首页 > 最新文献

Iraqi Journal for Computers and Informatics最新文献

英文 中文
Credit Fraud Recognition Based on Performance Evaluation of Deep Learning Algorithm 基于深度学习算法性能评估的信用欺诈识别
Pub Date : 2024-02-22 DOI: 10.25195/ijci.v50i1.454
Rawaa Ismael
Over time, the growth of credit cards and the financial data need credit models to support banks in making financial decisions. So, to avoid fraud in internet transactions which increased with the growth of technology it is crucial to develop an efficient fraud detection system. Deep Learning techniques are superior to other Machine Learning techniques in predicting the customer behavior of credit cards depending on the missed payments probability of customers. The BiLSTM model proposed to train on Taiwanese non-transactional dataset for bank credit cards to decrease the losses of banks. The Bidirectional LSTM reached 98% accuracy in fraud credit detection compared with other Machine Learning techniques.
随着时间的推移,信用卡和金融数据的增长需要信用模型来支持银行做出金融决策。因此,为了避免随着技术发展而增加的互联网交易中的欺诈行为,开发一个高效的欺诈检测系统至关重要。深度学习技术在预测信用卡客户行为方面优于其他机器学习技术,这取决于客户错过付款的概率。为了减少银行的损失,BiLSTM 模型建议在台湾银行信用卡非交易数据集上进行训练。与其他机器学习技术相比,双向 LSTM 在欺诈信用检测方面的准确率达到 98%。
{"title":"Credit Fraud Recognition Based on Performance Evaluation of Deep Learning Algorithm","authors":"Rawaa Ismael","doi":"10.25195/ijci.v50i1.454","DOIUrl":"https://doi.org/10.25195/ijci.v50i1.454","url":null,"abstract":"Over time, the growth of credit cards and the financial data need credit models to support banks in making financial decisions. So, to avoid fraud in internet transactions which increased with the growth of technology it is crucial to develop an efficient fraud detection system. Deep Learning techniques are superior to other Machine Learning techniques in predicting the customer behavior of credit cards depending on the missed payments probability of customers. The BiLSTM model proposed to train on Taiwanese non-transactional dataset for bank credit cards to decrease the losses of banks. The Bidirectional LSTM reached 98% accuracy in fraud credit detection compared with other Machine Learning techniques.","PeriodicalId":53384,"journal":{"name":"Iraqi Journal for Computers and Informatics","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-02-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140440261","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ENSEMBLE MACHINE LEARNING APPROACH FOR IOT INTRUSION DETECTION SYSTEMS 用于物联网入侵检测系统的集合机器学习方法
Pub Date : 2023-12-30 DOI: 10.25195/ijci.v49i2.458
Baseem A. Kadheem Hammood, Ahmed T. Sadiq
The rapid growth and development of the Internet of Things (IoT) have had an important impact on various industries, including smart cities, the medical profession, autos, and logistics tracking. However, with the benefits of the IoT come security concerns that are becoming increasingly prevalent. This issue is being addressed by developing intelligent network intrusion detection systems (NIDS) using machine learning (ML) techniques to detect constantly changing network threats and patterns. Ensemble ML represents the recent direction in the ML field. This research proposes a new anomaly-based solution for IoT networks utilizing ensemble ML algorithms, including logistic regression, naive Bayes, decision trees, extra trees, random forests, and gradient boosting. The algorithms were tested on three different intrusion detection datasets. The ensemble ML method achieved an accuracy of 98.52% when applied to the UNSW-NB15 dataset, 88.41% on the IoTID20 dataset, and 91.03% on the BoTNeTIoT-L01-v2 dataset.
