Preferred Language
Articles
/
BBiDvJgBVTCNdQwC8MFa
Safety assessment model for DoS attacks detection in wireless communication and network OS environments
...Show More Authors

Wireless networks and communications have witnessed tremendous development and growth in recent periods and up until now, as there is a group of diverse networks such as the well-known wireless communication networks and others that are not linked to an infrastructure such as telephone networks, sensors and wireless networks, especially in important applications that work to send and receive important data and information in relatively unsafe environments, cybersecurity technologies pose an important challenge in protecting unsafe networks in terms of their impact on reducing crime. Detecting hacking in electronic networks and penetration testing. Therefore, these environments must be monitored and protected from hacking and malicious attacks. In this manuscript, a correspondence model is designed to discuss the algorithm in the environment of wireless communication systems and distributed computing by adopting the protocol data enhancement to the network using structured construction and diversity algorithm to improve the effectiveness of the intrusion detection system. Next, a multi-label convolutional neural network model is used to detect business transactions. An CNN was trained on the WSN-DS dataset using 5-Fold in CV technique with three hidden layers. The highest Precision values 0.951 of Grayhole attack for multi-classification.

Scopus Clarivate Crossref
View Publication
Publication Date
Sat Jan 01 2011
Journal Name
Trends In Network And Communications
Header Compression Scheme over Hybrid Satellite-WiMAX Network
...Show More Authors

View Publication
Scopus (1)
Scopus Crossref
Publication Date
Sat Feb 09 2019
Journal Name
Journal Of The College Of Education For Women
Key Exchange Management by using Neural Network Synchronization
...Show More Authors

The paper presents a neural synchronization into intensive study in order to address challenges preventing from adopting it as an alternative key exchange algorithm. The results obtained from the implementation of neural synchronization with this proposed system address two challenges: namely the verification of establishing the synchronization between the two neural networks, and the public initiation of the input vector for each party. Solutions are presented and mathematical model is developed and presented, and as this proposed system focuses on stream cipher; a system of LFSRs (linear feedback shift registers) has been used with a balanced memory to generate the key. The initializations of these LFSRs are neural weights after achiev

... Show More
View Publication Preview PDF
Publication Date
Sun Sep 01 2013
Journal Name
International Journal Of Computer Applications
Concise Architecture of a Remote Network based Controller
...Show More Authors

The development of microcontroller is used in monitoring and data acquisition recently. This development has born various architectures for spreading and interfacing the microcontroller in network environment. Some of existing architecture suffers from redundant in resources, extra processing, high cost and delay in response. This paper presents flexible concise architecture for building distributed microcontroller networked system. The system consists of only one server, works through the internet, and a set of microcontrollers distributed in different sites. Each microcontroller is connected through the Ethernet to the internet. In this system the client requesting data from certain side is accomplished through just one server that is in

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Sep 01 2021
Journal Name
International Scientific Congress Of Pure, Applied And Technological Sciences (minar Congress)
Evaluation Of Electromagnetic Pollution Of Cellular Mobile Network
...Show More Authors

Wireless communications are characterized by their fastest growth in history, as they used ever-evolving and renewed technologies, which have allowed them to spread widely. Every day, communication technology introduces a new invention with features that differ from its predecessor. Bell Laboratories first suggested mobile wireless communication services to the general population in the late 1940s. Still, it wasn't easy at that time to use on a large scale due to its high costs. This paper aims to describe the state of cellular mobile networks; by comparing the sources of electromagnetic pollution caused by these networks, measure the level of power density in some residential areas, and compare them with international standards adopted in

... Show More
Publication Date
Fri Aug 31 2012
Journal Name
Al-khwarizmi Engineering Journal
Design a Security Network System against Internet Worms
...Show More Authors

 Active worms have posed a major security threat to the Internet, and many research efforts have focused on them. This paper is interested in internet worm that spreads via TCP, which accounts for the majority of internet traffic. It presents an approach that use a hybrid solution between two detection algorithms: behavior base detection and signature base detection to have the features of each of them. The aim of this study is to have a good solution of detecting worm and stealthy worm with the feature of the speed. This proposal was designed in distributed collaborative scheme based on the small-world network model to effectively improve the system performance.

