Preferred Language
Articles
/
vRgkBJgBVTCNdQwCuKki
A New Intrusion Detection Approach Based on RNA Encoding and K-Means Clustering Algorithm Using KDD-Cup99 Dataset
...Show More Authors

Intrusion detection systems (IDS) are useful tools that help security administrators in the developing task to secure the network and alert in any possible harmful event. IDS can be classified either as misuse or anomaly, depending on the detection methodology. Where Misuse IDS can recognize the known attack based on their signatures, the main disadvantage of these systems is that they cannot detect new attacks. At the same time, the anomaly IDS depends on normal behaviour, where the main advantage of this system is its ability to discover new attacks. On the other hand, the main drawback of anomaly IDS is high false alarm rate results. Therefore, a hybrid IDS is a combination of misuse and anomaly and acts as a solution to overcome the disadvantages of these two methods. In this paper, a new hybrid IDS is proposed based on the RNA encoding idea and applying the K-means clustering algorithm. Firstly, choosing random records for both training and testing. Secondly, propose RNA encoding by calculating all possible record values within dataset and generating RNA characters for each value, then dividing it into blocks. The third step is done by searching and extracting normal keys based on the most repeated blocks, and the same procedure is applied to extract the attack keys. Finally, the Kmeans clustering method is used to classify the testing records based on extracted keys. The proposed method is evaluated by calculating the detection rate (DR), false alarm rate (FAR), and accuracy, where the achieved DR, FAR, and accuracy are equal to 91.13%, 0.46%, and 92.02% respectively. Based on the achieved results, it can be said that the proposed hybrid IDS has high DR and accuracy results, can detect new attacks, and can solve the problem of anomaly IDS by getting a low false alarm rate result.

Preview PDF
Quick Preview PDF
Publication Date
Wed Jun 01 2022
Journal Name
Baghdad Science Journal
On New Weibull Inverse Lomax Distribution with Applications
...Show More Authors

In this paper, simulation studies and applications of the New Weibull-Inverse Lomax (NWIL) distribution were presented. In the simulation studies, different sample sizes ranging from 30, 50, 100, 200, 300, to 500 were considered. Also, 1,000 replications were considered for the experiment. NWIL is a fat tail distribution. Higher moments are not easily derived except with some approximations. However, the estimates have higher precisions with low variances. Finally, the usefulness of the NWIL distribution was illustrated by fitting two data  sets

View Publication Preview PDF
Scopus (2)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Fri Dec 01 2017
Journal Name
British Journal Of Oral And Maxillofacial Surgery
A novel approach for the three-dimensional evaluation of facial asymmetry of unilateral cleft lip and palate patients (UCLP)
...Show More Authors

View Publication
Crossref
Publication Date
Thu Dec 30 2010
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
E'XCESS VOLUMES OF HEAVY OIL- STOCKS MIXTURES+ (KEROSENE OR XYLENE) AT 3O3 K
...Show More Authors

Binary mixtures of three heavy oil-stocks had been subjected to density measurments. The data had been aquired on the volumetric behaviour of these systems. The heavy oil-stocks used were of good varity, namely 40 stock , 60 stock, and 150 stock, 40 stock is the lightest one with the API gravity 33.7 while 60 stock is middle type and 150 stock is heavy one, with API gravity 27.7 and 23.8 respectively. Stocks with Kerosene or Xylene for non-ideal mixtures for which excess volume can be positive or  negative. Mixture of heavy-oil stocks with paraffinic spike (Kerosene) show negative excess volume. While, aromatic rings results a lower positive excess volume, as shown in Xylene when blending with 40 stock and 60 stock but a negati

... Show More
View Publication Preview PDF
Publication Date
Thu Sep 12 2019
Journal Name
Al-kindy College Medical Journal
K. wire fixation versus conservative treatment of closed displaced intra-articular calcaneal fractures
...Show More Authors

Background: Calcaneus is a spongy cancellous bone with rich blood supply , its fracture heals more rapidly providing no occurrence of infection and soft tissue injury around ,no gross malposition of fragments. The associated pain leads to a major impairment in life quality. The aim of treatment for calcaneal fractures is the decrease of pain and rebuilding of walking ability for patients with normal foot shape and the ability to wear normal foot wear. To reduce complications, a minimally invasive technique for the treatment of displaced intra-articular fractures of the calcaneus was preferred to use.