物联网(IoT)的快速增长和发展对智能城市、医疗行业、汽车和物流跟踪等各行各业都产生了重要影响。然而,物联网带来好处的同时,安全问题也日益突出。为了解决这一问题,我们正在开发智能网络入侵检测系统(NIDS),利用机器学习(ML)技术来检测不断变化的网络威胁和模式。集合式 ML 代表了 ML 领域的最新方向。本研究利用集合式 ML 算法(包括逻辑回归、天真贝叶斯、决策树、额外树、随机森林和梯度提升)为物联网网络提出了一种新的基于异常的解决方案。这些算法在三个不同的入侵检测数据集上进行了测试。集合 ML 方法在 UNSW-NB15 数据集上的准确率达到 98.52%,在 IoTID20 数据集上的准确率达到 88.41%,在 BoTNeTIoT-L01-v2 数据集上的准确率达到 91.03%。
{"title":"ENSEMBLE MACHINE LEARNING APPROACH FOR IOT INTRUSION DETECTION SYSTEMS","authors":"Baseem A. Kadheem Hammood, Ahmed T. Sadiq","doi":"10.25195/ijci.v49i2.458","DOIUrl":"https://doi.org/10.25195/ijci.v49i2.458","url":null,"abstract":"The rapid growth and development of the Internet of Things (IoT) have had an important impact on various industries, including smart cities, the medical profession, autos, and logistics tracking. However, with the benefits of the IoT come security concerns that are becoming increasingly prevalent. This issue is being addressed by developing intelligent network intrusion detection systems (NIDS) using machine learning (ML) techniques to detect constantly changing network threats and patterns. Ensemble ML represents the recent direction in the ML field. This research proposes a new anomaly-based solution for IoT networks utilizing ensemble ML algorithms, including logistic regression, naive Bayes, decision trees, extra trees, random forests, and gradient boosting. The algorithms were tested on three different intrusion detection datasets. The ensemble ML method achieved an accuracy of 98.52% when applied to the UNSW-NB15 dataset, 88.41% on the IoTID20 dataset, and 91.03% on the BoTNeTIoT-L01-v2 dataset.","PeriodicalId":53384,"journal":{"name":"Iraqi Journal for Computers and Informatics","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139141725","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Evaluation of Image Cryptography by Using Secret Session Key and SF Algorithm 使用秘密会话密钥和 SF 算法评估图像加密技术
Pub Date : 2023-12-30 DOI: 10.25195/ijci.v49i2.459
Noor Kareem Jumaa, Abbas Muhammed Allawy
In the unreliable domain of data communication, safeguarding information from unauthorized access is imperative. Given the widespread application of images across various fields, ensuring the confidentiality of image data holds paramount importance. This study centers on the session keys concept, addressing the challenge of key exchange between communicating parties through the development of a random-number generator based on the Linear Feedback Shift Register. Both encryption and decryption hinge on the Secure Force algorithm, supported by a generator. The proposed system outlined in this paper focuses on three key aspects. First, it addresses the generation of secure and randomly generated symmetric encryption keys. Second, it involves the ciphering of the secret image using the SF algorithm. Last, it deals with the extraction of the image by deciphering its encrypted version. The system’s performance is evaluated using image quality metrics, including histograms, peak signal-to-noise ratio, mean square error, normalized correlation, and normalized absolute error (NAE). These metrics provide insights into both encrypted and decrypted images, analyzing the extent to which the system preserves image quality. This assessment underscores the system’s capability to safeguard and maintain the confidentiality of images during data transmission.
在不可靠的数据通信领域,保护信息免遭未经授权的访问势在必行。鉴于图像在各个领域的广泛应用,确保图像数据的机密性至关重要。本研究以会话密钥概念为中心,通过开发基于线性反馈移位寄存器的随机数发生器,解决了通信各方之间密钥交换的难题。在生成器的支持下,加密和解密都取决于安全力算法。本文概述的拟议系统侧重于三个关键方面。首先,它解决了安全随机生成对称加密密钥的问题。其次,它涉及使用 SF 算法对秘密图像进行加密。最后,它涉及通过解密其加密版本来提取图像。系统的性能使用图像质量指标进行评估,包括直方图、峰值信噪比、均方误差、归一化相关性和归一化绝对误差(NAE)。这些指标提供了对加密和解密图像的深入了解,分析了系统在多大程度上保持了图像质量。这一评估强调了系统在数据传输过程中保护和维护图像机密性的能力。
{"title":"Evaluation of Image Cryptography by Using Secret Session Key and SF Algorithm","authors":"Noor Kareem Jumaa, Abbas Muhammed Allawy","doi":"10.25195/ijci.v49i2.459","DOIUrl":"https://doi.org/10.25195/ijci.v49i2.459","url":null,"abstract":"In the unreliable domain of data communication, safeguarding information from unauthorized access is imperative. Given the widespread application of images across various fields, ensuring the confidentiality of image data holds paramount importance. This study centers on the session keys concept, addressing the challenge of key exchange between communicating parties through the development of a random-number generator based on the Linear Feedback Shift Register. Both encryption and decryption hinge on the Secure Force algorithm, supported by a generator. The proposed system outlined in this paper focuses on three key aspects. First, it addresses the generation of secure and randomly generated symmetric encryption keys. Second, it involves the ciphering of the secret image using the SF algorithm. Last, it deals with the extraction of the image by deciphering its encrypted version. The system’s performance is evaluated using image quality metrics, including histograms, peak signal-to-noise ratio, mean square error, normalized correlation, and normalized absolute error (NAE). These metrics provide insights into both encrypted and decrypted images, analyzing the extent to which the system preserves image quality. This assessment underscores the system’s capability to safeguard and maintain the confidentiality of images during data transmission.","PeriodicalId":53384,"journal":{"name":"Iraqi Journal for Computers and Informatics","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139140741","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
COMPARATIVE STUDY OF CHAOTIC SYSTEM FOR ENCRYPTION 用于加密的混沌系统比较研究
Pub Date : 2023-12-30 DOI: 10.25195/ijci.v49i2.457
Doaa S. Salman, Jolan Rokan Naif
Chaotic systems leverage their inherent complexity and unpredictability to generate cryptographic keys, enhancing the security of encryption algorithms. This paper presents a comparative study of 13 chaotic keymaps. Several evaluation metrics, including keyspace size, dimensions, entropy, statistical properties, sensitivity to initial conditions, security level, practical implementation, and adaptability to cloud computing, are utilized to compare the keymaps. Keymaps such as Logistic, Lorenz, and Henon demonstrate robustness and high-security levels, offering large key space sizes and resistance to attacks. Their efficient implementation in a cloud computing environment further validates their suitability for real-world encryption scenarios. The context of the study focuses on the role of the key in encryption and provides a brief specification of each map to assess the effectiveness, security, and suitability of the popular chaotic keymaps for encryption applications. The study also discusses the security assessment of resistance to the popular cryptographic attacks: brute force, known plaintext, chosen plaintext, and side channel. The findings of this comparison reveal the Lorenz Map is the best for the cloud environment based on a specific scenario.
