+2 and 5+1 and the levels 3"1 and 5-1 . Then back propagation multiLayer neural network used for positive and negative parity states for 114Te and shown their membership to the Vibration limit U(5) the network implemented by MATLAB system.

View Publication Preview PDF
Publication Date
Tue Jun 01 2021
Journal Name
International Journal Of Nonlinear Analysis And Applications
A proposed method for cleaning data from outlier values using the robust rfch method in structural equation modeling
...Show More Authors

View Publication Preview PDF
Scopus (2)
Scopus
Publication Date
Tue Jan 30 2024
Journal Name
Iraqi Journal Of Science
ECC Based Encryption for the Secured Proactive Network Forensic Framework
...Show More Authors

     Elliptic Curve Cryptography (ECC) is one of the public key cryptosystems that works based on the algebraic models in the form of elliptic curves. Usually, in ECC to implement the encryption, the encoding of data must be carried out on the elliptic curve, which seems to be a preprocessing step. Similarly, after the decryption a post processing step must be conducted for mapping or decoding the corresponding data to the exact point on the elliptic curves. The Memory Mapping (MM) and Koblitz Encoding (KE) are the commonly used encoding models. But both encoding models have drawbacks as the MM needs more memory for processing and the KE needs more computational resources. To overcome these issues the proposed enhanced Koblitz encodi

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Tue Jan 01 2019
Journal Name
Energy Procedia
The effect of the activation functions on the classification accuracy of satellite image by artificial neural network
...Show More Authors

View Publication
Scopus (14)
Crossref (12)
Scopus Clarivate Crossref
Publication Date
Sun Jun 04 2017
Journal Name
Baghdad Science Journal
Improvement of the technique for the solution method of Gauss Seidel
...Show More Authors

In this paper, a new approach was suggested to the method of Gauss Seidel through the controlling of equations installation before the beginning of the method in the traditional way. New structure of equations occur after the diagnosis of the variable that causes the fluctuation and the slow extract of the results, then eradicating this variable. This procedure leads to a higher accuracy and less number of steps than the old method. By using the this proposed method, there will be a possibility of solving many of divergent values equations which cannot be solved by the old style.

View Publication Preview PDF
Scopus Crossref
Publication Date
Mon Jun 19 2023
Journal Name
Journal Of Engineering
A Linear Programming Method Based Optimal Power Flow Problem for Iraqi Extra High Voltage Grid (EHV)
...Show More Authors

The objective of an Optimal Power Flow (OPF) algorithm is to find steady state operation point which minimizes generation cost, loss etc. while maintaining an acceptable system performance in terms of limits on generators real and reactive powers, line flow limits etc. The OPF solution includes an objective function. A common objective function concerns the active power generation cost. A Linear programming method is proposed to solve the OPF problem. The Linear Programming (LP) approach transforms the nonlinear optimization problem into an iterative algorithm that in each iteration solves a linear optimization problem resulting from linearization both the objective function and constrains. A computer program, written in MATLAB environme

... Show More
View Publication Preview PDF
Crossref (1)
Crossref