Preferred Language
Articles
/
8heXZ44BVTCNdQwC3EZW
Detection and pathogenicity of Listeria monocytogenes in common carp (Cyprinus carpio) fish in Baghdad, Iraq
...Show More Authors

Scopus Crossref
View Publication
Publication Date
Sun Jun 30 2024
Journal Name
International Journal Of Intelligent Engineering And Systems
Eco-friendly and Secure Data Center to Detection Compromised Devices Utilizing Swarm Approach
...Show More Authors

Modern civilization increasingly relies on sustainable and eco-friendly data centers as the core hubs of intelligent computing. However, these data centers, while vital, also face heightened vulnerability to hacking due to their role as the convergence points of numerous network connection nodes. Recognizing and addressing this vulnerability, particularly within the confines of green data centers, is a pressing concern. This paper proposes a novel approach to mitigate this threat by leveraging swarm intelligence techniques to detect prospective and hidden compromised devices within the data center environment. The core objective is to ensure sustainable intelligent computing through a colony strategy. The research primarily focusses on the

... Show More
View Publication
Scopus (5)
Scopus Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Fifth International Conference On Applied Sciences: Icas2023
Facial deepfake performance evaluation based on three detection tools: MTCNN, Dlib, and MediaPipe
...Show More Authors

View Publication
Scopus (2)
Crossref (2)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (6)
Crossref (2)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (6)
Crossref (2)
Scopus Crossref
Publication Date
Fri Aug 12 2022
Journal Name
Future Internet
Improved DDoS Detection Utilizing Deep Neural Networks and Feedforward Neural Networks as Autoencoder
...Show More Authors

Software-defined networking (SDN) is an innovative network paradigm, offering substantial control of network operation through a network’s architecture. SDN is an ideal platform for implementing projects involving distributed applications, security solutions, and decentralized network administration in a multitenant data center environment due to its programmability. As its usage rapidly expands, network security threats are becoming more frequent, leading SDN security to be of significant concern. Machine-learning (ML) techniques for intrusion detection of DDoS attacks in SDN networks utilize standard datasets and fail to cover all classification aspects, resulting in under-coverage of attack diversity. This paper proposes a hybr

... Show More
View Publication Preview PDF
Scopus (36)
Crossref (29)
Scopus Clarivate Crossref
Publication Date
Thu Feb 21 2019
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The Role of Re-engineering Business Processes in Continuous Improvement: Exploratory Statement of The Views of a Sample of The Faculties in The Law, Administration and Economy- University of Baghdad
...Show More Authors

The present study aimed to investigate the effect of re-operations engineering business in continuous improvement, as the rapid development of service activities generally private and the great diversity in the goals of its operations and programs of the university and the service has led to the increasing importance of re-operations engineering business as well as continuous improvement so began to study the relationship between the re engineering and continuous improvement of university service, and applied study on a sample of professors from the faculties of administration, economics and law. Find and reach to several conclusions, notably that the preparation of the teaching staff training sessions on how to use modern teaching

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Sep 30 2023
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Determinants of Investment Allocations in the Agricultural Sector in Iraq : A Comparison Between the Method of least Squares Approach and the errror Correction Model
...Show More Authors

Abstract

                 The research aimed to test the relationship between the size of investment allocations in the agricultural sector in Iraq and their determinants using the Ordinary Least Squares (OLS) method compared to the Error Correction Model (ECM) approach. The time series data for the period from 1990 to 2021 was utilized. The analysis showed that the estimates obtained using the ECM were more accurate and significant than those obtained using the OLS method. Johansen's test indicated the presence of a long-term equilibrium relationship between the size of investment allocations and their determinants. The results of th

... Show More
View Publication Preview PDF
Publication Date
Sat Feb 01 2014
Journal Name
Journal Of Economics And Administrative Sciences
EXTENSION ADMINISTRATION PERFORMANCE UNDER QUALITY STANDARDS FROM THE PERSPECTIVE OF THE WORKING STAFF IN AGRICULTURAL EXTENSION AND VEGETABLES FARMERS OF CENTRAL GOVERNORATES IN IRAQ
...Show More Authors

This research aims to identify the level of extension administration performance under comprehensive quality standards from the perspective of the working staff in agricultural extension at the level of the general extension body and agricultural directorates and agricultural division.this was to identify the extension administration performance under comprehensive quality standards from the perspective of vegetables growers , random sample was selected from the central region governorates Baghdad , Diyala , Babel , karbala and Al-Najaf , a random sample from the workers in the general body numbered 56 employee , sample of staff working in agricultural extension was selected at the level of agricultural directorates in proportion

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Jun 01 2017
Journal Name
Journal Of Economics And Administrative Sciences
The Trends of Fiscal Policy in bearing the financial burden of the government and the Extent Leadership in Iraq during the period 2004- 2014
...Show More Authors

Abstract

There has been a heated controversy over the role the financial policy plays and how sufficient   it   is   in affording   the   financial   burden. This   burden   is   known as the operational   current expenses   which   the   governments   of   various countries mainly afford,   despite the   discrepancy   in   the   government’s   economic   policy.   After   the deterioration and deficit in the state budget in all countries nowadays, it was necessary to find an appropri

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Jun 30 2020
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
MUNICIPAL SOLID WASTE IN IRAQ BETWEEN THE HAMMER OF POPULATION GROWTH AND THE ANVIL OF THE ADMINISTRATION, FACTS, TREATMENTS AND VISION OF THE FUTURE: MUNICIPAL SOLID WASTE IN IRAQ BETWEEN THE HAMMER OF POPULATION GROWTH AND THE ANVIL OF THE ADMINISTRATION, FACTS, TREATMENTS AND VISION OF THE FUTURE
...Show More Authors

   Municipal solid waste is one of the most important environmental problems in the world and is an important source of environmental pollution and contributes significantly to the pollution of the basic environmental elements of soil, water and air. The management of municipal waste in general is a process of monitoring, collection, treatment or recycling if possible or disposal of waste. This term is used for waste produced by some human activities. States provide this process to mitigate the negative effects of waste on the environment, health and appearance of the city. It is possible to find solutions to the problem of solid waste and make it an important source of income and contribute to securing employment oppor

... Show More
View Publication Preview PDF