混沌系统利用其固有的复杂性和不可预测性生成加密密钥,从而提高了加密算法的安全性。本文对 13 个混沌密钥映射进行了比较研究。本文采用了多个评估指标,包括密钥空间大小、维数、熵、统计特性、对初始条件的敏感性、安全等级、实用性和对云计算的适应性,对密钥映射进行了比较。Logistic 密钥映射、Lorenz 密钥映射和 Henon 密钥映射等密钥映射显示出稳健性和高安全等级,具有较大的密钥空间大小和抗攻击能力。它们在云计算环境中的高效实施进一步验证了它们在现实世界加密场景中的适用性。研究的背景重点是密钥在加密中的作用,并简要说明了每种密钥图,以评估流行的混沌密钥图在加密应用中的有效性、安全性和适用性。研究还讨论了对流行加密攻击(暴力攻击、已知明文攻击、选择明文攻击和侧信道攻击)的安全性评估。比较结果表明,基于特定场景,洛伦兹图最适合云环境。
{"title":"COMPARATIVE STUDY OF CHAOTIC SYSTEM FOR ENCRYPTION","authors":"Doaa S. Salman, Jolan Rokan Naif","doi":"10.25195/ijci.v49i2.457","DOIUrl":"https://doi.org/10.25195/ijci.v49i2.457","url":null,"abstract":"Chaotic systems leverage their inherent complexity and unpredictability to generate cryptographic keys, enhancing the security of encryption algorithms. This paper presents a comparative study of 13 chaotic keymaps. Several evaluation metrics, including keyspace size, dimensions, entropy, statistical properties, sensitivity to initial conditions, security level, practical implementation, and adaptability to cloud computing, are utilized to compare the keymaps. Keymaps such as Logistic, Lorenz, and Henon demonstrate robustness and high-security levels, offering large key space sizes and resistance to attacks. Their efficient implementation in a cloud computing environment further validates their suitability for real-world encryption scenarios. The context of the study focuses on the role of the key in encryption and provides a brief specification of each map to assess the effectiveness, security, and suitability of the popular chaotic keymaps for encryption applications. The study also discusses the security assessment of resistance to the popular cryptographic attacks: brute force, known plaintext, chosen plaintext, and side channel. The findings of this comparison reveal the Lorenz Map is the best for the cloud environment based on a specific scenario.","PeriodicalId":53384,"journal":{"name":"Iraqi Journal for Computers and Informatics","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139137443","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
DYNAMIC THRESHOLDING GA-BASED ECG FEATURE SELECTION IN CARDIOVASCULAR DISEASE DIAGNOSIS 心血管疾病诊断中基于动态阈值 GA 的心电图特征选择
Pub Date : 2023-12-30 DOI: 10.25195/ijci.v49i2.456
Hasanain F. Hashim, Meriam Jemel, Nadia Ben Azzouna
Electrocardiogram (ECG) data are usually used to diagnose cardiovascular disease (CVD) with the help of a revolutionary algorithm. Feature selection is a crucial step in the development of accurate and reliable diagnostic models for CVDs. This research introduces the dynamic threshold genetic algorithm (DTGA) algorithm, a type of genetic algorithm that is used for optimization problems and discusses its use in the context of feature selection. This research reveals the success of DTGA in selecting relevant ECG features that ultimately enhance accuracy and efficiency in the diagnosis of CVD. This work also proves the benefits of employing DTGA in clinical practice, including a reduction in the amount of time spent diagnosing patients and an increase in the precision with which individuals who are at risk of CVD can be identified.
