Preferred Language
Articles
/
9hdcWZIBVTCNdQwC6azZ
Efficient Intrusion Detection Through the Fusion of AI Algorithms and Feature Selection Methods
...Show More Authors

With the proliferation of both Internet access and data traffic, recent breaches have brought into sharp focus the need for Network Intrusion Detection Systems (NIDS) to protect networks from more complex cyberattacks. To differentiate between normal network processes and possible attacks, Intrusion Detection Systems (IDS) often employ pattern recognition and data mining techniques. Network and host system intrusions, assaults, and policy violations can be automatically detected and classified by an Intrusion Detection System (IDS). Using Python Scikit-Learn the results of this study show that Machine Learning (ML) techniques like Decision Tree (DT), Naïve Bayes (NB), and K-Nearest Neighbor (KNN) can enhance the effectiveness of an Intrusion Detection System (IDS). Success is measured by a variety of metrics, including accuracy, precision, recall, F1-Score, and execution time. Applying feature selection approaches such as Analysis of Variance (ANOVA), Mutual Information (MI), and Chi-Square (Ch-2) reduced execution time, increased detection efficiency and accuracy, and boosted overall performance. All classifiers achieve the greatest performance with 99.99% accuracy and the shortest computation time of 0.0089 seconds while using ANOVA with 10% of features.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Jul 01 2021
Journal Name
Journal Of Physics: Conference Series
Estimation of the reliability function of the Rayleigh distribution using some robust and kernel methods
...Show More Authors
Abstract<p>The research presents the reliability. It is defined as the probability of accomplishing any part of the system within a specified time and under the same circumstances. On the theoretical side, the reliability, the reliability function, and the cumulative function of failure are studied within the one-parameter Raleigh distribution. This research aims to discover many factors that are missed the reliability evaluation which causes constant interruptions of the machines in addition to the problems of data. The problem of the research is that there are many methods for estimating the reliability function but no one has suitable qualifications for most of these methods in the data such </p> ... Show More
View Publication
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Sat Dec 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
Comparison Between Ordinary Methods (LS,IV) and Robust Methods (2SWLS,LTS,RA) to estimate the Parameters of ARX(1,1,1) Model for Electric Loads
...Show More Authors

 

Abstract:

The models of time series often suffer from the problem of the existence of outliers ​​that accompany the data collection process for many reasons, their existence may have a significant impact on the estimation of the parameters of the studied model. Access to highly efficient estimators  is one of the most important stages of statistical analysis, And it is therefore important to choose the appropriate methods to obtain good  estimators. The aim of this research is to compare the ordinary estimators and the robust estimators of the estimation of the parameters of

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Dec 22 2021
Journal Name
Polymers
Modifications of Polymers through the Addition of Ultraviolet Absorbers to Reduce the Aging Effect of Accelerated and Natural Irradiation
...Show More Authors

The photooxidative degradation process of plastics caused by ultraviolet irradiation leads to bond breaking, crosslinking, the elimination of volatiles, formation of free radicals, and decreases in weight and molecular weight. Photodegradation deteriorates both the mechanical and physical properties of plastics and affects their predicted life use, in particular for applications in harsh environments. Plastics have many benefits, while on the other hand, they have numerous disadvantages, such as photodegradation and photooxidation in harsh environments and the release of toxic substances due to the leaching of some components, which have a negative effect on living organisms. Therefore, attention is paid to the design and use of saf

... Show More
View Publication
Scopus (69)
Crossref (55)
Scopus Clarivate Crossref
Publication Date
Thu Oct 01 2015
Journal Name
Journal Of Economics And Administrative Sciences
Create sustainable value to the customer through the integration of the relationship between total quality management and relationship marketing
...Show More Authors

Purpose: This research seeks to provide a point of view based on the creation of sustainable value to the customer of the banks in the context of total quality management and relationship marketing. It aims to develop a model to measure the value of sustainable customer peduncular under total quality management PAL (administrative leadership, involvement of employees, continuous improvement, process improvement, staff training), through the mediation of relationship marketing and objective dimensions (administrative leadership, involvement of employees, continuous improvement, improving processes , staff training), and to explore any of the variables and dimensions more influential in the creation of sustainable value to the cust

