Preferred Language
Articles
/
aRbXvYoBVTCNdQwC8qQ2
Hybrid Intrusion Detection System based on DNA Encoding, Teiresias Algorithm and Clustering Method
...Show More Authors

Until recently, researchers have utilized and applied various techniques for intrusion detection system (IDS), including DNA encoding and clustering that are widely used for this purpose. In addition to the other two major techniques for detection are anomaly and misuse detection, where anomaly detection is done based on user behavior, while misuse detection is done based on known attacks signatures. However, both techniques have some drawbacks, such as a high false alarm rate. Therefore, hybrid IDS takes advantage of combining the strength of both techniques to overcome their limitations. In this paper, a hybrid IDS is proposed based on the DNA encoding and clustering method. The proposed DNA encoding is done based on the UNSW-NB15 database by dividing the record's attributes into four groups, including State, Protocol, Service, and the rest of the features is Digits. Four DNA characters were used to represent each protocol attribute values. While two DNA characters are used to represent State, Service and Digits attributes values. Then, the clustering method is applied to classify the records into two clusters, either attack or normal. The current experiment results showed that the proposed system has achieved a good detection rate and accuracy results equal to 81.22% and 82.05% respectively. Also, the system achieved fast encoding and clustering time that equal 0.385 seconds and 0.00325 seconds respectively for each record.

Crossref
View Publication
Publication Date
Sun May 24 2026
Journal Name
Al-academy
Hijab and Burqa in Islamic Fashion System
...Show More Authors

View Publication
Publication Date
Tue Jan 01 2013
Journal Name
Iraqi Journal Of Physics
The dependence of resonant tunneling transmission coefficient on well width and barriers number of GaN/Al0.3Ga0.7N nanostructured system
...Show More Authors

A numerical computation for determination transmission coefficient and resonant tunneling energies of multibarriers heterostructure has been investigated. Also, we have considered GaN/Al0.3Ga0.7N superlattice system to estimate the probability of resonance at specific energy values, which are less than the potential barrier height. The transmission coefficient is determined by using the transfer matrix method and accordingly the resonant energies are obtained from the T(E) relation. The effects of both well width and number of barriers (N) are observed and discussed. The numbers of resonant tunneling peaks are generally increasing and they become sharper with the increasing of N. The resonant tunneling levels are shifted inside the well by

... Show More
View Publication
Publication Date
Sun Feb 24 2019
Journal Name
Iraqi Journal Of Physics
The dependence of resonant tunneling transmission coefficient on well width and barriers number of GaN/Al0.3Ga0.7N nanostructured system
...Show More Authors

A numerical computation for determination transmission coefficient and resonant tunneling energies of multibarriers heterostructure has been investigated. Also, we have considered GaN/Al0.3Ga0.7N superlattice system to estimate the probability of resonance at specific energy values, which are less than the potential barrier height. The transmission coefficient is determined by using the transfer matrix method and accordingly the resonant energies are obtained from the T(E) relation. The effects of both well width and number of barriers (N) are observed and discussed. The numbers of resonant tunneling peaks are generally increasing and they become sharper with the increasing of N. The resonant tunneling levels are sh

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Jan 01 2022
Journal Name
Communications In Mathematical Biology And Neuroscience
The impact of fear and harvesting on plankton-fish system dynamics incorporating harmful phytoplankton in the contaminated environment
...Show More Authors

View Publication
Scopus (2)
Scopus Clarivate Crossref
Publication Date
Tue Jun 22 2021
Journal Name
Expert Systems
Hybrid intelligent technology for plant health using the fusion of evolutionary optimization and deep neural networks
...Show More Authors

Scopus (2)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Sat Jan 01 2022
Journal Name
Geotechnical Engineering And Sustainable Construction
Stability and Seismic Performance of Tall Steel Structures with Hybrid Energy Absorbers Including P-Delta Effect
...Show More Authors

View Publication
Scopus (1)
Scopus Crossref
Publication Date
Sat Jan 01 2022
Journal Name
Ieee Access
Wrapper and Hybrid Feature Selection Methods Using Metaheuristic Algorithms for English Text Classification: A Systematic Review
...Show More Authors

Feature selection (FS) constitutes a series of processes used to decide which relevant features/attributes to include and which irrelevant features to exclude for predictive modeling. It is a crucial task that aids machine learning classifiers in reducing error rates, computation time, overfitting, and improving classification accuracy. It has demonstrated its efficacy in myriads of domains, ranging from its use for text classification (TC), text mining, and image recognition. While there are many traditional FS methods, recent research efforts have been devoted to applying metaheuristic algorithms as FS techniques for the TC task. However, there are few literature reviews concerning TC. Therefore, a comprehensive overview was systematicall

... Show More
View Publication Preview PDF
Scopus (71)
Crossref (58)
Scopus Clarivate Crossref
Publication Date
Sun Sep 01 2013
Journal Name
International Journal Of Advanced Research In Computer Science And Software Engineering
Real Time Motion Detection in Surveillance Camera Using MATLAB
...Show More Authors

Surveillance cameras are video cameras used for the purpose of observing an area. They are often connected to a recording device or IP network, and may be watched by a security guard or law enforcement officer. In case of location have less percentage of movement (like home courtyard during night); then we need to check whole recorded video to show where and when that motion occur which are wasting in time. So this paper aims at processing the real time video captured by a Webcam to detect motion in the Scene using MATLAB 2012a, with keeping in mind that camera still recorded which means real time detection. The results show accuracy and efficiency in detecting motion

Preview PDF
Publication Date
Wed Aug 30 2023
Journal Name
Al-kindy College Medical Journal
Comparative Study between RIPASA Scoring System and ALVARADO Scoring System in Diagnosing Acute Appendicitis in Adults
...Show More Authors

Background: Acute appendicitis is regarded as one of the most common inflammation that needs surgical intervention. Different scoring systems have been used for diagnosing of acute appendicitis. ALVARADO score is one of the most widely used score in diagnosing of acute appendicitis, but the accuracy of the latter is insufficiently low in Middle-East patients. Thus a new scoring system called RIPASA score has been designed for diagnosing of acute appendicitis in those patients. The aim of this study is to use RIPASA score and compare its result with ALVARADO score in diagnosing of acute appendicitis.

Subjects and Methods: The study includes 200 patients with symptoms and signs of

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Sun Jul 09 2023
Journal Name
Journal Of Engineering
New Approach in Detection MAC Spoofing in a WiFi LAN
...Show More Authors

Medium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the

... Show More
View Publication Preview PDF
Crossref