Preferred Language
Articles
/
pxZOn4oBVTCNdQwCeaE9
A proposal to detect computer worms (malicious codes) using data mining classification algorithms
...Show More Authors

Malicious software (malware) performs a malicious function that compromising a computer system’s security. Many methods have been developed to improve the security of the computer system resources, among them the use of firewall, encryption, and Intrusion Detection System (IDS). IDS can detect newly unrecognized attack attempt and raising an early alarm to inform the system about this suspicious intrusion attempt. This paper proposed a hybrid IDS for detection intrusion, especially malware, with considering network packet and host features. The hybrid IDS designed using Data Mining (DM) classification methods that for its ability to detect new, previously unseen intrusions accurately and automatically. It uses both anomaly and misuse detection techniques using two DM classifiers (Interactive Dichotomizer 3 (ID3) classifier and Naïve Bayesian (NB) Classifier) to verify the validity of the proposed system in term of accuracy rate. A proposed HybD dataset used in training and testing the hybrid IDS. Feature selection is used to consider the intrinsic features in classification decision, this accomplished by using three different measures: Association rules (AR) method, ReliefF measure, and Gain Ratio (GR) measure. NB classifier with AR method given the most accurate classification results (99%) with false positive (FP) rate (0%) and false negative (FN) rate (1%).

Publication Date
Mon Dec 31 2018
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
MEASUREMENT OF SOCIAL RESPONSIBILITY ACCORDING TO THE STANDARD ISO 26000 CASE STUDY IN RUSHED BANK/BAGHDAD.: MEASUREMENT OF SOCIAL RESPONSIBILITY ACCORDING TO THE STANDARD ISO 26000 CASE STUDY IN RUSHED BANK/BAGHDAD.
...Show More Authors

Objective the research is to identify Over the Commitment of a Rushed Bank in Baghdad has applied social responsibility in accordance with ISO 26000 by measuring and diagnosing the gap between the actual reality in the bank and the requirements of the standard.

View Publication Preview PDF
Publication Date
Fri Dec 19 2014
Journal Name
Mutagenesis
Assessment of oxidative damage to DNA, transcriptional expression of key genes, lipid peroxidation and histopathological changes in carp Cyprinus carpio L. following exposure to chronic hypoxic and subsequent recovery in normoxic conditions
...Show More Authors

In fish, a complex set of mechanisms deal with environmental stresses including hypoxia. In order to probe the hypothesis that hypoxia-induced stress could be manifested in varieties of pathways, a model species, mirror carp (Cyprinus carpio), were chronically exposed to hypoxic condition (dissolved oxygen level: 1.80±0.6mg/l) for 21 days and subsequently allowed to recover under normoxic condition (dissolved oxygen level: 8.2±0.5mg/l) for 7 days. At the end of these exposure periods, an integrated approach was applied to evaluate several endpoints at different levels of biological organisation. These included determination of (i) oxidative damage to DNA in erythrocytes (using modified comet assay), (ii) lipid peroxidation in liver sample

... Show More
View Publication
Scopus (62)
Crossref (60)
Scopus Clarivate Crossref
Publication Date
Tue Dec 01 2020
Journal Name
Baghdad Science Journal
Approximate Numerical Solutions for Linear Volterra Integral Equations Using Touchard Polynomials
...Show More Authors

In this paper, Touchard polynomials (TPs) are presented for solving Linear Volterra integral equations of the second kind (LVIEs-2k) and the first kind (LVIEs-1k) besides, the singular kernel type of this equation. Illustrative examples show the efficiency of the presented method, and the approximate numerical (AN) solutions are compared with one another method in some examples. All calculations and graphs are performed by program MATLAB2018b.