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Oct 01 2023
Journal Name
Baghdad Science Journal
Using VGG Models with Intermediate Layer Feature Maps for Static Hand Gesture Recognition
...Show More Authors

A hand gesture recognition system provides a robust and innovative solution to nonverbal communication through human–computer interaction. Deep learning models have excellent potential for usage in recognition applications. To overcome related issues, most previous studies have proposed new model architectures or have fine-tuned pre-trained models. Furthermore, these studies relied on one standard dataset for both training and testing. Thus, the accuracy of these studies is reasonable. Unlike these works, the current study investigates two deep learning models with intermediate layers to recognize static hand gesture images. Both models were tested on different datasets, adjusted to suit the dataset, and then trained under different m

... Show More
View Publication Preview PDF
Scopus (11)
Crossref (3)
Scopus Crossref
Publication Date
Tue Jan 01 2013
Journal Name
Communications And Network
Link and Cost Optimization of FTTH Network Implementation through GPON Technology
...Show More Authors

View Publication Preview PDF
Crossref (4)
Crossref
Publication Date
Wed Aug 20 2025
Journal Name
International Journal Of Advanced Research In Computer Science
IMPROVE DATA ENCRYPTION BY USING DIFFIE-HELLMAN AND DNA ALGORITHMS, AUTHENTICATED BY HMAC-HASH256
...Show More Authors

: The need for means of transmitting data in a confidential and secure manner has become one of the most important subjects in the world of communications. Therefore, the search began for what would achieve not only the confidentiality of information sent through means of communication, but also high speed of transmission and minimal energy consumption, Thus, the encryption technology using DNA was developed which fulfills all these requirements [1]. The system proposes to achieve high protection of data sent over the Internet by applying the following objectives: 1. The message is encrypted using one of the DNA methods with a key generated by the Diffie-Hellman Ephemeral algorithm, part of this key is secret and this makes the pro

... Show More
View Publication
Crossref
Publication Date
Tue Aug 01 2023
Journal Name
Baghdad Science Journal
Digital Data Encryption Using a Proposed W-Method Based on AES and DES Algorithms
...Show More Authors

This paper proposes a new encryption method. It combines two cipher algorithms, i.e., DES and AES, to generate hybrid keys. This combination strengthens the proposed W-method by generating high randomized keys. Two points can represent the reliability of any encryption technique. Firstly, is the key generation; therefore, our approach merges 64 bits of DES with 64 bits of AES to produce 128 bits as a root key for all remaining keys that are 15. This complexity increases the level of the ciphering process. Moreover, it shifts the operation one bit only to the right. Secondly is the nature of the encryption process. It includes two keys and mixes one round of DES with one round of AES to reduce the performance time. The W-method deals with

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (4)
Scopus Crossref
Publication Date
Tue Mar 01 2022
Journal Name
Iraqi Journal Of Agricultural Sciences
CORRELATION OF TMPRSS2-ERG GENE FUSION STATUS WITH CLINICOPATHOLOGICAL CHARACTERISTICS IN PROSTATE CANCER OF IRAQI PATIENTS
...Show More Authors

Publication Date
Wed Jun 29 2022
Journal Name
Iraqi Journal Of Agricultural Sciences
CORRELATION OF TMPRSS2-ERG GENE FUSION STATUS WITH CLINICOPATHOLOGICAL CHARACTERISTICS IN PROSTATE CANCER OF IRAQI PATIENTS
...Show More Authors

The aim of this study was to establish the existence and interaction of TMPRSS2 – ERG gene fusion status with clinicopathological features of prostate cancer patients. This research consisted of 123 embedded formalin-fixed tissues obtained from the prostate tumor patients. The above gene fusion is detected through the technique of fluorescent in situ hybridization (FISH) by means of a triple color probe. Seven samples have not been scored due to technical difficulties and 46 patients have fusion (39.6%), while the remaining (70) have not been seen with fusion. Of the 46 fusion-positive, 17 (36%) were caused by ERG-translocation, of the other 29 (63%) were caused by the interstitial segment deletion between the two genes due to the

... Show More
Preview PDF
Scopus (1)
Scopus Crossref