心电图(ECG)数据通常在革命性算法的帮助下用于诊断心血管疾病(CVD)。特征选择是开发准确可靠的心血管疾病诊断模型的关键步骤。本研究介绍了动态阈值遗传算法(DTGA)算法,这是一种用于优化问题的遗传算法,并讨论了其在特征选择中的应用。这项研究揭示了 DTGA 在选择相关心电图特征方面取得的成功,最终提高了心血管疾病诊断的准确性和效率。这项研究还证明了在临床实践中使用 DTGA 的好处,包括减少诊断病人所花费的时间,提高识别心血管疾病高危人群的精确度。
{"title":"DYNAMIC THRESHOLDING GA-BASED ECG FEATURE SELECTION IN CARDIOVASCULAR DISEASE DIAGNOSIS","authors":"Hasanain F. Hashim, Meriam Jemel, Nadia Ben Azzouna","doi":"10.25195/ijci.v49i2.456","DOIUrl":"https://doi.org/10.25195/ijci.v49i2.456","url":null,"abstract":"Electrocardiogram (ECG) data are usually used to diagnose cardiovascular disease (CVD) with the help of a revolutionary algorithm. Feature selection is a crucial step in the development of accurate and reliable diagnostic models for CVDs. This research introduces the dynamic threshold genetic algorithm (DTGA) algorithm, a type of genetic algorithm that is used for optimization problems and discusses its use in the context of feature selection. This research reveals the success of DTGA in selecting relevant ECG features that ultimately enhance accuracy and efficiency in the diagnosis of CVD. This work also proves the benefits of employing DTGA in clinical practice, including a reduction in the amount of time spent diagnosing patients and an increase in the precision with which individuals who are at risk of CVD can be identified.","PeriodicalId":53384,"journal":{"name":"Iraqi Journal for Computers and Informatics","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139138096","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
EDIBLE FISH IDENTIFICATION BASED ON MACHINE LEARNING 基于机器学习的食用鱼识别
Pub Date : 2023-12-30 DOI: 10.25195/ijci.v49i2.455
Israa Mohammed Hassoon, Shaymaa Akram Hantoosh
Automated fish identification system has a beneficial role in various fields. Fish species can usually be identified based on visual observation and human experiences. False appreciation can cause food poisoning. The proposed system aims to efficiently and effectively identify edible fish from poisonous ones based on three machine learning (ML) techniques. A total of 300 fish images are used, collected from 20 species with differences in shapes, sizes, and colors. Hybrid features were extracted and then fed to three types of ML techniques: k-nearest neighbor (K-NN), support vector machine (SVM), and neural networks (NN). The 300 fish images are divided into two: 70% for training and 30% for testing. The accuracy rates for the presented system were 91.1%, 92.2%, and 94.4% for KNN, SVM, and NNs, respectively. The proposed system is evaluated using four terms: precision, sensitivity, F1-score, and accuracy. Results show that the proposed approach achieved higher accuracy compared with other recent pertinent studies.
自动鱼类识别系统在各个领域都发挥着有益的作用。鱼的种类通常可以通过肉眼观察和人类经验来识别。错误的鉴别会导致食物中毒。拟议的系统旨在基于三种机器学习(ML)技术,高效、有效地识别可食用鱼类和有毒鱼类。该系统共使用了 300 张鱼图像,这些图像来自 20 个鱼种,它们的形状、大小和颜色各不相同。提取混合特征后,将其输入三种机器学习技术:K-近邻(K-NN)、支持向量机(SVM)和神经网络(NN)。300 张鱼图像被一分为二:70% 用于训练,30% 用于测试。KNN、SVM 和 NN 的准确率分别为 91.1%、92.2% 和 94.4%。对所提系统的评估包括四个方面:精确度、灵敏度、F1 分数和准确度。结果表明,与最近的其他相关研究相比,所提出的方法达到了更高的准确率。
{"title":"EDIBLE FISH IDENTIFICATION BASED ON MACHINE LEARNING","authors":"Israa Mohammed Hassoon, Shaymaa Akram Hantoosh","doi":"10.25195/ijci.v49i2.455","DOIUrl":"https://doi.org/10.25195/ijci.v49i2.455","url":null,"abstract":"Automated fish identification system has a beneficial role in various fields. Fish species can usually be identified based on visual observation and human experiences. False appreciation can cause food poisoning. The proposed system aims to efficiently and effectively identify edible fish from poisonous ones based on three machine learning (ML) techniques. A total of 300 fish images are used, collected from 20 species with differences in shapes, sizes, and colors. Hybrid features were extracted and then fed to three types of ML techniques: k-nearest neighbor (K-NN), support vector machine (SVM), and neural networks (NN). The 300 fish images are divided into two: 70% for training and 30% for testing. The accuracy rates for the presented system were 91.1%, 92.2%, and 94.4% for KNN, SVM, and NNs, respectively. The proposed system is evaluated using four terms: precision, sensitivity, F1-score, and accuracy. Results show that the proposed approach achieved higher accuracy compared with other recent pertinent studies.","PeriodicalId":53384,"journal":{"name":"Iraqi Journal for Computers and Informatics","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139141026","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
