Preferred Language
Articles
/
TEJExZkBMeyNPGM3LbjR
Intrusion Detection System for IoT Based on Modified Random Forest Algorithm
...Show More Authors

An intrusion detection system (IDS) is key to having a comprehensive cybersecurity solution against any attack, and artificial intelligence techniques have been combined with all the features of the IoT to improve security. In response to this, in this research, an IDS technique driven by a modified random forest algorithm has been formulated to improve the system for IoT. To this end, the target is made as one-hot encoding, bootstrapping with less redundancy, adding a hybrid features selection method into the random forest algorithm, and modifying the ranking stage in the random forest algorithm. Furthermore, three datasets have been used in this research, IoTID20, UNSW-NB15, and IoT-23. The results are compared with the three datasets mentioned above and it emerges that the accuracy of the proposed system is 96.2%, which is better than the other methods in the IoTID20 Dataset, while the accuracy with the second dataset UNSW-NB15 yielded 98.85%. Lastly, using the third dataset, IoT-23, the suggested technique achieved 99.93%.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Oct 01 2012
Journal Name
Iraqi Journal Of Physics
Nanostructural study of Ti-Ni binary alloy prepared by mechanical alloying
...Show More Authors

In the present study, a powder mixture of elements Ti and Ni was mechanically alloyed in a high energy ball mill. Microstructure of the nanosized amorphous milled product in different stages of milling has been characterized by X- ray diffraction, scanning electron microscopy and differential thermal analysis. We found that time of mechanical alloying is more significant to convert all crystalline structure to the amorphous phase. Nanocrystalline phase was achieved as a result of the mechanical alloying process. The results also indicates that the phase transformation and the grain size occurs in these alloys are controlled by ball milling time

View Publication Preview PDF
Publication Date
Sun Jun 30 2019
Journal Name
International Journal Of Research In Social Sciences And Humanities
CHARACTERISTICS OF THE POWER CHAIN FUNCTION CURVE AND ITS RELATION TO THE ACCURACY OF THE HIGH-JUMP JUMP IN THE HANDBALL
...Show More Authors

The skill high-jump scoring is based on mechanical and physical abilities. The most important of all is the strength used by the player from the moment of preparation to the moment of scoring, which led the researchers to study the characteristics of the series of power chain functions of this skill according to (Biosyn System) The players of the national team's back line have a handball to find out the relationship between the properties of the power chain curve and the accuracy of the high jump to the upper and lower target angles. The aim of the research was to identify the values of the Force Series variables for the skill of the high-jump curve of the handball as well as the relationship between the properties of the power chain functi

... Show More
Publication Date
Thu Dec 28 2017
Journal Name
Al-khwarizmi Engineering Journal
Aircraft Lateral-Directional Stability in Critical Cases via Lyapunov Exponent Criterion
...Show More Authors

Based on Lyapunov exponent criterion, the aircraft lateral-directional stability during critical flight cases is presented. A periodic motion or limit cycle oscillation isdisplayed. A candidate mechanism for the wing rock limit cycle is the inertia coupling between an unstable lateral-directional (Dutch roll) mode with stable longitudinal (short period) mode. The coupling mechanism is provided by the nonlinear interaction of motion related terms in the complete set equations of motion. To analyze the state variables of the system, the complete set of nonlinear equations of motion at different high angles of attack are solved. A novel analysis including the variation of roll angle as a function of angle of attack is proposed. Furthermore

... Show More
View Publication Preview PDF
Publication Date
Wed Feb 19 2020
Journal Name
International Journal Of Innovation, Creativity And Change
Secure Image Steganography Through Multilevel Security
...Show More Authors

The concealment of data has emerged as an area of deep and wide interest in research that endeavours to conceal data in a covert and stealth manner, to avoid detection through the embedment of the secret data into cover images that appear inconspicuous. These cover images may be in the format of images or videos used for concealment of the messages, yet still retaining the quality visually. Over the past ten years, there have been numerous researches on varying steganographic methods related to images, that emphasised on payload and the quality of the image. Nevertheless, a compromise exists between the two indicators and to mediate a more favourable reconciliation for this duo is a daunting and problematic task. Additionally, the current

... Show More
Publication Date
Sat Jul 06 2013
Journal Name
Creative Construction Conference 2013
The challenges of governing public private partnership in Iraq infrastructure projects
...Show More Authors

Public-private partnership (PPP) has been used over the past 20-30 years by governments in developed countries to meet the public demand for infrastructural services. In Iraq, the PPP concept is comparatively new to the Government of Iraq (GoI), where the government has historically taken most of the responsibility for providing public services. There are few PPP projects in Iraq. However, the number is increasing. Recently the Iraqi market has experienced a number of attempts of PPP in different sectors, especially after the new investment law in 2006. The aim of this paper is to evaluate the investment environment in Iraq and to indicate the main factors affecting PPP in particular for infrastructure projects. Some literature review and

