Preferred Language
Articles
/
Nxazs4sBVTCNdQwCZdeM
Performance Evaluation of SDN DDoS Attack Detection and Mitigation Based Random Forest and K-Nearest Neighbors Machine Learning Algorithms
...Show More Authors

Software-defined networks (SDN) have a centralized control architecture that makes them a tempting target for cyber attackers. One of the major threats is distributed denial of service (DDoS) attacks. It aims to exhaust network resources to make its services unavailable to legitimate users. DDoS attack detection based on machine learning algorithms is considered one of the most used techniques in SDN security. In this paper, four machine learning techniques (Random Forest, K-nearest neighbors, Naive Bayes, and Logistic Regression) have been tested to detect DDoS attacks. Also, a mitigation technique has been used to eliminate the attack effect on SDN. RF and KNN were selected because of their high accuracy results. Three types of network topology have been generated to observe the effectiveness of proposed algorithms on different network architectures. The results reveal that RF performs better than KNN in a single topology, and both have close performance in other topologies.

Scopus Crossref
View Publication
Publication Date
Sun Jan 01 2023
Journal Name
E3s Web Of Conferences
Mitigation of Reflection Cracking in Asphalt Concrete Overlay on Rigid Pavements
...Show More Authors

Reflective cracking is one of the primary forms of deterioration in pavements. It is widespread when Asphalt concrete (AC) overlays are built over a rigid pavement with discontinuities on its surface. Thus, this research work aims to reduce reflection cracks in asphalt concrete overlay on the rigid pavement. Asphalt Concrete (AC) slab specimens were prepared in three thicknesses (4, 5, and 6 cm). All these specimens were by testing machine designed and manufactured at the Engineering Consulting Office of the University of Baghdad to examine for the number of cycles and loads needed to propagate the reflection cracking in the asphalt concert mixture at three temperatures (20, 30, and 30°C). It was noticed that the higher thickness A

... Show More
View Publication
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Sun Dec 26 2021
Journal Name
Sultan Qaboos University Journal For Science [squjs]
The Deubiquitylase USP5 Knockdown Reduces Semliki Forest Virus Replication in HeLa Cells
...Show More Authors

Semliki Forest Virus (SFV), a member of the Alphavirus genus in the Togaviridae family, is a small-enveloped, positive-sense single-stranded RNA (+ssRNA) virus. The virus is spread by mosquitos and can infect humans, resulting in mild febrile disease with symptoms that include fever, myalgia, arthralgia, persistent headaches and asthenia.  Virulent strains of SFV in mice cause lethal encephalitis by infecting neurons in the central nervous system. In on-going experiments in the research group using a focused siRNA screen we have investigated the role of deubiquitylases (DUBs) during SFV infection (as a model alphavirus) and monitored the effect of DUB depletion on cell viability after infection. We identified a group of DUBs that h

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Dec 01 2023
Journal Name
Advances In Science And Technology Research Journal
Experimental Investigation and Fuzzy Based Prediction of Titanium Alloy Performance During Drilling Process
...Show More Authors

View Publication
Scopus (9)
Crossref (9)
Scopus Clarivate Crossref
Publication Date
Mon Aug 01 2011
Journal Name
Journal Of Engineering
DAMAGE DETECTION AND LOCATION FOR IN AND OUT-OFPLANE CURVED BEAMS USING FUZZY LOGIC BASED ON FREQUENCY DIFFERENCE
...Show More Authors

In this study, structures damage identification method based on changes in the dynamic characteristics
(frequencies) of the structure are examined, stiffness as well as mass matrices of the curved
(in and out-of-plane vibration) beam elements is formulated using Hamilton's principle. Each node
of both of them possesses seven degrees of freedom including the warping degree of freedom. The
curved beam element had been derived based on the Kang and Yoo’s thin-walled curved beam theory
in 1994. A computer program was developing to carry out free vibration analyses of the curved
beam as well as straight beam. Comparing with the frequencies for other researchers using the general
purpose program MATLAB. Fuzzy logic syste

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Fri Jan 13 2023
Journal Name
Atmosphere
Impact of North African Sand and Dust Storms on the Middle East Using Iraq as an Example: Causes, Sources, and Mitigation
...Show More Authors

This study aims to determine the reasons for the increase in the frequency of sand and dust storms in the Middle East and to identify their sources and mitigate them. A set of climatic data from 60 years (1960–2022) was analyzed. Sand storms in Iraq are a silty sand mature arkose composed of 72.7% sand, 25.1% silt, and 2.19% clay; the clay fraction in dust storms constitutes 70%, with a small amount of silt (20.6%) and sand (9.4%). Dust and sand storms (%) are composed of quartz (49.2, 67.1), feldspar (4.9, 20.9), calcite (38, 5), gypsum (4.8, 0.4), dolomite (0.8, 1.0), and heavy minerals (3.2, 6.6). Increasing temperatures in Iraq, by an average of 2 °C for sixty years, have contributed to an increase in the number of dust storm

... Show More
View Publication Preview PDF
Crossref (50)
Crossref
Publication Date
Wed Apr 05 2023
Journal Name
Journal Of Engineering
Performance Evaluation of Small Scale Air-Conditioning System Using R22 and Alternative Refrigerants
...Show More Authors

A mathematical model has been formulated to predict the influence of high outdoor air temperature on the performance of small scale air - conditioning system using R22 and alternative refrigerants R290, R407C, R410A. All refrigerants were investigated in the cooling mode operation. The mathematical model results have been validated with experimental data extracted from split type air conditioner of 2 TR capacity. This entailed the construction of an experimental test rig which consists of four main parts. They are, the refrigeration system, psychrometric test facility, measuring instrumentation, and auxiliary systems. The conditioned air was maintained at 25 0C dry bulb and 19 0C wet bulb for all tests. The outdoor ambient air temperatur

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Tue Feb 26 2019
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Rationalization of Decision –Making and Performance evaluation methods through Employing Strategic Management Accounting
...Show More Authors

This research dealt with the process of reducing costs through some strategic methods of management accounting targeted cost analysis unassembled and Alkeisen, where he focused this research through his theory on a review of some administrative accounting strategic technologies, while the second practical side through the application of targeted cost analysis unassembled and Alkeisen, acquired Search importance of focusing on the decisions to cut costs, through the use of some administrative accounting strategic methods and this we can unassembled analysis, continuous improvement, and the cost of quality) when applied quality, "in light of this has been reached to a set of conclusions that the most important of the  company's relian

... Show More
View Publication
Crossref
Publication Date
Tue May 01 2018
Journal Name
Journal Of Physics: Conference Series
Performance of Case-Based Reasoning Retrieval Using Classification Based on Associations versus Jcolibri and FreeCBR: A Further Validation Study
...Show More Authors

View Publication Preview PDF
Scopus (5)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Sat Apr 01 2023
Journal Name
International Journal Of Electrical And Computer Engineering
Intrusion detection method for internet of things based on the spiking neural network and decision tree method
...Show More Authors

The prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices

... Show More
Preview PDF
Publication Date
Sat Apr 01 2023
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Intrusion detection method for internet of things based on the spiking neural network and decision tree method
...Show More Authors

The prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices

... Show More
Scopus (22)
Crossref (10)
Scopus Crossref