View Publication Preview PDF
Publication Date
Sat Dec 31 2022
Journal Name
International Journal On “technical And Physical Problems Of Engineering”
Age Estimation Utilizing Deep Learning Convolutional Neural Network
...Show More Authors

Estimating an individual's age from a photograph of their face is critical in many applications, including intelligence and defense, border security and human-machine interaction, as well as soft biometric recognition. There has been recent progress in this discipline that focuses on the idea of deep learning. These solutions need the creation and training of deep neural networks for the sole purpose of resolving this issue. In addition, pre-trained deep neural networks are utilized in the research process for the purpose of facial recognition and fine-tuning for accurate outcomes. The purpose of this study was to offer a method for estimating human ages from the frontal view of the face in a manner that is as accurate as possible and takes

... Show More
Scopus (12)
Scopus
Publication Date
Mon Aug 01 2022
Journal Name
Baghdad Science Journal
Optimized Artificial Neural network models to time series
...Show More Authors

        Artificial Neural networks (ANN) are powerful and effective tools in time-series applications. The first aim of this paper is to diagnose better and more efficient ANN models (Back Propagation, Radial Basis Function Neural networks (RBF), and Recurrent neural networks) in solving the linear and nonlinear time-series behavior. The second aim is dealing with finding accurate estimators as the convergence sometimes is stack in the local minima. It is one of the problems that can bias the test of the robustness of the ANN in time series forecasting. To determine the best or the optimal ANN models, forecast Skill (SS) employed to measure the efficiency of the performance of ANN models. The mean square error and

... Show More
View Publication Preview PDF
Scopus (26)
Crossref (14)
Scopus Clarivate Crossref
Publication Date
Mon Apr 30 2012
Journal Name
Journal Of Planner And Development
RAPID LAND TENURE ASSESSMENT OF BAGHDAD CITY IN IRAQ 2010
...Show More Authors

The purpose of this study is to describe the extent and nature of informal tenure practices in urban areas in Iraq, through undertaking a rapid assessment in Baghdad city. The UN-HABITAT 2008 publication Secure Land Rights for All discusses the importance of access and rights to land throughout the developing world. Secure land rights are critical to development and poverty reduction, and the greatest challenge in providing secure land rights are in urban areas, where overcrowding can lead to a number of informal tenure practices ranging from individually unregistered or unauthorised housing, to large informal settlements. Access to land is a fundamental basis for human shelter, food production, and other economic activity. Secur

... Show More
View Publication
Publication Date
Sat Dec 30 2023
Journal Name
Al-kindy College Medical Journal
Assessment of Serum Metalloendopeptidase level in Patients with Double Diabetes
...Show More Authors

Background: Double diabetes is the term used to describe situations in which a patient exhibits characteristics that are a combination of type 1 and type 2 Diabetes Mellitus. Metalloendopeptidase or Neprilysin is membrane-bound metallopeptidase. It has a wide range of physiological function and a variety of substrates. It has a significant impact on the proteolytic functions of the kidney, cardiovascular health, immunological response, cell proliferation, and fetal development. It also has a preventative effect on the onset of type 2 diabetes, obesity, and cancer.

Objective: The study aims to assess the level of MEP in patients wi

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (3)
Scopus Crossref
Publication Date
Sat Sep 15 2018
Journal Name
Journal Of Baghdad College Of Dentistry
Assessment of Dental Caries among Internally Displaced Children in Baghdad
...Show More Authors

Background: The internally displaced children are vulnerable groups have less access to dental services, worse oral health, and bear a disproportionate burden of oral diseases. Aim of the study: This study was conducted on group of internally displaced children living in Baghdad governorate camps to measure their dental caries prevalence and experience and find out the association between dental caries and the duration of displacement in camps. Subjects and methods: A sample of 1393 children were selected, 567 internally displaced children from camps in Baghdad governorate and 826 school children as control matching in age and gender. The age of children ranged from 5-12 years old. Oral examination was performed using WHO 2013 criteria, to

... Show More
View Publication Preview PDF
Crossref (1)
Crossref