Preferred Language
Articles
/
Nxazs4sBVTCNdQwCZdeM
Performance Evaluation of SDN DDoS Attack Detection and Mitigation Based Random Forest and K-Nearest Neighbors Machine Learning Algorithms
...Show More Authors

Software-defined networks (SDN) have a centralized control architecture that makes them a tempting target for cyber attackers. One of the major threats is distributed denial of service (DDoS) attacks. It aims to exhaust network resources to make its services unavailable to legitimate users. DDoS attack detection based on machine learning algorithms is considered one of the most used techniques in SDN security. In this paper, four machine learning techniques (Random Forest, K-nearest neighbors, Naive Bayes, and Logistic Regression) have been tested to detect DDoS attacks. Also, a mitigation technique has been used to eliminate the attack effect on SDN. RF and KNN were selected because of their high accuracy results. Three types of network topology have been generated to observe the effectiveness of proposed algorithms on different network architectures. The results reveal that RF performs better than KNN in a single topology, and both have close performance in other topologies.

Scopus Crossref
View Publication
Publication Date
Sat Oct 01 2022
Journal Name
Baghdad Science Journal
Human Face Recognition Based on Local Ternary Pattern and Singular Value Decomposition
...Show More Authors

There is various human biometrics used nowadays, one of the most important of these biometrics is the face. Many techniques have been suggested for face recognition, but they still face a variety of challenges for recognizing faces in images captured in the uncontrolled environment, and for real-life applications. Some of these challenges are pose variation, occlusion, facial expression, illumination, bad lighting, and image quality. New techniques are updating continuously. In this paper, the singular value decomposition is used to extract the features matrix for face recognition and classification. The input color image is converted into a grayscale image and then transformed into a local ternary pattern before splitting the image into

... Show More
View Publication Preview PDF
Scopus (6)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Mon Apr 15 2024
Journal Name
Journal Of Engineering Science And Technology
Text Steganography Based on Arabic Characters Linguistic Features and Word Shifting Method
...Show More Authors

In the field of data security, the critical challenge of preserving sensitive information during its transmission through public channels takes centre stage. Steganography, a method employed to conceal data within various carrier objects such as text, can be proposed to address these security challenges. Text, owing to its extensive usage and constrained bandwidth, stands out as an optimal medium for this purpose. Despite the richness of the Arabic language in its linguistic features, only a small number of studies have explored Arabic text steganography. Arabic text, characterized by its distinctive script and linguistic features, has gained notable attention as a promising domain for steganographic ventures. Arabic text steganography harn

... Show More
Publication Date
Sun Dec 31 2023
Journal Name
Iraqi Journal Of Information And Communication Technology
EEG Signal Classification Based on Orthogonal Polynomials, Sparse Filter and SVM Classifier
...Show More Authors

This work implements an Electroencephalogram (EEG) signal classifier. The implemented method uses Orthogonal Polynomials (OP) to convert the EEG signal samples to moments. A Sparse Filter (SF) reduces the number of converted moments to increase the classification accuracy. A Support Vector Machine (SVM) is used to classify the reduced moments between two classes. The proposed method’s performance is tested and compared with two methods by using two datasets. The datasets are divided into 80% for training and 20% for testing, with 5 -fold used for cross-validation. The results show that this method overcomes the accuracy of other methods. The proposed method’s best accuracy is 95.6% and 99.5%, respectively. Finally, from the results, it

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Wed Mar 29 2023
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Multi-Stage Hydraulic Fracturing Completion Design Based on Ball-and-Sleeve Method
...Show More Authors

This paper proposes a completion that can allow fracturing four zones in a single trip in the well called “Y” (for confidential reasons) of the field named “X” (for confidential reasons). The steps to design a well completion for multiple fracturing are first to select the best completion method then the required equipment and the materials that it is made of. After that, the completion schematic must be drawn by using Power Draw in this case, and the summary installation procedures explained. The data used to design the completion are the well trajectory, the reservoir data (including temperature, pressure and fluid properties), the production and injection strategy. The results suggest that multi-stage hydraulic fracturing can

