Preferred Language
Articles
/
bsj-4000
Anomaly Detection Approach Based on Deep Neural Network and Dropout
...Show More Authors

   Regarding to the computer system security, the intrusion detection systems are fundamental components for discriminating attacks at the early stage. They monitor and analyze network traffics, looking for abnormal behaviors or attack signatures to detect intrusions in early time. However, many challenges arise while developing flexible and efficient network intrusion detection system (NIDS) for unforeseen attacks with high detection rate. In this paper, deep neural network (DNN) approach was proposed for anomaly detection NIDS. Dropout is the regularized technique used with DNN model to reduce the overfitting. The experimental results applied on NSL_KDD dataset. SoftMax output layer has been used with cross entropy loss function to enforce the proposed model in multiple classification, including five labels, one is normal and four others are attacks (Dos, R2L, U2L and Probe). Accuracy metric was used to evaluate the model performance. The proposed model accuracy achieved to 99.45%. Commonly the recognition time is reduced in the NIDS by using feature selection technique. The proposed DNN classifier implemented with feature selection algorithm, and obtained on accuracy reached to 99.27%.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Feb 16 2026
Journal Name
Journal Of Baghdad College Of Dentistry
Stem cells a novel approach to periodontal regeneration (A review of literature)
...Show More Authors

In this review of literature, the light will be concentrated on the role of stem cells as an approach in periodontal regeneration.

View Publication Preview PDF
Publication Date
Mon Mar 03 2014
Journal Name
Journal Of Baghdad College Of Dentistry
Stem Cells a Novel Approach to Periodontal Regeneration: A Review of Literature
...Show More Authors

Publication Date
Sun Dec 02 2012
Journal Name
Baghdad Science Journal
Numerical Approach of Linear Volterra Integro-Differential Equations Using Generalized Spline Functions
...Show More Authors

This paper is dealing with non-polynomial spline functions "generalized spline" to find the approximate solution of linear Volterra integro-differential equations of the second kind and extension of this work to solve system of linear Volterra integro-differential equations. The performance of generalized spline functions are illustrated in test examples

View Publication Preview PDF
Crossref
Publication Date
Sat Jun 30 2007
Journal Name
Al-kindy College Medical Journal
Diagnostic Approach of Atypical Cells in Effusion Cytology Using Computerized Image Analysis
...Show More Authors

Background: Cytology is one of the important diagnostic tests done on effusion fluid. It can detect malignant cells in up to 60% of malignant cases. The most important benign cell present in these effusions is the mesothelial cell. Mesothelial atypia can be striking andmay simulate metastatic carcinoma. Many clinical conditions may produce such a reactive atypical cells as in anemia,SLE, liver cirrhosis and many other conditions. Recently many studies showed the value of computerized image analysis in differentiating atypical cells from malignant adenocarcinoma cells in effusion smears. Other studies support the reliability of the quantitative analysisand morphometric features and proved that they are objective prognostic indices. Method

... Show More
View Publication Preview PDF
Publication Date
Wed Jan 01 2014
Journal Name
Siam Journal On Control And Optimization
A Duality Approach for Solving Control-Constrained Linear-Quadratic Optimal Control Problems
...Show More Authors

View Publication
Scopus (24)
Crossref (22)
Scopus Clarivate Crossref
Publication Date
Sun Mar 03 2024
Journal Name
Buildings
Reduced Volume Approach to Evaluate Biaxial Bubbled Slabs’ Resistance to Punching Shear
...Show More Authors

The bubbled slab, a type of reinforced concrete (RC) slab with plastic voids, is an innovative design that employs a biaxial distribution of voiding formers within the slab to reduce the slab’s self-weight while preserving a load-carrying capacity that is approximately comparable to that of solid slabs. This paper presents a new approach for figuring out the effective critical shear perimeter of voided slabs using the reduced-volume concept of concrete. This approach aims to reduce the coefficient of variation of the current design standards, namely the ACI 318-19 and Eurocode 2, for assessing the slabs’ resistance to punching shear. Our experimental program investigated the impact of voiding former patterns and the location of

... Show More
View Publication
Scopus (4)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Thu May 18 2023
Journal Name
College Of Islamic Sciences
The jurisprudential approach Imam Al-Qurtubi through his interpretation Verses of rulings
...Show More Authors

There are great figures in our nation, who are famous for their encyclopedia in their sciences, and their fame spreads across the horizons for what they presented to their religion and nation.
So they became torches of guidance, advocates of goodness, and treasuries of knowledge until God inherits the earth and those on it.
Among these imams is Imam al-Qurtubi, who died in the year (671 AH), after whom he left a great legacy of valuable books, including this one, which is the subject of my research, his valuable interpretation (Al-Jami’ Li Ahkam Al-Qur’an). Taking from him and his approach in interpreting the verses of judgment, following the method of extrapolation, investigation and deduction to know his style, which he used

... Show More
View Publication Preview PDF
Publication Date
Sun Jan 01 2023
Journal Name
Organization, Technology And Management In Construction: An International Journal
Using the ordinal priority approach for selecting the contractor in construction projects
...Show More Authors
Abstract<p>Effective decision-making process is the basis for successfully solving any engineering problem. Many decisions taken in the construction projects differ in their nature due to the complex nature of the construction projects. One of the most crucial decisions that might result in numerous issues over the course of a construction project is the selection of the contractor. This study aims to use the ordinal priority approach (OPA) for the contractor selection process in the construction industry. The proposed model involves two computer programs; the first of these will be used to evaluate the decision-makers/experts in the construction projects, while the second will be used to formul</p> ... Show More
View Publication
Scopus (5)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Wed Nov 01 2023
Journal Name
Solar Energy
Optimizing performance of water-cooled photovoltaic-thermal modules: A 3D numerical approach
...Show More Authors

To evaluate and improve the efficiency of photovoltaic solar modules connected with linear pipes for water supply, a three-dimensional numerical simulation is created and simulated via commercial software (Ansys-Fluent). The optimization utilizes the principles of the 1st and 2nd laws of thermodynamics by employing the Response Surface Method (RSM). Various design parameters, including the coolant inlet velocity, tube diameter, panel dimensions, and solar radiation intensity, are systematically varied to investigate their impacts on energetic and exergitic efficiencies and destroyed exergy. The relationship between the design parameters and the system responses is validated through the development of a predictive model. Both single and mult

... Show More
View Publication
Scopus (27)
Crossref (31)
Scopus Clarivate Crossref
Publication Date
Sat Jun 01 2019
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Bulk binding approach for PMIPv6 protocol to reduce handoff latency in IoT
...Show More Authors

<p>Mobility management protocols are very essential in the new research area of Internet of Things (IoT) as the static attributes of nodes are no longer dominant in the current environment. Proxy MIPv6 (PMIPv6) protocol is a network-based mobility management protocol, where the mobility process is relied on the network entities, named, Mobile Access Gateways (MAGs) and Local Mobility Anchor (LMA). PMIPv6 is considered as the most suitable mobility protocol for WSN as it relieves the sensor nodes from participating in the mobility signaling. However, in PMIPv6, a separate signaling is required for each mobile node (MN) registration, which may increase the network signaling overhead and lead to increase the total handoff latency

... Show More
View Publication
Scopus (3)
Crossref (1)
Scopus Crossref