DDOS ATTACK DETECTION USING HYBRID (CCN AND LSTM) ML MODEL 使用混合(ccn和lstm) ml模型进行Ddos攻击检测
Pub Date : 2023-11-11 DOI: 10.25195/ijci.v49i2.446
Thura Jabbar Khaleel, Nadia Adnan Shiltagh
LSTM (Long Short-Term Memory) and CNN (Convolutional Neural Networks) are two types of deep learning algorithms; by combining the strengths of LSTM and CNN, researchers have developed deep learning models that can effectively detect SDN (Software-Defined Network) attacks including Distributed Denial of Service. These models effectively analyze network traffic, encompassing temporal and spatial characteristics, resulting in precise identification of malicious traffic.In this research, a hybrid model composed of CNN and LSTM is used to detect the DDoS attack in SDN network. Where the CNN component of the model can identify spatial patterns in network traffic, such as the characteristics of individual packets, while the LSTM component can capture temporal patterns in traffic over time, such as the timing and frequency of traffic bursts. The proposed model has been trained on a labeled network traffic dataset, with one class representing normal traffic and another class representing DDoS attack traffic. During the training process, the model adjusts its weights and biases to minimize the difference between its predicted output and the actual output for each input sample. Once trained, the hybrid model classifies incoming network traffic in the dataset as either normal or malicious with an initial accuracy of (78.18%) and losses of (39.77%) at the 1st epoch till it reaches an accuracy of (99.99%) with losses of (9.29×10-5) at the epoch number 500. It should be mentioned that the hybrid model of CNN and LSTM for DDoS detection is implemented using Python Anaconda platform with an ETA 28ms/step.
LSTM(长短期记忆)和CNN(卷积神经网络)是两种类型的深度学习算法;通过结合LSTM和CNN的优势,研究人员开发了可以有效检测SDN(软件定义网络)攻击的深度学习模型,包括分布式拒绝服务。这些模型有效地分析了网络流量,涵盖了时间和空间特征,从而精确识别出恶意流量。在本研究中,采用一种由CNN和LSTM组成的混合模型来检测SDN网络中的DDoS攻击。其中,模型的CNN组件可以识别网络流量中的空间模式,例如单个数据包的特征,而LSTM组件可以捕获流量随时间变化的时间模式,例如流量爆发的时间和频率。该模型在一个标记的网络流量数据集上进行了训练,其中一类代表正常流量,另一类代表DDoS攻击流量。在训练过程中,模型调整其权重和偏差,以最小化每个输入样本的预测输出与实际输出之间的差异。经过训练后,混合模型将数据集中传入的网络流量分类为正常或恶意,初始准确率为78.18%,第一个epoch的损失为39.77%,直到它达到准确率为99.99%,epoch号为500时损失为9.29×10-5。值得一提的是,CNN和LSTM用于DDoS检测的混合模型是使用Python Anaconda平台实现的,ETA为28ms/步。
{"title":"DDOS ATTACK DETECTION USING HYBRID (CCN AND LSTM) ML MODEL","authors":"Thura Jabbar Khaleel, Nadia Adnan Shiltagh","doi":"10.25195/ijci.v49i2.446","DOIUrl":"https://doi.org/10.25195/ijci.v49i2.446","url":null,"abstract":"LSTM (Long Short-Term Memory) and CNN (Convolutional Neural Networks) are two types of deep learning algorithms; by combining the strengths of LSTM and CNN, researchers have developed deep learning models that can effectively detect SDN (Software-Defined Network) attacks including Distributed Denial of Service. These models effectively analyze network traffic, encompassing temporal and spatial characteristics, resulting in precise identification of malicious traffic.In this research, a hybrid model composed of CNN and LSTM is used to detect the DDoS attack in SDN network. Where the CNN component of the model can identify spatial patterns in network traffic, such as the characteristics of individual packets, while the LSTM component can capture temporal patterns in traffic over time, such as the timing and frequency of traffic bursts. The proposed model has been trained on a labeled network traffic dataset, with one class representing normal traffic and another class representing DDoS attack traffic. During the training process, the model adjusts its weights and biases to minimize the difference between its predicted output and the actual output for each input sample. Once trained, the hybrid model classifies incoming network traffic in the dataset as either normal or malicious with an initial accuracy of (78.18%) and losses of (39.77%) at the 1st epoch till it reaches an accuracy of (99.99%) with losses of (9.29×10-5) at the epoch number 500. It should be mentioned that the hybrid model of CNN and LSTM for DDoS detection is implemented using Python Anaconda platform with an ETA 28ms/step.","PeriodicalId":53384,"journal":{"name":"Iraqi Journal for Computers and Informatics","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135042613","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
DIAGNOSE EYES DISEASES USING VARIOUS FEATURES EXTRACTION APPROACHES AND MACHINE LEARNING ALGORITHMS 使用各种特征提取方法和机器学习算法诊断眼部疾病
Pub Date : 2023-09-30 DOI: 10.25195/ijci.v49i2.437
Zahraa Najm Abed, Abbas M Al-Bakry
