Preferred Language
Articles
/
BBiDvJgBVTCNdQwC8MFa
Safety assessment model for DoS attacks detection in wireless communication and network OS environments
...Show More Authors

Wireless networks and communications have witnessed tremendous development and growth in recent periods and up until now, as there is a group of diverse networks such as the well-known wireless communication networks and others that are not linked to an infrastructure such as telephone networks, sensors and wireless networks, especially in important applications that work to send and receive important data and information in relatively unsafe environments, cybersecurity technologies pose an important challenge in protecting unsafe networks in terms of their impact on reducing crime. Detecting hacking in electronic networks and penetration testing. Therefore, these environments must be monitored and protected from hacking and malicious attacks. In this manuscript, a correspondence model is designed to discuss the algorithm in the environment of wireless communication systems and distributed computing by adopting the protocol data enhancement to the network using structured construction and diversity algorithm to improve the effectiveness of the intrusion detection system. Next, a multi-label convolutional neural network model is used to detect business transactions. An CNN was trained on the WSN-DS dataset using 5-Fold in CV technique with three hidden layers. The highest Precision values 0.951 of Grayhole attack for multi-classification.

Scopus Clarivate Crossref
View Publication
Publication Date
Sat Aug 01 2020
Journal Name
Practice Periodical On Structural Design And Construction
Case Study to Evaluate Work-Zone Safety Technologies in Highway Construction
...Show More Authors

View Publication
Scopus (17)
Crossref (17)
Scopus Clarivate Crossref
Publication Date
Mon Mar 07 2022
Journal Name
Construction Research Congress 2022
Impact of Green Construction on Safety Performance in the Built Environment
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Thu Nov 01 2018
Journal Name
Al-kindy College Medical Journal
The Efficacy and Safety Of Using Hydrochlorothiazide As Adjuvant Therapy In Pediatric Urinary Tract Infections
...Show More Authors

Background: Acute urinary tract infection is a common bacterial infection causing illness in infants and children. At age of seven, 8% of girls and 2% of boys will have at least one episode. Although drinking water and using home remedies are known to help to flush away bacteria and keeps them from sticking to the bladder wall, researches to test the efficacy and safety of hydrochlorothiazide's diuretic effect as adjuvant to the antibiotics in pediatric age groups are lacking, and so this research was to address this subject.

Objectives: To assess the effectiveness   and  the safety of hydrochlorothiazide as adjuvant therapy to the antibiotics in treating acute urinary tract infect

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Nov 01 2013
Journal Name
The Iraqi Postgraduate Medical Journal
Efficacy and safety of topical podophyllin 5% ointment in patients with mild plaque-type psoriasis
...Show More Authors

KE Sharquie, AA Noaimi, WK Al-Janabi, The Iraqi Postgraduate Medical Journal, 2013 - Cited by 3

View Publication
Publication Date
Sun Sep 01 2019
Journal Name
Journal Of Physics: Conference Series
Statistical Evalution of Safety Procedures and Chemical Security in Chemical Laboratories / College Ibn Al Haitham
...Show More Authors
Abstract<p>In order to minimize the significant incidents in chemical laboratories, specially the academic laboratories, one must be able to identify and evaluate hazards. Familiar with safety rules and responsibilities. Assessing implementation of safety rules and securities. The aim of this paper is to for the evaluate and assess the of chemical safety procedures and chemical policies in academic laboratories using statistical questionnaire. A form is written, suggested two main parts, safety and security. Safety part includes three classes, hardware requirements, training and application of safety procedures. the second part is security. The form design is based on four points Likert scale. T</p> ... Show More
View Publication
Crossref (1)
Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Ieee Transactions On Emerging Topics In Computational Intelligence
Reservoir Network With Structural Plasticity for Human Activity Recognition
...Show More Authors

View Publication
Scopus (1)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Mon Apr 01 2013
Journal Name
International Journal Of Electrical, Electronics And Telecommunication Engineering
Performance Analysis of xPON Network for Different Queuing Models
...Show More Authors

Passive optical network (PON) is a point to multipoint, bidirectional, high rate optical network for data communication. Different standards of PONs are being implemented, first of all PON was ATM PON (APON) which evolved in Broadband PON (BPON). The two major types are Ethernet PON (EPON) and Gigabit passive optical network (GPON). PON with these different standards is called xPON. To have an efficient performance for the last two standards of PON, some important issues will considered. In our work we will integrate a network with different queuing models such M/M/1 and M/M/m model. After analyzing IPACT as a DBA scheme for this integrated network, we modulate cycle time, traffic load, throughput, utilization and overall delay

... Show More
View Publication Preview PDF
Publication Date
Mon Oct 01 2018
Journal Name
2018 Ieee/acs 15th International Conference On Computer Systems And Applications (aiccsa)
Utilizing Hopfield Neural Network for Pseudo-Random Number Generator
...Show More Authors

View Publication
Scopus (11)
Crossref (9)
Scopus Crossref
Publication Date
Mon Dec 20 2021
Journal Name
Baghdad Science Journal
Generative Adversarial Network for Imitation Learning from Single Demonstration
...Show More Authors

Imitation learning is an effective method for training an autonomous agent to accomplish a task by imitating expert behaviors in their demonstrations. However, traditional imitation learning methods require a large number of expert demonstrations in order to learn a complex behavior. Such a disadvantage has limited the potential of imitation learning in complex tasks where the expert demonstrations are not sufficient. In order to address the problem, we propose a Generative Adversarial Network-based model which is designed to learn optimal policies using only a single demonstration. The proposed model is evaluated on two simulated tasks in comparison with other methods. The results show that our proposed model is capable of completing co

... Show More
View Publication Preview PDF
Scopus Clarivate Crossref
Publication Date
Mon Feb 01 2021
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Differential evolution detection models for SMS spam
...Show More Authors

With the growth of mobile phones, short message service (SMS) became an essential text communication service. However, the low cost and ease use of SMS led to an increase in SMS Spam. In this paper, the characteristics of SMS spam has studied and a set of features has introduced to get rid of SMS spam. In addition, the problem of SMS spam detection was addressed as a clustering analysis that requires a metaheuristic algorithm to find the clustering structures. Three differential evolution variants viz DE/rand/1, jDE/rand/1, jDE/best/1, are adopted for solving the SMS spam problem. Experimental results illustrate that the jDE/best/1 produces best results over other variants in terms of accuracy, false-positive rate and false-negative

... Show More
View Publication
Scopus (8)
Crossref (2)
Scopus Crossref