[PDF][PDF] Metaverse: open possibilities

M Aljanabi, SY Mohammed - Iraqi Journal For Computer Science and …, 2023 - iasj.net
To create a completely immersive, highly spatiotemporal, and self-sustaining virtual shared
place for humans to play, work, and interact, the Metaverse is an emerging paradigm of the …

Categorizing the students' activities for automated exam proctoring using proposed deep L2-GraftNet CNN network and ASO based feature selection approach

T Saba, A Rehman, NSM Jamail, SL Marie-Sainte… - IEEE …, 2021 - ieeexplore.ieee.org
Exam proctoring is a hectic task ie, the monitoring of students' activities becomes difficult for
supervisors in the examination rooms. It is a costly approach that requires much labor. Also …

[PDF][PDF] Intrusion Detection: A Review

M Aljanabi, MA Ismail, RA Hasan, J Sulaiman - Mesopotamian Journal of …, 2021 - iasj.net
Due to the processes involved in the electronic transformation of data, the use of computer
systems and the Internet in recent years has led to significant security, privacy, and …

[PDF][PDF] Improved intrusion detection algorithm based on TLBO and GA algorithms.

M Al-Janabi, MA Ismail - Int. Arab J. Inf. Technol., 2021 - ccis2k.org
Optimization algorithms are widely used for the identification of intrusion. This is attributable
to the increasing number of audit data features and the decreasing performance of human …

Improved TLBO‐JAYA algorithm for subset feature selection and parameter optimisation in intrusion detection system

M Aljanabi, MA Ismail, V Mezhuyev - Complexity, 2020 - Wiley Online Library
Many optimisation‐based intrusion detection algorithms have been developed and are
widely used for intrusion identification. This condition is attributed to the increasing number …

Review of the machine learning methods in the classification of phishing attack

JA Jupin, T Sutikno, MA Ismail, MS Mohamad… - Bulletin of Electrical …, 2019 - beei.org
The development of computer networks today has increased rapidly. This can be seen
based on the trend of computer users around the world, whereby they need to connect their …

[PDF][PDF] Optimized machine learning algorithm for intrusion detection

RAI Alhayali, M Aljanabi, AH Ali… - Indonesian Journal of …, 2021 - academia.edu
Intrusion detection is mainly achieved by using optimization algorithms. The need for
optimization algorithms for intrusion detection is necessitated by the increasing number of …

[PDF][PDF] Rao-SVM machine learning algorithm for intrusion detection system

SN Abd, M Alsajri, HR Ibraheem - Iraqi Journal For Computer Science and …, 2020 - iasj.net
Most of the intrusion detection systems are developed based on optimization algorithms as a
result of the increase in audit data features; optimization algorithms are also considered for …

[HTML][HTML] Systematic literature review on intrusion detection systems: Research trends, algorithms, methods, datasets, and limitations

MM Issa, M Aljanabi, HM Muhialdeen - Journal of Intelligent Systems, 2024 - degruyter.com
Abstract Machine learning (ML) and deep learning (DL) techniques have demonstrated
significant potential in the development of effective intrusion detection systems. This study …

Adaboost-multilayer perceptron to predict the student's performance in software engineering

AFZ Abidin, MF Darmawan, MZ Osman, S Anwar… - Bulletin of Electrical …, 2019 - beei.org
Software Engineering (SE) course is one of the backbones of today's computer technology
sophistication. Effective theoretical and practical learning of this course is essential to …