[PDF][PDF] Metaverse: open possibilities
M Aljanabi, SY Mohammed - Iraqi Journal For Computer Science and …, 2023 - iasj.net
To create a completely immersive, highly spatiotemporal, and self-sustaining virtual shared
place for humans to play, work, and interact, the Metaverse is an emerging paradigm of the …
place for humans to play, work, and interact, the Metaverse is an emerging paradigm of the …
Categorizing the students' activities for automated exam proctoring using proposed deep L2-GraftNet CNN network and ASO based feature selection approach
Exam proctoring is a hectic task ie, the monitoring of students' activities becomes difficult for
supervisors in the examination rooms. It is a costly approach that requires much labor. Also …
supervisors in the examination rooms. It is a costly approach that requires much labor. Also …
[PDF][PDF] Intrusion Detection: A Review
Due to the processes involved in the electronic transformation of data, the use of computer
systems and the Internet in recent years has led to significant security, privacy, and …
systems and the Internet in recent years has led to significant security, privacy, and …
[PDF][PDF] Improved intrusion detection algorithm based on TLBO and GA algorithms.
M Al-Janabi, MA Ismail - Int. Arab J. Inf. Technol., 2021 - ccis2k.org
Optimization algorithms are widely used for the identification of intrusion. This is attributable
to the increasing number of audit data features and the decreasing performance of human …
to the increasing number of audit data features and the decreasing performance of human …
Improved TLBO‐JAYA algorithm for subset feature selection and parameter optimisation in intrusion detection system
Many optimisation‐based intrusion detection algorithms have been developed and are
widely used for intrusion identification. This condition is attributed to the increasing number …
widely used for intrusion identification. This condition is attributed to the increasing number …
Review of the machine learning methods in the classification of phishing attack
The development of computer networks today has increased rapidly. This can be seen
based on the trend of computer users around the world, whereby they need to connect their …
based on the trend of computer users around the world, whereby they need to connect their …
[PDF][PDF] Optimized machine learning algorithm for intrusion detection
Intrusion detection is mainly achieved by using optimization algorithms. The need for
optimization algorithms for intrusion detection is necessitated by the increasing number of …
optimization algorithms for intrusion detection is necessitated by the increasing number of …
[PDF][PDF] Rao-SVM machine learning algorithm for intrusion detection system
SN Abd, M Alsajri, HR Ibraheem - Iraqi Journal For Computer Science and …, 2020 - iasj.net
Most of the intrusion detection systems are developed based on optimization algorithms as a
result of the increase in audit data features; optimization algorithms are also considered for …
result of the increase in audit data features; optimization algorithms are also considered for …
[HTML][HTML] Systematic literature review on intrusion detection systems: Research trends, algorithms, methods, datasets, and limitations
MM Issa, M Aljanabi, HM Muhialdeen - Journal of Intelligent Systems, 2024 - degruyter.com
Abstract Machine learning (ML) and deep learning (DL) techniques have demonstrated
significant potential in the development of effective intrusion detection systems. This study …
significant potential in the development of effective intrusion detection systems. This study …
Adaboost-multilayer perceptron to predict the student's performance in software engineering
Software Engineering (SE) course is one of the backbones of today's computer technology
sophistication. Effective theoretical and practical learning of this course is essential to …
sophistication. Effective theoretical and practical learning of this course is essential to …