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Sep 21 2021
Journal Name
Journal Of Healthcare Engineering
Complexity and Entropy Analysis to Improve Gender Identification from Emotional-Based EEGs
...Show More Authors

Investigating gender differences based on emotional changes becomes essential to understand various human behaviors in our daily life. Ten students from the University of Vienna have been recruited by recording the electroencephalogram (EEG) dataset while watching four short emotional video clips (anger, happiness, sadness, and neutral) of audiovisual stimuli. In this study, conventional filter and wavelet (WT) denoising techniques were applied as a preprocessing stage and Hurst exponent

... Show More
View Publication
Scopus (9)
Crossref (7)
Scopus Clarivate Crossref
Publication Date
Sat Jan 14 2023
Journal Name
Cogent Engineering
C. B interrupt duty reduction based controlling TRV and symmetrical breaking current
...Show More Authors

View Publication
Scopus (3)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Wed Mar 01 2023
Journal Name
Journal Of Engineering
A An Authentication and Access Control Model for Healthcare based Cloud Services
...Show More Authors

Electronic Health Record (EHR) systems are used as an efficient and effective method of exchanging patients’ health information with doctors and other key stakeholders in the health sector to obtain improved patient treatment decisions and diagnoses. As a result, questions regarding the security of sensitive user data are highlighted. To encourage people to move their sensitive health records to cloud networks, a secure authentication and access control mechanism that protects users’ data should be established. Furthermore, authentication and access control schemes are essential in the protection of health data, as numerous responsibilities exist to ensure security and privacy in a network. So, the main goal of our s

... Show More
View Publication Preview PDF
Crossref (7)
Crossref
Publication Date
Mon Feb 04 2019
Journal Name
Journal Of The College Of Education For Women
From Learning for Living to Lifelong Learning “Seek knowledge from the cradle to the grave” Prophet Mohammed’s saying: نجاة احمد الجبوري
...Show More Authors

ملخص البحث
تبحث الدراسھ عن تنفیذ افضل لمفھوم التعلم مدى الحیاة كھیكل موجھ للسیاسة التربویة في العراق بشكل عام وفي
التعلیم العالي بشكل خاص. تحدد الدراسة استراتجیات التعلم مدى الحیاة وتناقش اھمیتھ وسماتھ الرئیسیة لتسھیل
الوصول الى فرص تعلم متمیز و ملائم لحاجات الطلبة مدى الحیاة، كما تناقش دور الجامعة في تحقیق ھذا الھدف.

View Publication Preview PDF
Publication Date
Fri Mar 31 2017
Journal Name
Journal Of Engineering
Experimental Measurements of Viscosity and Thermal Conductivity of Single Layer Graphene Based DI-water Nanofluid
...Show More Authors

Experimental measurements of viscosity and thermal conductivity of single layer of graphene . based DI-water nanofluid are performed as a function of  concentrations (0.1-1wt%) and temperatures between (5 to 35ºC). The result reveals that the thermal conductivity of GNPs nanofluids was increased with increasing the nanoparticle weight fraction concentration and temperature, while the maximum enhancement was about 22% for concentration of 1 wt.% at
35ºC. These experimental results were compared with some theoretical models and a good agreement between Nan’s model and the experimental results was observed. The viscosity of the graphene nanofluid displays Newtonian and Non-Newtonian behaviors with respect to nanoparticles concen

... Show More
View Publication Preview PDF
Publication Date
Mon Jan 01 2024
Journal Name
International Journal Of Research In Science And Technology
Encryption of Medical Image Based on Cascaded Design of AES Block Algorithm and Chaotic Map
...Show More Authors

Security concerns in the transfer of medical images have drawn a lot of attention to the topic of medical picture encryption as of late. Furthermore, recent events have brought attention to the fact that medical photographs are constantly being produced and circulated online, necessitating safeguards against their inappropriate use. To improve the design of the AES algorithm standard for medical picture encryption, this research presents several new criteria. It was created so that needs for higher levels of safety and higher levels of performance could be met. First, the pixels in the image are diffused to randomly mix them up and disperse them all over the screen. Rather than using rounds, the suggested technique utilizes a cascad

... Show More
View Publication
Crossref