Preferred Language
Articles
/
lBZirIoBVTCNdQwC8qJ0
Development of an Optimized Botnet Detection Framework based on Filters of Features and Machine Learning Classifiers using CICIDS2017 Dataset
...Show More Authors
Abstract<p>Botnet is a malicious activity that tries to disrupt traffic of service in a server or network and causes great harm to the network. In modern years, Botnets became one of the threads that constantly evolving. IDS (intrusion detection system) is one type of solutions used to detect anomalies of networks and played an increasing role in the computer security and information systems. It follows different events in computer to decide to occur an intrusion or not, and it used to build a strategic decision for security purposes. The current paper <italic>suggests</italic> a hybrid detection Botnet model using machine learning approach, performed and analyzed to detect Botnet attacks using CICIDS2017 dataset. The proposed model designed based on two types of filters to the botnet features; Correlation Attribute Eval and Principal Component deployed to reduce the dataset dimensions and to decrease the time complexity of the botnet detection process. The detection enhancement achieved by reducing the features of the dataset from 85 to 9. The training stage of classifiers is developed and compared based on six classifiers called (Random Forest, IBK, JRip, Multilayer Perceptron, Naive Bayes and OneR) evaluated to accomplish an optimized detection model. The performance and results of the proposed framework are validated using well-known metrics such as Accuracy (ACC), Precision (Pr), Recall (Rc) and F-Measure (F1). The consequence is that the combination of Correlation Attribute Eval (filter) with JRip (classifier) together can satisfy significant improvement in the Botnet detection process using CICIDS2017 dataset.</p>
Scopus Crossref
View Publication
Publication Date
Sat Feb 09 2019
Journal Name
Journal Of The College Of Education For Women
PROTOTYPING TO DESIGN AN ANAGLYPH 3D IMAGE BASED ON WATERFALL MODEL
...Show More Authors

In this paper, a discussion of the principles of stereoscopy is presented, and the phases
of 3D image production of which is based on the Waterfall model. Also, the results are based
on one of the 3D technology which is Anaglyph and it's known to be of two colors (red and
cyan).
A 3D anaglyph image and visualization technologies will appear as a threedimensional
by using a classes (red/cyan) as considered part of other technologies used and
implemented for production of 3D videos (movies). And by using model to produce a
software to process anaglyph video, comes very important; for that, our proposed work is
implemented an anaglyph in Waterfall model to produced a 3D image which extracted from a
video.

View Publication Preview PDF
Publication Date
Sun May 11 2025
Journal Name
Journal Of Information Systems Engineering And Management
The Effect of the Learning Mastery Strategy using Interactive Learning Techniques as a Therapeutic Method on the Achievement of Secondary School Students in Mathematics
...Show More Authors

  The current research aims to identify the effect of the learning mastery strategy using interactive learning as a therapeutic method on the achievement of secondary school students in mathematics. To achieve the research objective, the researcher selected second-grade middle school students at Al-Haybah Intermediate School for Boys and determined his research sample, which consisted of (77) students distributed into two sections: Section (A) the experimental group, with (38) students, and Section (B) the control group, with (39) students. The statistical equivalence of the two research sample groups was confirmed in the variables (intelligence test, previous achievement, and previous knowledge test). The researchers chose the par

... Show More
View Publication
Crossref
Publication Date
Tue Jun 15 2021
Journal Name
Al-academy
Features of Modernity in the Works of Saleh Al-Jami (An Analytical Study): رؤى قحطان عبد الله
...Show More Authors

Since the beginning of the twentieth century, the art of composition has witnessed major transformations that accompanied the transformations that occurred in the cognitive field. The plastic artists rejected the prevailing artistic line, and sought to create a new artistic format that accommodates the new social and cultural problems. So was the announcement of the era of modernity in the late nineteenth century, with the birth of the impressionism movement that gave a place to challenge all that is familiar. . And he drew the attention of the researcher, and for that he chose the research title (Characteristics of Modernity in the Works of Saleh Al-Jumayyi (Analytical Study)) The researcher divided the research as follows:
Methodolo

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Apr 02 2021
Journal Name
New Trends In Information And Communications Technology Applications: 4th International Conference, Ntict 2020, Baghdad, Iraq, June 15, 2020, Proceedings 4
Iris recognition using localized Zernike features with partial iris pattern
...Show More Authors

Publication Date
Thu Dec 15 2011
Journal Name
Iraqi Journal Of Laser
Laser Hole Drilling of Stainless Steel 321H and Steel 33 Using 3D CO2 Laser CNC Machine
...Show More Authors

In present work an investigation for precise hole drilling via continuous wave (CW) CO2 laser at 150 W maximum output power and wavelength 10.6 μm was achieved with the assistance of computerized numerical controlled (CNC) machine and assist gases. The drilling process was done for thin sheets (0.1 – 0.3 mm) of two types of metals; stainless steel (sst) 321H, steel 33 (st). Changing light and process parameters such as laser power, exposure time and gas pressure was important for getting the optimum results. The obtained results were supported with computational results using the COMSOL 3.5a software code.

