Preferred Language
Articles
/
bsj-2167
Developing an Immune Negative Selection Algorithm for Intrusion Detection in NSL-KDD data Set
...Show More Authors

With the development of communication technologies for mobile devices and electronic communications, and went to the world of e-government, e-commerce and e-banking. It became necessary to control these activities from exposure to intrusion or misuse and to provide protection to them, so it's important to design powerful and efficient systems-do-this-purpose. It this paper it has been used several varieties of algorithm selection passive immune algorithm selection passive with real values, algorithm selection with passive detectors with a radius fixed, algorithm selection with passive detectors, variable- sized intrusion detection network type misuse where the algorithm generates a set of detectors to distinguish the self-samples. Practical Experiments showed the process to achieve a high rate of detection in the system designer using data NSL-KDD with 12 field without vulnerability to change the radius of the detector or change the number of reagents were obtained as the ratio between detection (0.984, 0.998, 0.999) and the ratio between a false alarm (0.003, 0.002, 0.001). Contrary to the results of experiments conducted on data NSL-KDD with 41 field contact, which affected the rate of detection by changing the radius and the number of the detector as it has been to get the proportion of uncovered between (0.44, 0.824, 0.992) and the percentage of false alarm between (0.5, 0.175, 0.003).

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Jun 30 2008
Journal Name
Iraqi Journal Of Science
On the Greedy Ridge Function Neural Networks for Approximation Multidimensional Functions
...Show More Authors

The aim of this paper is to approximate multidimensional functions f∈C(R^s) by developing a new type of Feedforward neural networks (FFNS) which we called it Greedy ridge function neural networks (GRGFNNS). Also, we introduce a modification to the greedy algorithm which is used to train the greedy ridge function neural networks. An error bound are introduced in Sobolov space. Finally, a comparison was made between the three algorithms (modified greedy algorithm, Backpropagation algorithm and the result in [1]).

Preview PDF
Publication Date
Mon Jan 01 2018
Journal Name
Https://medwelljournals.com/journalhome.php?jid=1816-949x
Some generalized n-tuplet coincidence point theorems for nonlinear contraction mappings
...Show More Authors

Scopus (12)
Scopus
Publication Date
Wed Dec 01 2021
Journal Name
Civil Engineering Journal
Evaluating the Friction Characteristics of Pavement Surface for Major Arterial Road
...Show More Authors

The performance of the pavement in terms of vehicle safety and tire wear is affected by the friction behavior of the pavement. To highlight the main characteristics that affect the production of better friction resistance of the pavement surface in this work. The micro-texture and macro-texture of the asphalt surface of Baghdad Airport highway were studied using two methods: (sand patch method and the British pendulum test). The sand patch was examined by drawing sand grains of a specific volume, while the micro-texture was analyzed using a BPT under dry and wet surface conditions. All data obtained from the two examinations were analyzed and modelled statistically using SPSS 25 software. Results show that skid resistance of pavemen

... Show More
Scopus (7)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Tue Aug 15 2017
Journal Name
Research Journal Of Applied Sciences, Engineering And Technology
A Prototype and Roadmap for Transition to IPv6 with Performance Evaluation
...Show More Authors

The migration from IPv4 to IPv6 can not be achieved in a brief period, thus both protocols co-exist at certain years. IETF Next Generation Transition Working Group (NGtrans) developed IPv4/IPv6 transition mechanisms. Since Iraq infrastructure, including universities, companies and institutions still use IPv4 protocol only. This research article tries to highlight, discuss a required transition roadmap and extend the local knowledge and practice on IPv6. Also, it introduces a prototype model using Packet tracer (network simulator) deployed for the design and implementation of IPv6 migration. Finally, it compares and evaluates the performance of IPv6, IPv4 and dual stack using OPNET based on QoS metrics such as throughput, delay and point to

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Thu Dec 13 2018
Journal Name
International Journal Of Engineering & Technology
Microwave Pyrolysis of Water hyacinth for Biochar Production Using Taguchi Method
...Show More Authors

