Preferred Language
Articles
/
7BaLuYsBVTCNdQwCN9fi
Detection Levels of Cytokines (IL-6 and IL-18) and Microbial Parameters in Patients with Renal Failure in Diyala Province
...Show More Authors

Publication Date
Sat Apr 30 2022
Journal Name
Revue D'intelligence Artificielle
Performance Evaluation of SDN DDoS Attack Detection and Mitigation Based Random Forest and K-Nearest Neighbors Machine Learning Algorithms
...Show More Authors

Software-defined networks (SDN) have a centralized control architecture that makes them a tempting target for cyber attackers. One of the major threats is distributed denial of service (DDoS) attacks. It aims to exhaust network resources to make its services unavailable to legitimate users. DDoS attack detection based on machine learning algorithms is considered one of the most used techniques in SDN security. In this paper, four machine learning techniques (Random Forest, K-nearest neighbors, Naive Bayes, and Logistic Regression) have been tested to detect DDoS attacks. Also, a mitigation technique has been used to eliminate the attack effect on SDN. RF and KNN were selected because of their high accuracy results. Three types of ne

... Show More
View Publication
Scopus (17)
Crossref (6)
Scopus Crossref
Publication Date
Thu May 05 2022
Journal Name
Al-kindy College Medical Journal
Assessment of Lipid Profile among Sudanese patients with Type 2 Diabetes Mellitus
...Show More Authors

Background: Diabetes mellitus is a major health issue that is one of the leading causes of cardiovascular disease. Recent studies have found a link between uncontrolled diabetes and cardiovascular disease, with dyslipidaemia predicting glycated-hemoglobin (HbA1c), which could be a major contributor to type 2 diabetes complications and etiology.

Objectives: The objective of present study was estimate lipid profiles among control and uncontrolled type 2 diabetic patients.

Subjects and Methods: Analytical case control based study, One hundred twenty participate were included in study, 70 patients with DM  as case group  refer to Abuagala Center and difference follow up diabetic center  and 50 non diabetic subjects taken as

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Dec 06 2018
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Belief about Medications among Sample of Iraqi Patients with Inflammatory Bowel Disease
...Show More Authors

 Inflammatory bowel disease includes both Crohn’s disease and ulcerative colitis, is a chronic, progressive relapsing disease of gastrointestinal tract that require long-term treatment or maintenance therapy. Taking patient’s beliefs about the prescribed medication in consideration had been shown to be an important factor that affects compliance of the patient in whom having positive beliefs is a prerequisite for better compliance. The aim of the current study was to investigate and assess beliefs about medicines among a sample of Iraqi patients with inflammatory bowel disease and to determine possible association between these beliefs and some patient-specific factors.

This study is a cross-sectional study carried out o

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (4)
Scopus Crossref
Publication Date
Sun Jun 30 2024
Journal Name
International Journal Of Intelligent Engineering And Systems
Eco-friendly and Secure Data Center to Detection Compromised Devices Utilizing Swarm Approach
...Show More Authors

Modern civilization increasingly relies on sustainable and eco-friendly data centers as the core hubs of intelligent computing. However, these data centers, while vital, also face heightened vulnerability to hacking due to their role as the convergence points of numerous network connection nodes. Recognizing and addressing this vulnerability, particularly within the confines of green data centers, is a pressing concern. This paper proposes a novel approach to mitigate this threat by leveraging swarm intelligence techniques to detect prospective and hidden compromised devices within the data center environment. The core objective is to ensure sustainable intelligent computing through a colony strategy. The research primarily focusses on the

... Show More
View Publication
Scopus (4)
Scopus Crossref
Publication Date
Thu Jan 20 2022
Journal Name
Webology
Hybrid Intrusion Detection System based on DNA Encoding, Teiresias Algorithm and Clustering Method
...Show More Authors

Until recently, researchers have utilized and applied various techniques for intrusion detection system (IDS), including DNA encoding and clustering that are widely used for this purpose. In addition to the other two major techniques for detection are anomaly and misuse detection, where anomaly detection is done based on user behavior, while misuse detection is done based on known attacks signatures. However, both techniques have some drawbacks, such as a high false alarm rate. Therefore, hybrid IDS takes advantage of combining the strength of both techniques to overcome their limitations. In this paper, a hybrid IDS is proposed based on the DNA encoding and clustering method. The proposed DNA encoding is done based on the UNSW-NB15

... Show More
View Publication
Crossref (3)
Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (4)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (4)
Scopus Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Fifth International Conference On Applied Sciences: Icas2023
Facial deepfake performance evaluation based on three detection tools: MTCNN, Dlib, and MediaPipe
...Show More Authors

View Publication
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Fri Aug 12 2022
Journal Name
Future Internet
Improved DDoS Detection Utilizing Deep Neural Networks and Feedforward Neural Networks as Autoencoder
...Show More Authors

Software-defined networking (SDN) is an innovative network paradigm, offering substantial control of network operation through a network’s architecture. SDN is an ideal platform for implementing projects involving distributed applications, security solutions, and decentralized network administration in a multitenant data center environment due to its programmability. As its usage rapidly expands, network security threats are becoming more frequent, leading SDN security to be of significant concern. Machine-learning (ML) techniques for intrusion detection of DDoS attacks in SDN networks utilize standard datasets and fail to cover all classification aspects, resulting in under-coverage of attack diversity. This paper proposes a hybr

... Show More
View Publication Preview PDF
Scopus (31)
Crossref (24)
Scopus Clarivate Crossref
Publication Date
Sat Oct 28 2023
Journal Name
Baghdad Science Journal
Impact of some environmental parameters on phytoplankton diversity in the eastern Al-Hammer marsh / southern Iraq
...Show More Authors

Biodiversity is one of the important biological factors in determining water quality and maintaining the
ecological balance. In this study, there are 223 species of phytoplankton were identified, and they are as
follows: 88 species of Bacillariophyta and were at 44%,70 species of Chlorophyta and they were at 29 %, 39
species of Cyanophyta and they were at 16 %, 12 species of Euglenozoa and they were at 4 %, four species of
Miozoa and they were at 3 %, and, Phylum Charophyta and Ochrophyta were only eight and two species,
respectively and both of them were at 2%. The common phytoplankton recorded in the sites studied
include Nitzschia palea, Scenedesmus quadricauda, Oscillatoria princeps, and Peridinium

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (1)
Scopus Crossref