... Show More
Publication Date
Mon Aug 28 2023
Journal Name
Journal Of Planner And Development
Using GIS to identify hazardous earthquake locations in Iran
...Show More Authors

The objective of all planning research is to plan for human comfort and safety, and one of the most significant natural dangers to which humans are exposed is earthquake risk; therefore, earthquake risks must be anticipated, and with the advancement of global technology, it is possible to obtain information on earthquake hazards. GIS has been utilized extensively in the field of environmental assessment research due to its high potential, and GIS is a crucial application in seismic risk assessment. This paper examines the methodologies used in recent GIS-based seismic risk studies, their primary environmental impacts on urban areas, and the complexity of the relationship between the applied methodological approaches and the resulting env

... Show More
View Publication Preview PDF
Publication Date
Fri Feb 28 2020
Journal Name
Iraqi Journal Of Agricultural Sciences (ijas)
PHYTOTOXICITY TEST OF KEROSENE-CONTAMINATED SOIL USING BARLEY
...Show More Authors

This study was aimed to determine a phytotoxicity experiment with kerosene as a model of a total petroleum hydrocarbon (TPHs) as Kerosene pollutant at different concentrations (1% and 6%) with aeration rate (0 and 1 L/min) and retention time (7, 14, 21, 28 and 42 days), was carried out in a subsurface flow system (SSF) on the Barley wetland. It was noted that greatest elimination 95.7% recorded at 1% kerosene levels and aeration rate 1L / min after a period of 42 days of exposure; whereas it was 47% in the control test without plants. Furthermore, the percent of elimination efficiencies of hydrocarbons from the soil was ranged between 34.155%-95.7% for all TPHs (Kerosene) concentrations at aeration rate (0 and 1 L/min). The Barley c

... Show More
Crossref
Publication Date
Fri Jun 17 2022
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Lornoxicam-Loaded Cubosomes: - Preparation and In vitro Characterization.
...Show More Authors

Cubosomes are nanosized structures self-assembled nanostructured materials used for controlling the release of the entrapped drug molecule. Lornoxicam (LXM) is a potent analgesic nonsteroidal anti-inflammatory (NSAID) drug with a short half-life (3-4) hours. The present study aims to prepare LXM-loaded cubosomes with well-defined morphology, particle size, PDI, high entrapment efficiency, sustained drug release, and high zeta potential value, as a transdermal drug delivery system.

      Twelve formulas of LXM-loaded cubosomal dispersions were prepared by a solvent dilution method using Glyceryl monooleate ( GMO) as polar lipid with different stabilizers as Pluronic® F127 or tween 80 and different types o

... Show More
View Publication Preview PDF
Scopus (22)
Crossref (6)
Scopus Crossref
Publication Date
Thu Jun 01 2023
Journal Name
Baghdad Science Journal
Simultaneous Determination of Piroxicam and Codeine Phosphate Hemihydrate in a Pharmaceutical Dosage Form Using Validated HPLC Method
...Show More Authors

An easy, eclectic, precise high-Performance Liquid Chromatographic (HPLC) procedure was evolved and validated to estimate of Piroxicam and Codeine phosphate. Chromatographic demarcation was accomplished on a C18 column [Use BDS Hypersil C18, 5μ, 150 x 4.6 mm] using a mobile phase of methanol: phosphate buffer (60:40, v/v, pH=2.3), the flow rate was 1.1 mL/min, UV detection was at 214 nm. System Suitability tests (SSTs) are typically performed to assess the suitability and effectiveness of the entire chromatography system. The retention time for Piroxicam was found to be 3.95 minutes and 1.46 minutes for Codeine phosphate. The evolved method has been validated through precision, limit of quantitation, specificity,

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (1)
Scopus Crossref
Publication Date
Sun Jun 05 2011
Journal Name
Baghdad Science Journal
Applying Quran Security and Hamming CodesFor Preventing of Text Modification
...Show More Authors

The widespread of internet allover the world, in addition to the increasing of the huge number of users that they exchanged important information over it highlights the need for a new methods to protect these important information from intruders' corruption or modification. This paper suggests a new method that ensures that the texts of a given document cannot be modified by the intruders. This method mainly consists of mixture of three steps. The first step which barrows some concepts of "Quran" security system to detect some type of change(s) occur in a given text. Where a key of each paragraph in the text is extracted from a group of letters in that paragraph which occur as multiply of a given prime number. This step cannot detect the ch

... Show More
View Publication Preview PDF
Crossref