Ophthalmic diseases like glaucoma, diabetic retinopathy, and cataracts are the main cause of visual impairment worldwide. With the use of the fundus images, it could be difficult for a clinician to detect eye diseases early enough. By other hand, the diagnoses of eye disease are prone to errors, challenging and labor-intensive. Thus, for the purpose of identifying various eye problems with the use of the fundus images, a system of automated ocular disease detection with computer-assisted tools is needed. Due to machine learning (ML) algorithms' advanced skills for image classification, this kind of system is feasible. An essential area of artificial intelligence)AI (is machine learning. Ophthalmologists will soon be able to deliver accurate diagnoses and support individualized healthcare thanks to the general capacity of machine learning to automatically identify, find, and grade pathological aspects in ocular disorders. This work presents a ML-based method for targeted ocular detection. The Ocular Disease Intelligent Recognition (ODIR) dataset, which includes 5,000 images of 8 different fundus types, was classified using machine learning methods. Various ocular diseases are represented by these classes. In this study, the dataset was divided into 70% training data and 30% test data, and preprocessing operations were performed on all images starting from color image conversion to grayscale, histogram equalization, BLUR, and resizing operation. The feature extraction represents the next phase in this study ,two algorithms are applied to perform the extraction of features which includes: SIFT(Scale-invariant feature transform) and GLCM(Gray Level Co-occurrence Matrix), ODIR dataset is then subjected to the classification techniques Naïve Bayes, Decision Tree, Random Forest, and K-nearest Neighbor. This study achieved the highest accuracy for binary classification (abnormal and normal) which is 75% (NB algorithm), 62% (RF algorithm), 53% (KNN algorithm), 51% (DT algorithm) and achieved the highest accuracy for multiclass classification (types of eye diseases) which is 88% (RF algorithm), 61% (KNN algorithm) 42% (NB algorithm), and 39% (DT algorithm).
青光眼、糖尿病视网膜病变和白内障等眼科疾病是全球视力损害的主要原因。由于使用眼底图像,临床医生可能很难及早发现眼部疾病。另一方面,眼病的诊断容易出错,具有挑战性和劳动密集型。因此,为了利用眼底图像识别各种眼部问题,需要一种带有计算机辅助工具的眼部疾病自动检测系统。由于机器学习(ML)算法在图像分类方面的先进技术,这种系统是可行的。人工智能的一个重要领域是机器学习。由于机器学习能够自动识别、发现和分级眼部疾病的病理方面,眼科医生将很快能够提供准确的诊断并支持个性化的医疗保健。本文提出了一种基于机器学习的眼部目标检测方法。眼部疾病智能识别(ODIR)数据集包括8种不同眼底类型的5000张图像,使用机器学习方法进行分类。这些类别代表了各种眼病。在本研究中,将数据集分为70%的训练数据和30%的测试数据,对所有图像进行预处理操作,从彩色图像转换到灰度、直方图均衡化、模糊和调整大小操作。特征提取是本研究的下一阶段,采用两种算法进行特征提取,分别是SIFT(Scale-invariant feature transform)和GLCM(Gray Level Co-occurrence Matrix),然后对ODIR数据集进行Naïve贝叶斯、决策树、随机森林和k近邻分类技术。本研究对二元分类(异常和正常)的准确率最高,分别为75% (NB算法)、62% (RF算法)、53% (KNN算法)、51% (DT算法);对多类分类(眼病类型)的准确率最高,分别为88% (RF算法)、61% (KNN算法)、42% (NB算法)、39% (DT算法)。
{"title":"DIAGNOSE EYES DISEASES USING VARIOUS FEATURES EXTRACTION APPROACHES AND MACHINE LEARNING ALGORITHMS","authors":"Zahraa Najm Abed, Abbas M Al-Bakry","doi":"10.25195/ijci.v49i2.437","DOIUrl":"https://doi.org/10.25195/ijci.v49i2.437","url":null,"abstract":"Ophthalmic diseases like glaucoma, diabetic retinopathy, and cataracts are the main cause of visual impairment worldwide. With the use of the fundus images, it could be difficult for a clinician to detect eye diseases early enough. By other hand, the diagnoses of eye disease are prone to errors, challenging and labor-intensive. Thus, for the purpose of identifying various eye problems with the use of the fundus images, a system of automated ocular disease detection with computer-assisted tools is needed. Due to machine learning (ML) algorithms' advanced skills for image classification, this kind of system is feasible. An essential area of artificial intelligence)AI (is machine learning. Ophthalmologists will soon be able to deliver accurate diagnoses and support individualized healthcare thanks to the general capacity of machine learning to automatically identify, find, and grade pathological aspects in ocular disorders. This work presents a ML-based method for targeted ocular detection. The Ocular Disease Intelligent Recognition (ODIR) dataset, which includes 5,000 images of 8 different fundus types, was classified using machine learning methods. Various ocular diseases are represented by these classes. In this study, the dataset was divided into 70% training data and 30% test data, and preprocessing operations were performed on all images starting from color image conversion to grayscale, histogram