Preferred Language
Articles
/
jBZerIoBVTCNdQwCnaJd
BotDetectorFW: an optimized botnet detection framework based on five features-distance measures supported by comparisons of four machine learning classifiers using CICIDS2017 dataset
...Show More Authors

<p><span>A Botnet is one of many attacks that can execute malicious tasks and develop continuously. Therefore, current research introduces a comparison framework, called BotDetectorFW, with classification and complexity improvements for the detection of Botnet attack using CICIDS2017 dataset. It is a free online dataset consist of several attacks with high-dimensions features. The process of feature selection is a significant step to obtain the least features by eliminating irrelated features and consequently reduces the detection time. This process implemented inside BotDetectorFW using two steps; data clustering and five distance measure formulas (cosine, dice, driver &amp; kroeber, overlap, and pearson correlation) using C#, followed by selecting the best N features used as input into four classifier algorithms evaluated using machine learning (WEKA); multilayerperceptron, JRip, IBK, and random forest. In BotDetectorFW, the thoughtful and diligent cleaning of the dataset within the preprocessing stage beside the normalization, binary clustering of its features, followed by the adapting of feature selection based on suitable feature distance techniques, and finalized by testing of selected classification algorithms. All together contributed in satisfying the high-performance metrics using fewer features number (8 features as a minimum) compared to and outperforms other methods found in the literature that adopted (10 features or higher) using the same dataset. Furthermore, the results and performance evaluation of BotDetectorFM shows a competitive impact in terms of classification accuracy (ACC), precision (Pr), recall (Rc), and f-measure (F1) metrics.</span></p>

Scopus Crossref
View Publication
Publication Date
Thu Nov 03 2022
Journal Name
Sensors
A Novel Application of Deep Learning (Convolutional Neural Network) for Traumatic Spinal Cord Injury Classification Using Automatically Learned Features of EMG Signal
...Show More Authors

In this study, a traumatic spinal cord injury (TSCI) classification system is proposed using a convolutional neural network (CNN) technique with automatically learned features from electromyography (EMG) signals for a non-human primate (NHP) model. A comparison between the proposed classification system and a classical classification method (k-nearest neighbors, kNN) is also presented. Developing such an NHP model with a suitable assessment tool (i.e., classifier) is a crucial step in detecting the effect of TSCI using EMG, which is expected to be essential in the evaluation of the efficacy of new TSCI treatments. Intramuscular EMG data were collected from an agonist/antagonist tail muscle pair for the pre- and post-spinal cord lesi

... Show More
View Publication
Scopus (9)
Crossref (10)
Scopus Clarivate Crossref
Publication Date
Thu Dec 30 2021
Journal Name
Al-kindy College Medical Journal
Clinical Analysis of Four Maternity Deaths in Iraq by COVID-19
...Show More Authors

 

This study aims to identify maternal death cases caused by Coronavirus infection 2019 pneumonia, including disease progression, fetal consequences, and the fatality cause.

Patients and methodology: A retrospective case collection of Iraqi pregnant women in their second and third trimesters diagnosed with COVID-19 pneumonia and died due to it.

The four cases were all of a young age, had a brief complaint period, and had no comorbidities. Fever, dyspnea, and fatigue were the most common symptoms. Hypoxia was present in all cases and was the cause of mortality in three cases, with thromboembolism being a potential cause in the fourth. Prelabour membrane breakup, fetal growth restriction, and fetal death are al

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Aug 01 2011
Journal Name
Journal Of Engineering
DAMAGE DETECTION AND LOCATION FOR IN AND OUT-OFPLANE CURVED BEAMS USING FUZZY LOGIC BASED ON FREQUENCY DIFFERENCE
...Show More Authors

In this study, structures damage identification method based on changes in the dynamic characteristics
(frequencies) of the structure are examined, stiffness as well as mass matrices of the curved
(in and out-of-plane vibration) beam elements is formulated using Hamilton's principle. Each node
of both of them possesses seven degrees of freedom including the warping degree of freedom. The
curved beam element had been derived based on the Kang and Yoo’s thin-walled curved beam theory
in 1994. A computer program was developing to carry out free vibration analyses of the curved
beam as well as straight beam. Comparing with the frequencies for other researchers using the general
purpose program MATLAB. Fuzzy logic syste

