Preferred Language
Articles
/
bsj-6210
Performance Evaluation of Intrusion Detection System using Selected Features and Machine Learning Classifiers
...Show More Authors

Some of the main challenges in developing an effective network-based intrusion detection system (IDS) include analyzing large network traffic volumes and realizing the decision boundaries between normal and abnormal behaviors. Deploying feature selection together with efficient classifiers in the detection system can overcome these problems.  Feature selection finds the most relevant features, thus reduces the dimensionality and complexity to analyze the network traffic.  Moreover, using the most relevant features to build the predictive model, reduces the complexity of the developed model, thus reducing the building classifier model time and consequently improves the detection performance.  In this study, two different sets of selected features have been adopted to train four machine-learning based classifiers.  The two sets of selected features are based on Genetic Algorithm (GA) and Particle Swarm Optimization (PSO) approach respectively.  These evolutionary-based algorithms are known to be effective in solving optimization problems.  The classifiers used in this study are Naïve Bayes, k-Nearest Neighbor, Decision Tree and Support Vector Machine that have been trained and tested using the NSL-KDD dataset. The performance of the abovementioned classifiers using different features values was evaluated.  The experimental results indicate that the detection accuracy improves by approximately 1.55% when implemented using the PSO-based selected features than that of using GA-based selected features.  The Decision Tree classifier that was trained with PSO-based selected features outperformed other classifiers with accuracy, precision, recall, and f-score result of 99.38%, 99.36%, 99.32%, and 99.34% respectively.  The results show that using optimal features coupling with a good classifier in a detection system able to reduce the classifier model building time, reduce the computational burden to analyze data, and consequently attain high detection rate.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Sep 01 2021
Journal Name
Baghdad Science Journal
Fuzzy-assignment Model by Using Linguistic Variables
...Show More Authors

      This work addressed the assignment problem (AP) based on fuzzy costs, where the objective, in this study, is to minimize the cost. A triangular, or trapezoidal, fuzzy numbers were assigned for each fuzzy cost. In addition, the assignment models were applied on linguistic variables which were initially converted to quantitative fuzzy data by using the Yager’sorankingi method. The paper results have showed that the quantitative date have a considerable effect when considered in fuzzy-mathematic models.

View Publication Preview PDF
Scopus (6)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Thu Nov 07 2024
Journal Name
Journal Of Thermal Analysis And Calorimetry
Performance improvement of phase change material (PCM)-based shell-and-tube-type latent heat energy storage system utilizing curved fins
...Show More Authors

View Publication
Scopus (20)
Crossref (18)
Scopus Clarivate Crossref
Publication Date
Wed Jun 10 2009
Journal Name
Iraqi Journal Of Laser
Real Time Quantum Bit Error Rate Performance Test for a Quantum Cryptography System Based on BB84 protocol
...Show More Authors

In this work, the performance of the receiver in a quantum cryptography system based on BB84 protocol is scaled by calculating the Quantum Bit Error Rate (QBER) of the receiver. To apply this performance test, an optical setup was arranged and a circuit was designed and implemented to calculate the QBER. This electronic circuit is used to calculate the number of counts per second generated by the avalanche photodiodes set in the receiver. The calculated counts per second are used to calculate the QBER for the receiver that gives an indication for the performance of the receiver. Minimum QBER, 6%, was obtained with avalanche photodiode excess voltage equals to 2V and laser diode power of 3.16 nW at avalanche photodiode temperature of -10

... Show More
View Publication Preview PDF
Publication Date
Wed Jan 01 2020
Journal Name
Plant Archives J.
Evaluation of the performance of triple, single crosses and their inbred in bred lines of maize under two plant population
...Show More Authors

Scopus (2)
Scopus
Publication Date
Thu Dec 31 2020
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Measurement and accounting disclosure of intellectual capital using accounting models in the Iraqi insurance company
...Show More Authors

The research aims to shed light on the possibility of measuring the intellectual capital in the Iraqi insurance company using accounting models, as well as disclosing it in the financial statements of the company, where human capital was measured using the present value factor model for discounted future revenues and the intellectual value-added factor model for measuring structural capital It was also disclosed in the financial statements based on the theory of stakeholders. The research problem lies in the fact that the Iraqi insurance company does not carry out the process of measuring and disclosing the intellectual capital while it is considered an important source for the company’s progress in the labor market recently. T

... Show More
View Publication Preview PDF
Publication Date
Sun Jan 01 2012
Journal Name
Al-nahrain Journal Of Science
Synthesis and Characterization of New Azo Dye Complexes with Selected Metal Ions
...Show More Authors

Coupling reaction of 2-amino benzoic acid with phenol gave the new bidentate azo ligand. The prepared ligand was identified by Microelemental Analysis, FT-IR and UV-Vis spectroscopic technique. Treatment of the prepared ligand with the following metal ions (CoII, NiII, CuII and ZnII) in aqueous ethanol with a 1:2 M:L ratio and at optimum pH, yielded a series of neutral complexes of the general formula [M(L)2]. The prepared complexes were characterized using flame atomic absorption, (C.H.N) Analysis, FT-IR and UV-Vis spectroscopic methods as well as magnetic susceptibility and conductivity measurements. The nature of the complexes formed were studied following the mole ratio and continuous variation methods, Beer's law obeyed over a concentr

... Show More
Publication Date
Fri Nov 17 2023
Journal Name
Nasaq
A Semantic Study of Thematic Progression in Selected American and British Movies
...Show More Authors

ZG Abdulrazaq, MR Younus, Nasaq, 2023

View Publication
Publication Date
Wed May 16 2012
Journal Name
Journal Of Kerbala University
Synthesis and Characterization of Heterocyclic Azo Dye Complexes with Selected Metal Ions
...Show More Authors

Coupling reaction of 4-amino antipyrene with 2,6-dimethyl phenol gave bidentate azo ligand. The prepared ligand was identified by Microelemental Analysis, 1HNMR, FT-IR and UV-Vis spectroscopic techniques. Treatment of the prepared ligand with the following metal ions (CoII, NiII, CuII, ZnII, CdII, and HgII) in aqueous ethanol with a 1:2 M:L ratio and at optimum pH, yielded a series of neutral complexes of the general formula [M(L)2Cl2]. The prepared complexes were characterized using flame atomic absorption, (C.H.N) Analysis, FT-IR and UVVis spectroscopic methods as well as magnetic susceptibility and conductivity measurements. Chloride ion content was also evaluated by (Mohr method). The nature of the complexes formed were studied followin

... Show More
Publication Date
Wed Nov 01 2023
Journal Name
Bionatura
Geological and Plant Diversity in Selected Areas of Al Tib, Maysan, Iraq
...Show More Authors

Scopus (3)
Scopus
Publication Date
Wed Dec 01 2021
Journal Name
Baghdad Science Journal
Advanced Intelligent Data Hiding Using Video Stego and Convolutional Neural Networks
...Show More Authors

Steganography is a technique of concealing secret data within other quotidian files of the same or different types. Hiding data has been essential to digital information security. This work aims to design a stego method that can effectively hide a message inside the images of the video file.  In this work, a video steganography model has been proposed through training a model to hiding video (or images) within another video using convolutional neural networks (CNN). By using a CNN in this approach, two main goals can be achieved for any steganographic methods which are, increasing security (hardness to observed and broken by used steganalysis program), this was achieved in this work as the weights and architecture are randomized. Thus,

... Show More
View Publication Preview PDF
Scopus (10)
Crossref (1)
Scopus Clarivate Crossref