The manuscript should contain an abstract. The abstract should be self-contained and citation-free and should not exceed 200 words. The abstract should state the purpose, approach, results and conclusions of the work.  The author should assume that the reader has some knowledge of the subject but has not read the paper. Thus, the abstract should be intelligible and complete in it-self (no numerical references); it should not cite figures, tables, or sections of the paper. The abstract should be written using third person instead of first perso The fast microwave assisted pyrolysis (FMWAP) of water hyacinth (WH) for biochar production is investigated. Taguchi’s method was used to optimize FMWAP parameters. The effects of microwave

... Show More
View Publication
Scopus (7)
Crossref (6)
Scopus Crossref
Publication Date
Sun Feb 25 2024
Journal Name
Iraqi Journal Of Agricultural Sciences
THE EFFICIENCY OF GUM-SILICA CMPOSITE FOR REMOVING OF WASTEWATER TURBIDITY
...Show More Authors

A novel mixed natural coagulant has been developed to remove sewage pollutants and heavy metals from Qanat- al- Jayesh by using low cost adsorbent natural materials. In these materials, significant interaction contains Arabic gum mixed with extracted silica from rice husk ash (natural coagulants) by the Batch device approach, using two variables, pH values ranging from 5-8 and contact times between 0.25-5 hrs. All wastewater samples were collected after treatment by adsorbents and examined for determination of residual heavy metal concentrations: Pb, Ni, Zn and Cu by atomic absorption spectroscopy (AAS), turbidity, pH, total dissolved salts (TDS), electrical conductivity (EC) and total salinity (TS). The results obtained indicate Th

... Show More
View Publication
Scopus (2)
Crossref (2)
Scopus Crossref
Publication Date
Sun Jul 09 2023
Journal Name
Journal Of Engineering
Iron Permeable Reactive Barrier for Removal of Lead from Contaminated Groundwater
...Show More Authors

The possibility of using zero-valent iron as permeable reactive barrier in removing lead from a contaminated groundwater was investigated. In the batch tests, the effects of many parameters such as contact time between adsorbate and adsorbent (0-240 min), initial pH of the solution (4-8), sorbent dosage (1-12 g/100 mL), initial metal concentration (50-250 mg/L), and agitation speed
(0-250 rpm) were studied. The results proved that the best values of these parameters achieve the maximum removal efficiency of Pb+2 (=97%) were 2 hr, 5, 5 g/100 mL, 50 mg/L and 200 rpm respectively. The sorption data of Pb+2 ions on the zero-valent iron have been performed well by Langmuir isotherm model in compared with Freundlich model under the studied

... Show More
View Publication Preview PDF
Crossref (5)
Crossref
Publication Date
Sun Sep 01 2019
Journal Name
2019 11th Computer Science And Electronic Engineering (ceec)
ANN based Measurement for No-Reference Video Quality of Experience Metric
...Show More Authors

View Publication
Scopus (3)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Wed Jul 05 2017
Journal Name
Neural Computing And Applications
Hybrid soft computing approach for determining water quality indicator: Euphrates River
...Show More Authors

View Publication
Scopus (37)
Crossref (32)
Scopus Clarivate Crossref
Publication Date
Sat Jun 01 2013
Journal Name
Journal Of Economics And Administrative Sciences
Psychological Capital: Behavioral Insight for Study of Spirituality at the Workplace
...Show More Authors

Abstract

      This research aims to identify the role of Psychological Capital (PsyCap) in the Spirituality at the Workplace (SAW) for a sample of the teaching staff of the four Colleges of the University of Kufa reached (200) out of (470) teaching, and to achieve the objective of this research and through access to research and studies of foreign adopted researchers standards scales of research variables, since it relied on the model (Luthans, Youssef, et al., 2007) to represent the components of Psychological Capital (self-efficacy, and hope, and optimism, and resilience), and given the attention organizations in the human element because of it

... Show More
View Publication Preview PDF
Crossref