View Publication Preview PDF
Publication Date
Thu Dec 01 2022
Journal Name
Journal Of Engineering
Deep Learning-Based Segmentation and Classification Techniques for Brain Tumor MRI: A Review
...Show More Authors

Early detection of brain tumors is critical for enhancing treatment options and extending patient survival. Magnetic resonance imaging (MRI) scanning gives more detailed information, such as greater contrast and clarity than any other scanning method. Manually dividing brain tumors from many MRI images collected in clinical practice for cancer diagnosis is a tough and time-consuming task. Tumors and MRI scans of the brain can be discovered using algorithms and machine learning technologies, making the process easier for doctors because MRI images can appear healthy when the person may have a tumor or be malignant. Recently, deep learning techniques based on deep convolutional neural networks have been used to analyze med

... Show More
View Publication Preview PDF
Crossref (11)
Crossref
Publication Date
Mon Aug 01 2022
Journal Name
Baghdad Science Journal
Optimized Artificial Neural network models to time series
...Show More Authors

        Artificial Neural networks (ANN) are powerful and effective tools in time-series applications. The first aim of this paper is to diagnose better and more efficient ANN models (Back Propagation, Radial Basis Function Neural networks (RBF), and Recurrent neural networks) in solving the linear and nonlinear time-series behavior. The second aim is dealing with finding accurate estimators as the convergence sometimes is stack in the local minima. It is one of the problems that can bias the test of the robustness of the ANN in time series forecasting. To determine the best or the optimal ANN models, forecast Skill (SS) employed to measure the efficiency of the performance of ANN models. The mean square error and

... Show More
View Publication Preview PDF
Scopus (31)
Crossref (16)
Scopus Clarivate Crossref
Publication Date
Fri Feb 21 2025
Journal Name
2025 First International Conference On Advances In Computer Science, Electrical, Electronics, And Communication Technologies (ce2ct)
Enhancing Cloud Security Implementing AI-Based Intrusion Detection Systems
...Show More Authors

The increasing complexity of assaults necessitates the use of innovative intrusion detection systems (IDS) to safeguard critical assets and data. There is a higher risk of cyberattacks like data breaches and unauthorised access since cloud services have been used more frequently. The project's goal is to find out how Artificial Intelligence (AI) could enhance the IDS's ability to identify and classify network traffic and identify anomalous activities. Online dangers could be identified with IDS. An intrusion detection system, or IDS, is required to keep networks secure. We must create efficient IDS for the cloud platform as well, since it is constantly growing and permeating more aspects of our daily life. However, using standard intrusion

... Show More
View Publication
Scopus Crossref
Publication Date
Wed Dec 11 2019
Journal Name
Journal Of The College Of Education For Women
The Effectiveness of Teaching Program Based on The Theory of Multiple Intelligence in the Development of Literary Thinking Among Students
...Show More Authors

The research aims to know the effectiveness of a training program based on multiple intelligence theory in developing literary thinking among students of the Arabic Language Department at Ibn Rushd School of Humanities and to achieve the goal of research, the Safaris Research Institute, and the research community of Arabic language students in the Faculty of Education the third section of Arabic Language: The research sample consists of (71) students. Divided into (35) students in the experimental group and (36) students in the control group, the researcher balanced between the two groups with variables (intelligence, testing of tribal literary thinking, and time age in months), and after using the T-test for two independent samples, the

... Show More
View Publication Preview PDF
Publication Date
Thu Jun 20 2019
Journal Name
Baghdad Science Journal
An Optimised Method for Fetching and Transforming Survey Data based on SQL and R Programming Language
...Show More Authors

The development of information systems in recent years has contributed to various methods of gathering information to evaluate IS performance. The most common approach used to collect information is called the survey system. This method, however, suffers one major drawback. The decision makers consume considerable time to transform data from survey sheets to analytical programs. As such, this paper proposes a method called ‘survey algorithm based on R programming language’ or SABR, for data transformation from the survey sheets inside R environments by treating the arrangement of data as a relational format. R and Relational data format provide excellent opportunity to manage and analyse the accumulated data. Moreover, a survey syste

... Show More
View Publication Preview PDF
Crossref (1)
Clarivate Crossref