Preferred Language
Articles
/
jBZerIoBVTCNdQwCnaJd
BotDetectorFW: an optimized botnet detection framework based on five features-distance measures supported by comparisons of four machine learning classifiers using CICIDS2017 dataset
...Show More Authors

<p><span>A Botnet is one of many attacks that can execute malicious tasks and develop continuously. Therefore, current research introduces a comparison framework, called BotDetectorFW, with classification and complexity improvements for the detection of Botnet attack using CICIDS2017 dataset. It is a free online dataset consist of several attacks with high-dimensions features. The process of feature selection is a significant step to obtain the least features by eliminating irrelated features and consequently reduces the detection time. This process implemented inside BotDetectorFW using two steps; data clustering and five distance measure formulas (cosine, dice, driver &amp; kroeber, overlap, and pearson correlation) using C#, followed by selecting the best N features used as input into four classifier algorithms evaluated using machine learning (WEKA); multilayerperceptron, JRip, IBK, and random forest. In BotDetectorFW, the thoughtful and diligent cleaning of the dataset within the preprocessing stage beside the normalization, binary clustering of its features, followed by the adapting of feature selection based on suitable feature distance techniques, and finalized by testing of selected classification algorithms. All together contributed in satisfying the high-performance metrics using fewer features number (8 features as a minimum) compared to and outperforms other methods found in the literature that adopted (10 features or higher) using the same dataset. Furthermore, the results and performance evaluation of BotDetectorFM shows a competitive impact in terms of classification accuracy (ACC), precision (Pr), recall (Rc), and f-measure (F1) metrics.</span></p>

Scopus Crossref
View Publication
Publication Date
Wed Feb 10 2016
Journal Name
Scientific Reports
Experimental demonstration on the deterministic quantum key distribution based on entangled photons
...Show More Authors

As an important resource, entanglement light source has been used in developing quantum information technologies, such as quantum key distribution(QKD). There are few experiments implementing entanglement-based deterministic QKD protocols since the security of existing protocols may be compromised in lossy channels. In this work, we report on a loss-tolerant deterministic QKD experiment which follows a modified “Ping-Pong”(PP) protocol. The experiment results demonstrate for the first time that a secure deterministic QKD session can be fulfilled in a channel with an optical loss of 9 dB, based on a telecom-band entangled photon source. This exhibits a conceivable prospect of ultilizing entanglement light source in real-life fiber-based

... Show More
View Publication
Scopus (17)
Crossref (16)
Scopus Clarivate Crossref
Publication Date
Wed May 09 2018
Journal Name
International Journal Of Advanced Computer Science And Applications
New Techniques to Enhance Data Deduplication using Content based-TTTD Chunking Algorithm
...Show More Authors

View Publication
Scopus (11)
Crossref (8)
Scopus Crossref
Publication Date
Sun Dec 01 2019
Journal Name
Baghdad Science Journal
Symmetric- Based Steganography Technique Using Spiral-Searching Method for HSV Color Images
...Show More Authors

Steganography is defined as hiding confidential information in some other chosen media without leaving any clear evidence of changing the media's features. Most traditional hiding methods hide the message directly in the covered media like (text, image, audio, and video). Some hiding techniques leave a negative effect on the cover image, so sometimes the change in the carrier medium can be detected by human and machine. The purpose of suggesting hiding information is to make this change undetectable. The current research focuses on using complex method to prevent the detection of hiding information by human and machine based on spiral search method, the Structural Similarity Index Metrics measures are used to get the accuracy and quality

... Show More
View Publication Preview PDF
Scopus (5)
Scopus Clarivate Crossref
Publication Date
Thu Feb 01 2018
Journal Name
Iet Signal Processing
Signal compression and enhancement using a new orthogonal‐polynomial‐based discrete transform
...Show More Authors

View Publication
Scopus (41)
Crossref (43)
Scopus Clarivate Crossref
Publication Date
Fri Jul 23 2021
Journal Name
International Journal Of Nonlinear Analysis And Applications
On the dynamical behavior of an eco-epidemiological model
...Show More Authors

