Preferred Language
Articles
/
Nxbp4osBVTCNdQwCl-N8
Anomaly Based Intrusion Detection System Using Hierarchical Classification and Clustering Techniques
...Show More Authors

With the rapid development of computers and network technologies, the security of information in the internet becomes compromise and many threats may affect the integrity of such information. Many researches are focused theirs works on providing solution to this threat. Machine learning and data mining are widely used in anomaly-detection schemes to decide whether or not a malicious activity is taking place on a network. In this paper a hierarchical classification for anomaly based intrusion detection system is proposed. Two levels of features selection and classification are used. In the first level, the global feature vector for detection the basic attacks (DoS, U2R, R2L and Probe) is selected. In the second level, four local feature vectors to determine the sub-class of each attack type are selected. Features are evaluated to measure its discrimination ability among classes. K-Means clustering algorithm is then used to cluster each class into two clusters. SFFS and ANN are used in hierarchical basis to select the relevant features and classify the query behavior to proper intrusion type. Experimental evaluation on NSL-KDD, a filtered version of the original KDD99 has shown that the proposed IDS can achieve good performance in terms of intrusions detection and recognition.

Scopus Clarivate Crossref
View Publication
Publication Date
Mon Feb 01 2016
Journal Name
Journal Of Engineering
Valuation of Construction Projects Based on of Quantity Scale by using Expert System
...Show More Authors

The subject of an valuation of quality of construction projects is one of the topics which it becomes necessary of the absence of the quantity standards in measuring the control works and the quality valuation standards in constructional projects. In the time being it depends on the experience of the workers which leads to an apparent differences in the valuation.

The idea of this research came to put the standards to evaluate the quality of the projects in a special system depending on quantity scale nor quality specifying in order to prepare an expert system “ Crystal “ to apply this special system to able the engineers to valuate the quality of their projects easily and in more accurate ways.

View Publication Preview PDF
Publication Date
Fri Nov 01 2019
Journal Name
International Journal Of Computer Science And Mobile Computing
Adaptive Color Image Compression of Hybrid Coding and Inter Differentiation Based Techniques
...Show More Authors

Publication Date
Thu Dec 01 2022
Journal Name
Baghdad Science Journal
Steganography and Cryptography Techniques Based Secure Data Transferring Through Public Network Channel
...Show More Authors

Attacking a transferred data over a network is frequently happened millions time a day. To address this problem, a secure scheme is proposed which is securing a transferred data over a network. The proposed scheme uses two techniques to guarantee a secure transferring for a message. The message is encrypted as a first step, and then it is hided in a video cover.  The proposed encrypting technique is RC4 stream cipher algorithm in order to increase the message's confidentiality, as well as improving the least significant bit embedding algorithm (LSB) by adding an additional layer of security. The improvement of the LSB method comes by replacing the adopted sequential selection by a random selection manner of the frames and the pixels wit

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Mon Mar 08 2021
Journal Name
Baghdad Science Journal
Developing of bacterial mutagenic assay system for detection
...Show More Authors

Been Antkhav three isolates of soil classified as follows: Bacillus G3 consists of spores, G12, G27 led Pal NTG treatment to kill part of the cells of the three isolates varying degrees treatment also led to mutations urged resistance to streptomycin and rifampicin and double mutations

View Publication Preview PDF
Publication Date
Mon Oct 30 2023
Journal Name
Iraqi Journal Of Science
Machine Learning Approach for Facial Image Detection System
...Show More Authors

HM Al-Dabbas, RA Azeez, AE Ali, Iraqi Journal of Science, 2023

View Publication
Scopus (7)
Scopus
Publication Date
Sun Nov 01 2020
Journal Name
Iop Conference Series: Materials Science And Engineering
Development of an Optimized Botnet Detection Framework based on Filters of Features and Machine Learning Classifiers using CICIDS2017 Dataset
...Show More Authors
Abstract<p>Botnet is a malicious activity that tries to disrupt traffic of service in a server or network and causes great harm to the network. In modern years, Botnets became one of the threads that constantly evolving. IDS (intrusion detection system) is one type of solutions used to detect anomalies of networks and played an increasing role in the computer security and information systems. It follows different events in computer to decide to occur an intrusion or not, and it used to build a strategic decision for security purposes. The current paper <italic>suggests</italic> a hybrid detection Botnet model using machine learning approach, performed and analyzed to detect Botnet atta</p> ... Show More
View Publication
Scopus (21)
Crossref (12)
Scopus Crossref
Publication Date
Wed Jul 06 2022
Journal Name
Journal Of Al-qadisiyah For Computer Science And Mathematics
Pixel Based Techniques for Gray Image Compression: A review
...Show More Authors

Currently, with the huge increase in modern communication and network applications, the speed of transformation and storing data in compact forms are pressing issues. Daily an enormous amount of images are stored and shared among people every moment, especially in the social media realm, but unfortunately, even with these marvelous applications, the limited size of sent data is still the main restriction's, where essentially all these applications utilized the well-known Joint Photographic Experts Group (JPEG) standard techniques, in the same way, the need for construction of universally accepted standard compression systems urgently required to play a key role in the immense revolution. This review is concerned with Different

... Show More
View Publication
Crossref (1)
Crossref
Publication Date
Fri Mar 01 2019
Journal Name
Al-khwarizmi Engineering Journal
COMPUTER-BASED ECG SIGNAL ANALYSIS AND MONITORING SYSTEM
...Show More Authors

This paper deals with the design and implementation of an ECG system. The proposed system gives a new concept of ECG signal manipulation, storing, and editing. It consists mainly of hardware circuits and the related software. The hardware includes the circuits of ECG signals capturing, and system interfaces. The software is written using Visual Basic languages, to perform the task of identification of the ECG signal. The main advantage of the system is to provide a reported ECG recording on a personal computer, so that it can be stored and processed at any time as required. This system was tested for different ECG signals, some of them are abnormal and the other is normal, and the results show that the system has a good quality of diagno

... Show More
View Publication Preview PDF
Publication Date
Sun Dec 31 2023
Journal Name
International Journal On Technical And Physical Problems Of Engineering
A Multiple System Biometric System Based on ECG Data
...Show More Authors

A Multiple System Biometric System Based on ECG Data

Scopus
Publication Date
Sun Feb 25 2024
Journal Name
Baghdad Science Journal
Hybrid CNN-based Recommendation System
...Show More Authors

Recommendation systems are now being used to address the problem of excess information in several sectors such as entertainment, social networking, and e-commerce. Although conventional methods to recommendation systems have achieved significant success in providing item suggestions, they still face many challenges, including the cold start problem and data sparsity. Numerous recommendation models have been created in order to address these difficulties. Nevertheless, including user or item-specific information has the potential to enhance the performance of recommendations. The ConvFM model is a novel convolutional neural network architecture that combines the capabilities of deep learning for feature extraction with the effectiveness o

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (4)
Scopus Crossref