The purpose of this study was to determine whether the closed reduction and percutaneous K. wire fixation of displ

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Sep 12 2019
Journal Name
Al-kindy College Medical Journal
K. wire fixation versus conservative treatment of closed displaced intra-articular calcaneal fractures
...Show More Authors

Background: Calcaneus is a spongy cancellous bone with rich blood supply , its fracture heals more rapidly providing no occurrence of infection and soft tissue injury around ,no gross malposition of fragments. The associated pain leads to a major impairment in life quality. The aim of treatment for calcaneal fractures is the decrease of pain and rebuilding of walking ability for patients with normal foot shape and the ability to wear normal foot wear. To reduce complications, a minimally invasive technique for the treatment of displaced intra-articular fractures of the calcaneus was preferred to use. The purpose of this study was to determine whether the closed reduction and percutaneous K. wire fixation of displaced intra-art

... Show More
Preview PDF
Crossref
Publication Date
Mon Jan 01 2018
Journal Name
Internet And Distributed Computing Systems
A Proposed Adaptive Rate Algorithm to Administrate the Video Buffer Occupancy for Smooth Video Streaming
...Show More Authors

View Publication
Scopus Clarivate Crossref
Publication Date
Sun Sep 01 2019
Journal Name
Baghdad Science Journal
Common Fixed Point of a Finite-step Iteration Algorithm Under Total Asymptotically Quasi-nonexpansive Maps
...Show More Authors

      Throughout this paper, a generic iteration algorithm for a finite family of total asymptotically quasi-nonexpansive maps in uniformly convex Banach space is suggested. As well as weak / strong convergence theorems of this algorithm to a common fixed point are established. Finally, illustrative numerical example by using Matlab is presented.

View Publication Preview PDF
Scopus (14)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Sun Jun 05 2022
Journal Name
Network
A Computationally Efficient Gradient Algorithm for Downlink Training Sequence Optimization in FDD Massive MIMO Systems
...Show More Authors

Future wireless networks will require advance physical-layer techniques to meet the requirements of Internet of Everything (IoE) applications and massive communication systems. To this end, a massive MIMO (m-MIMO) system is to date considered one of the key technologies for future wireless networks. This is due to the capability of m-MIMO to bring a significant improvement in the spectral efficiency and energy efficiency. However, designing an efficient downlink (DL) training sequence for fast channel state information (CSI) estimation, i.e., with limited coherence time, in a frequency division duplex (FDD) m-MIMO system when users exhibit different correlation patterns, i.e., span distinct channel covariance matrices, is to date ve

... Show More
View Publication
Scopus (3)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Thu Jun 01 2023
Journal Name
Journal Of Engineering
A Control Program for Hydropower Operation Based on Minimizing the Principal Stress Values on the Dam Body: Mosul Dam Case Study
...Show More Authors

This study examines the vibrations produced by hydropower operations to improve embankment dam safety. This study consists of two parts: In the first part, ANSYS-CFX was used to generate a three-dimensional (3-D) finite volume (FV) model to simulate a vertical Francis turbine unit in the Mosul hydropower plant. The pressure pattern result of the turbine model was transformed into the dam body to show how the turbine unit's operation affects the dam's stability. The upstream reservoir conditions, various flow rates, and fully open inlet gates were considered. In the second part of this study, a 3-D FE Mosul dam model was simulated using an ANSYS program. The operational turbine model's water pressure pattern is conveyed t

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Aug 01 2011
Journal Name
International Journal Of Research And Reviews In Computer Science
Detection of the photon number splitting attack by using decoy states quantum key distribution system
...Show More Authors

The goal of this work is to check the presence of PNS (photon number splitting) attack in quantum cryptography system based on BB84 protocol, and to get a maximum secure key length as possible. This was achieved by randomly interleaving decoy states with mean photon numbers of 5.38, 1.588 and 0.48 between the signal states with mean photon numbers of 2.69, 0.794 and 0.24. The average length for a secure key obtained from our system discarding the cases with Eavesdropping was equal to 125 with 20 % decoy states and 82 with 50% decoy states for mean photon number of 0.794 for signal states and 1.588 for decoy states.