The aim of this article is to study the dynamical behavior of an eco-epidemiological model. A prey-predator model comprising infectious disease in prey species and stage structure in predator species is suggested and studied. Presumed that the prey species growing logistically in the absence of predator and the ferocity process happened by Lotka-Volterra functional response. The existence, uniqueness, and boundedness of the solution of the model are investigated. The stability constraints of all equilibrium points are determined. The constraints of persistence of the model are established. The local bifurcation near every equilibrium point is analyzed. The global dynamics of the model are investigated numerically and confronted with the obt

... Show More
Preview PDF
Scopus (2)
Scopus Clarivate
Publication Date
Wed Jun 01 2005
Journal Name
Alustath Journal For Human And Social Sciences
An evaluation study of Islamic websites on the Internet
...Show More Authors

The study aims to introduce the Islamic sites available on the Internet and determine the criteria that contribute to evaluating these sites to indicate their value, topics, and services, while evaluating a simple random sample of the general Islamic sites, which number (35) sites. The results were presented in (8) tables. The study concluded To a set of conclusions, including: (465) “Islamic” websites were seized during the research period, and they are constantly increasing. They were classified according to the name of the website (domain name) com, org, net, edu, and also according to topics such as general Islamic websites and websites of holy places. Mosques, sites of sheikhs, etc. Among the best general Islamic websites are: Isla

... Show More
Preview PDF
Publication Date
Wed Jun 07 2023
Journal Name
Journal Of Educational And Psychological Researches
Multiple Intelligence Test Item Selection-Based on Howard Gardner's MI Model Using a Generalized Partial Estimation Model: Ministry of Education \ Karkh First Directorate of Education
...Show More Authors

The aim of the research is to examine the multiple intelligence test item selection based on Howard Gardner's MI model using the Generalized Partial Estimation Form, generalized intelligence. The researcher adopted the scale of multiple intelligences by Kardner, it consists of (102) items with eight sub-scales. The sample consisted of (550) students from Baghdad universities, Technology University, al-Mustansiriyah university, and Iraqi University for the academic year (2019/2020). It was verified assumptions theory response to a single (one-dimensional, local autonomy, the curve of individual characteristics, speed factor and application), and analysis of the data according to specimen partial appreciation of the generalized, and limits

... Show More
View Publication Preview PDF
Publication Date
Wed Jun 19 2019
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Elements of Promotion Mix and Their Effect in Insurance Service Marketing by Using Factor Analysis Approach: An Exploratory Research foe views of works Sample at the National Insurance Company
...Show More Authors

The insurance is considered as one of the sectors that is impact is vital to the national economy and development programs, Insurance companies as financial institutions have an effect an aspects of social, economic as well as the participation of enterprises in compensation for the risk potential losses and individuals, Insurance sector provides insurance service insurance which should be characterized by quality and satisfy  needs and desires of the customer , so the  raise insurance awareness in the community its members and institutions will help in  maintaining the movement of production and service delivery standards, quality sought by the insured to obtain, as well as the development of promotional programs, and use

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Jan 23 2018
Journal Name
Suleyman Demİrel University
ANALYZING POSTGRADUATE STUDENTS' USE OF PRAGMATIC FEATURES AND ARGUMENTATION IN THESIS WRITING: A CORPUS-BASED STUDY تحليل استخدام طلبة الدراسات العليا للسمات التداولية و الحجج في كتابة الرسائل العلمية : دراسة تعتمد تحليل البيانات المحوسبة
...Show More Authors

This study addresses the issue of academic writing in English by comparing pragmatic argumentation in the writing of 40 graduate students studying at Iraqi universities (SSIU) with the writing of 40 graduate students studying at American universities (SSAU). In these 80 theses, six selected aspects of academic writing were analyzed: (a) paragraph structure, (b) length and construction of sentences, (c) organization of information in sentences, (d) vocabulary, (e) topic sentences, and (f) discourse markers. This study seeks to go beyond the traditional and often onedimensional analysis of pragmatics of argumentation in English academic writing to distinguish and describe different aspects of academic writing and their results when used by EF

... Show More
Preview PDF
Publication Date
Mon Jan 01 2018
Journal Name
African Journal Of Hospitality, Tourism And Leisure
An analytical study of the strategic flexibility variation as a function of the dynamic capabilities based on supply chain management (Case study: The General Petroleum Products Distribution Company in Baghdad)
...Show More Authors

Scopus (9)
Scopus