View Publication Preview PDF
Scopus (6)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Sat Sep 01 2018
Journal Name
2018 11th International Conference On Developments In Esystems Engineering (dese)
Natural Rivers Longitudinal Dispersion Coefficient Simulation Using Hybrid Soft Computing Model
...Show More Authors

View Publication
Scopus (21)
Crossref (9)
Scopus Clarivate Crossref
Publication Date
Mon Jul 01 2019
Journal Name
Iop Conference Series: Materials Science And Engineering
Calculating heterogeneity of Majnoon Field/Hartha Reservoir using Lorenz Coefficient method
...Show More Authors
Abstract<p>One of the principle concepts to understand any hydrocarbon field is the heterogeneity scale; This becomes particularly challenging in supergiant oil fields with medium to low lateral connectivity and carbonate reservoir rocks.</p><p>The main objectives of this study is to quantify the value of the heterogeneity for any well in question, and propagate it to the full reservoir. This is a quite useful specifically prior to conducting detailed water flooding or full field development studies and work, in order to be prepared for a proper design and exploitation requirements that fit with the level of heterogeneity of this formation.</p><jats></jats> ... Show More
View Publication
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Tue Jul 01 2014
Journal Name
Computer Engineering And Intelligent Systems
Static Analysis Based Behavioral API for Malware Detection using Markov Chain
...Show More Authors

Researchers employ behavior based malware detection models that depend on API tracking and analyzing features to identify suspected PE applications. Those malware behavior models become more efficient than the signature based malware detection systems for detecting unknown malwares. This is because a simple polymorphic or metamorphic malware can defeat signature based detection systems easily. The growing number of computer malwares and the detection of malware have been the concern for security researchers for a large period of time. The use of logic formulae to model the malware behaviors is one of the most encouraging recent developments in malware research, which provides alternatives to classic virus detection methods. To address the l

... Show More
Publication Date
Sun Jun 01 2014
Journal Name
Baghdad Science Journal
Determination of solar window for Baghdad city using pv system program
...Show More Authors

Been using a pv system program to determine the solar window for Baghdad city . the solar window for any location can be determine by deviating left and right from the geographical south as well as deviation according to the amount of tilt angle with the horizon for fixed panel so that will not change the average of solar radiation incident over the whole year and this lead to help in the process of installation of fixed solar panel without any effect on annual output .the range of solar window for Baghdad city between two angles ( -8 - +8 ) degrees left to right of the geographical south and tilt angle that allowed for the horizon range between angles (21- 30) degrees so that the amount of solar radiation that falling on the solar pan

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Sep 30 2022
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Kinetic Study of Transesterification Reaction of Edible Oil Using Heterogenous Catalyst
...Show More Authors

AlPO4 solid acid catalyst was prepared in order to use it in transesterification reaction of edible oil after supporting it with tungsten oxide. The maximum conversion of edible oil was obtained 78.78% at catalyst concentration (5gm.), temperature 70°Ϲ, 30/1 methanol/edible oil molar ratio, and time 5hr. The study of kinetics of the transesterification reaction of edible oil indicates that the reaction has an order of 3/2, while the value of activation energy for  transesterification reaction is 51.367 kJ/mole and frequency factor equal 26219.13(L/ mol.minute).

Crossref (1)
Crossref
Publication Date
Fri Nov 01 2013
Journal Name
Journal Of Cosmetics, Dermatological Sciences And Applications
Treatment of active acne vulgaris by chemical peeling using TCA 35%
...Show More Authors

KE Sharquie, AA Noaimi, EA Al-Janabi…, Journal of Cosmetics, Dermatological Sciences and Applications, 2013 - Cited by 13

View Publication
Publication Date
Sun May 17 2026
Journal Name
Journal Of Baghdad College Of Dentistry
Apexification and periapical healing of immature teeth using Mineral Trioxide Aggregate
...Show More Authors

Background: Apexification is a method to induce a calcified barrier in a root with an open apex or the continued apical development of an incomplete root in teeth with necrotic pulp. MTA apexification has several advantages such as it neither gets resorbed, nor weakens the root canal dentin, and also sets in the wet environment. The aim of this study is to evaluate the effectiveness of the use of MTA in apexification and periapical healing of teeth with incomplete root formation and periapical infection. Materials and method: Apexification was carried out on fourteen permanent immature teeth of eleven children aged 7-12 years attended the teaching hospital of College of Dentistry, Baghdad University using mineral trioxide aggregate followed

... Show More
View Publication Preview PDF