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Mon Dec 05 2022
Journal Name
Baghdad Science Journal
Proposed Framework for Official Document Sharing and Verification in E-government Environment Based on Blockchain Technology
...Show More Authors

Progression in Computer networks and emerging of new technologies in this field helps to find out new protocols and frameworks that provides new computer network-based services. E-government services, a modernized version of conventional government, are created through the steady evolution of technology in addition to the growing need of societies for numerous services. Government services are deeply related to citizens’ daily lives; therefore, it is important to evolve with technological developments—it is necessary to move from the traditional methods of managing government work to cutting-edge technical approaches that improve the effectiveness of government systems for providing services to citizens. Blockchain technology is amon

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (3)
Scopus Crossref
Publication Date
Mon Feb 10 2025
Journal Name
Journal Of Optics
Implementing quantum key distribution based on coincidence detection captured from two different single photon detection modules
...Show More Authors

Quantum key distribution (QKD) provides unconditional security in theory. However, practical QKD systems face challenges in maximizing the secure key rate and extending transmission distances. In this paper, we introduce a comparative study of the BB84 protocol using coincidence detection with two different quantum channels: a free space and underwater quantum channels. A simulated seawater was used as an example for underwater quantum channel. Different single photon detection modules were used on Bob’s side to capture the coincidence counts. Results showed that increasing the mean photon number generally leads to a higher rate of coincidence detection and therefore higher possibility of increasing the secure key rate. The secure key rat

... Show More
View Publication Preview PDF
Scopus Clarivate Crossref
Publication Date
Wed May 01 2019
Journal Name
Journal Of Engineering
Non-Destructive Damage Assessment of Five Layers Fiber Glass / Polyester Composite Materials Laminated Plate by Using Lamb Waves Simulation
...Show More Authors

Composite materials are widely used in the engineered assets as aerospace structures, marine and air navigation owing to their high strength/weight ratios. Detection and identification of damage in the composite structures are considered as an important part of monitoring and repairing of structural systems during the service to avoid instantaneous failure. Effective cost and reliability are essential during the process of detecting. The Lamb wave method is an effective and sensitive technique to tiny damage and can be applied for structural health monitoring using low energy sensors; it can provide good information about the condition of the structure during its operation by analyzing the propagation of the wave in the

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Thu Jun 01 2017
Journal Name
Journal Of Economics And Administrative Sciences
The Role of Strategic audit in detection of financial corruption cases in Iraq - Proposed Framework
...Show More Authors

This research focuses on detecting the financial corruption cases in Iraq in light of adoption the strategic audit, the paper deals with the problem of the proliferation corruption cases particularly financial in Iraq and dramatically in the presence of audit and control devices as well as inspection and integrity devices, which indicates the existence of deficiencies and weaknesses in those devices in the implementation of audit and control functions in order to detect the corruption cases in the economic units in Iraq.

Stems objective of this research through the provision of approach of strategic audit concepts and indicate the extent importance of adopting of strategic audit as a means to detect the f

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Mar 02 2023
Journal Name
Applied Sciences
Machine Learning Techniques to Detect a DDoS Attack in SDN: A Systematic Review
...Show More Authors

The recent advancements in security approaches have significantly increased the ability to identify and mitigate any type of threat or attack in any network infrastructure, such as a software-defined network (SDN), and protect the internet security architecture against a variety of threats or attacks. Machine learning (ML) and deep learning (DL) are among the most popular techniques for preventing distributed denial-of-service (DDoS) attacks on any kind of network. The objective of this systematic review is to identify, evaluate, and discuss new efforts on ML/DL-based DDoS attack detection strategies in SDN networks. To reach our objective, we conducted a systematic review in which we looked for publications that used ML/DL approach

... Show More
View Publication Preview PDF
Scopus (122)
Crossref (115)
Scopus Clarivate Crossref
Publication Date
Sat Apr 01 2023
Journal Name
The Ocular Surface
Detecting dry eye from ocular surface videos based on deep learning
...Show More Authors

View Publication
Scopus (20)
Crossref (19)
Scopus Clarivate Crossref
Publication Date
Thu Sep 01 2016
Journal Name
2016 8th Computer Science And Electronic Engineering (ceec)
Class-specific pre-trained sparse autoencoders for learning effective features for document classification
...Show More Authors

View Publication
Scopus (6)
Crossref (2)
Scopus Crossref