equalization, BLUR, and resizing operation. The feature extraction represents the next phase in this study ,two algorithms are applied to perform the extraction of features which includes: SIFT(Scale-invariant feature transform) and GLCM(Gray Level Co-occurrence Matrix), ODIR dataset is then subjected to the classification techniques Naïve Bayes, Decision Tree, Random Forest, and K-nearest Neighbor. This study achieved the highest accuracy for binary classification (abnormal and normal) which is 75% (NB algorithm), 62% (RF algorithm), 53% (KNN algorithm), 51% (DT algorithm) and achieved the highest accuracy for multiclass classification (types of eye diseases) which is 88% (RF algorithm), 61% (KNN algorithm) 42% (NB algorithm), and 39% (DT algorithm).","PeriodicalId":53384,"journal":{"name":"Iraqi Journal for Computers and Informatics","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135083951","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
COMPARATIVE STUDY OF FONT RECOGNITION USING CONVOLUTIONAL NEURAL NETWORKS AND TWO FEATURE EXTRACTION METHODS WITH SUPPORT VECTOR MACHINE 基于卷积神经网络的字体识别与基于支持向量机的两种特征提取方法的比较研究
Pub Date : 2023-09-28 DOI: 10.25195/ijci.v49i2.434
Aveen Jalal Mohammed, Jwan Abdulkhaliq Mohammed, Amera Ismail Melhum
Font recognition is one of the essential issues in document recognition and analysis, and is frequently a complex and time-consuming process. Many techniques of optical character recognition (OCR) have been suggested and some of them have been marketed, however, a few of these techniques considered font recognition. The issue of OCR is that it saves copies of documents to make them searchable, but the documents stop having the original appearance. To solve this problem, this paper presents a system for recognizing three and six English fonts from character images using Convolution Neural Network (CNN), and then compare the results of proposed system with the two studies. The first study used NCM features and SVM as a classification method, and the second study used DP features and SVM as classification method. The data of this study were taken from Al-Khaffaf dataset [21]. The two types of datasets have been used: the first type is about 27,620 sample for the three fonts classification and the second type is about 72,983 sample for the six fonts classification and both datasets are English character images in gray scale format with 8 bits. The results showed that CNN achieved the highest recognition rate in the proposed system compared with the two studies reached 99.75% and 98.329 % for the three and six fonts recognition, respectively. In addition, CNN got the least time required for creating model about 6 minutes and 23- 24 minutes for three and six fonts recognition, respectively. Based on the results, we can conclude that CNN technique is the best and most accurate model for recognizing fonts.
字体识别是文档识别和分析的核心问题之一,往往是一个复杂而耗时的过程。许多光学字符识别(OCR)技术已经被提出,其中一些已经上市,然而,这些技术很少考虑字体识别。OCR的问题在于,它保存文档的副本以使其可搜索,但文档不再具有原始外观。为了解决这一问题,本文提出了一种基于卷积神经网络(CNN)从字符图像中识别三种和六种英文字体的系统,并与两种研究的结果进行了比较。第一项研究使用NCM特征和SVM作为分类方法,第二项研究使用DP特征和SVM作为分类方法。本研究数据取自Al-Khaffaf数据集[21]。使用了两类数据集:第一类为三种字体分类约27,620个样本,第二类为六种字体分类约72,983个样本,两类数据集均为8位灰度格式的英文字符图像。结果表明,与两项研究相比,CNN在本文系统中对3种字体和6种字体的识别率分别达到了99.75%和98.329%。此外,CNN创建模型所需时间最短,分别为6分钟和23- 24分钟,分别为3个和6个字体识别。基于这些结果,我们可以得出结论,CNN技术是识别字体最好、最准确的模型。
{"title":"COMPARATIVE STUDY OF FONT RECOGNITION USING CONVOLUTIONAL NEURAL NETWORKS AND TWO FEATURE EXTRACTION METHODS WITH SUPPORT VECTOR MACHINE","authors":"Aveen Jalal Mohammed, Jwan Abdulkhaliq Mohammed, Amera Ismail Melhum","doi":"10.25195/ijci.v49i2.434","DOIUrl":"https://doi.org/10.25195/ijci.v49i2.434","url":null,"abstract":"Font recognition is one of the essential issues in document recognition and analysis, and is frequently a complex and time-consuming process. Many techniques of optical character recognition (OCR) have been suggested and some of them have been marketed, however, a few of these techniques considered font recognition. The issue of OCR is that it saves copies of documents to make them searchable, but the documents stop having the original appearance. To solve this problem, this paper presents a system for recognizing three and six English fonts from character images using Convolution Neural Network (CNN), and then compare the results of proposed system with the two studies. The first study used NCM features and SVM as a classification method, and the second study used DP features and SVM as classification method. The data of this study were taken from Al-Khaffaf dataset [21]. The two types of datasets have been used: the first type is about 27,620 sample for the three fonts classification and the second type is about 72,983 sample for the six fonts classification and both datasets are English character images in gray scale format with 8 bits. The results showed that CNN achieved the highest recognition rate in the proposed system compared with the two studies reached 99.75% and 98.329 % for the three and six fonts recognition, respectively. In addition, CNN got the least time required for creating model about 6 minutes and 23- 24 minutes for three and six fonts recognition, respectively. Based on the results, we can conclude that CNN technique is the best and most accurate model for recognizing fonts.","PeriodicalId":53384,"journal":{"name":"Iraqi Journal for Computers and Informatics","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135470000","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
AN OVERVIEW SMART ASSISTANT SYSTEM FOR OLD PEOPLE USING INTERNET OF THINGS 基于物联网的老年人智能助手系统概述
Pub Date : 2023-09-22 DOI: 10.25195/ijci.v49i2.432
Luma Sabbar Zamel, Jolan Rokan Naif
The Internet of Things is a technology that applied in the field of healthcare, especially elderly patients, and allows patients to be tracked without the need for direct physical interaction with patients. Diseases and other consequences can be recognized early, especially those who are more likely to have a disorder in their physiological data. It is critically necessary to create new approaches and technology in order to improve health care for the aged population at a price that is more cheap and in a form that is simpler to use. In addition, patients and members of their families get a sense of peace when they are aware that they are being observed and will be assisted in the event that any complications emerge. This study uses a literature review to explore the ideas behind healthcare system components, in addition this study examines the characteristics, requirements, and definitions of internet of things. The primary purpose of this study is to introduce the reader to the various sensors and other healthcare system components utilised for the purpose of monitoring the elderly. However, this work will help future researchers who desire to do study in this field of healthcare systems and assist efficient knowledge acquisition by providing a solid foundation.
物联网是一项应用于医疗保健领域,特别是老年患者的技术,无需与患者进行直接的身体互动,即可对患者进行跟踪。疾病和其他后果可以及早发现,特别是那些更有可能在生理数据上有障碍的人。极为有必要创造新的方法和技术,以更便宜的价格和更易于使用的形式改善老年人口的保健服务。此外,当患者及其家属意识到他们正在被观察时,他们会有一种平静的感觉,并且在出现任何并发症时将得到帮助。本研究以文献回顾的方式探讨医疗系统组件背后的概念,并检视物联网的特征、需求及定义。本研究的主要目的是向读者介绍用于监测老年人的各种传感器和其他医疗保健系统组件。然而,这项工作将有助于未来的研究人员谁愿意做在这一领域的研究卫生保健系统和协助有效的知识获取提供了坚实的基础。
{"title":"AN OVERVIEW SMART ASSISTANT SYSTEM FOR OLD PEOPLE USING INTERNET OF THINGS","authors":"Luma Sabbar Zamel, Jolan Rokan Naif","doi":"10.25195/ijci.v49i2.432","DOIUrl":"https://doi.org/10.25195/ijci.v49i2.432","url":null,"abstract":"The Internet of Things is a technology that applied in the field of healthcare, especially elderly patients, and allows patients to be tracked without the need for direct physical interaction with patients. Diseases and other consequences can be recognized early, especially those who are more likely to have a disorder in their physiological data. It is critically necessary to create new approaches and technology in order to improve health care for the aged population at a price that is more cheap and in a form that is simpler to use. In addition, patients and members of their families get a sense of peace when they are aware that they are being observed and will be assisted in the event that any complications emerge. This study uses a literature review to explore the ideas behind healthcare system components, in addition this study examines the characteristics, requirements, and definitions of internet of things. The primary purpose of this study is to introduce the reader to the various sensors and other healthcare system components utilised for the purpose of monitoring the elderly. However, this work will help future researchers who desire to do study in this field of healthcare systems and assist efficient knowledge acquisition by providing a solid foundation.","PeriodicalId":53384,"journal":{"name":"Iraqi Journal for Computers and Informatics","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136100597","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Iraqi Journal for Computers and Informatics
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1