Preferred Language
Articles
/
Nxazs4sBVTCNdQwCZdeM
Performance Evaluation of SDN DDoS Attack Detection and Mitigation Based Random Forest and K-Nearest Neighbors Machine Learning Algorithms
...Show More Authors

Software-defined networks (SDN) have a centralized control architecture that makes them a tempting target for cyber attackers. One of the major threats is distributed denial of service (DDoS) attacks. It aims to exhaust network resources to make its services unavailable to legitimate users. DDoS attack detection based on machine learning algorithms is considered one of the most used techniques in SDN security. In this paper, four machine learning techniques (Random Forest, K-nearest neighbors, Naive Bayes, and Logistic Regression) have been tested to detect DDoS attacks. Also, a mitigation technique has been used to eliminate the attack effect on SDN. RF and KNN were selected because of their high accuracy results. Three types of network topology have been generated to observe the effectiveness of proposed algorithms on different network architectures. The results reveal that RF performs better than KNN in a single topology, and both have close performance in other topologies.

Scopus Crossref
View Publication
Publication Date
Tue Dec 07 2021
Journal Name
2021 14th International Conference On Developments In Esystems Engineering (dese)
Object Detection and Distance Measurement Using AI
...Show More Authors

View Publication
Scopus (30)
Crossref (24)
Scopus Clarivate Crossref
Publication Date
Wed Apr 05 2023
Journal Name
International Journal Of Interactive Mobile Technologies (ijim)
A Partial Face Encryption in Real World Experiences Based on Features Extraction from Edge Detection
...Show More Authors

User confidentiality protection is concerning a topic in control and monitoring spaces. In image, user's faces security in concerning with compound information, abused situations, participation on global transmission media and real-world experiences are extremely significant. For minifying the counting needs for vast size of image info and for minifying the size of time needful for the image to be address computationally. consequently, partial encryption user-face is picked. This study focuses on a large technique that is designed to encrypt the user's face slightly. Primarily, dlib is utilizing for user-face detection. Susan is one of the top edge detectors with valuable localization characteristics marked edges, is used to extract

... Show More
View Publication
Scopus (5)
Crossref (3)
Scopus Crossref
Publication Date
Fri Dec 01 2023
Journal Name
Iraqi Journal Of Physics
Surface Plasmon Resonance (SPR)-Based Multimode Optical Fiber Sensors for Electrical Transformer Oil Aging Detection
...Show More Authors

I

In this study, optical fibers were designed and implemented as a chemical sensor based on surface plasmon resonance (SPR) to estimate the age of the oil used in electrical transformers. The study depends on the refractive indices of the oil. The sensor was created by embedding the center portion of the optical fiber in a resin block, followed by polishing, and tapering to create the optical fiber sensor. The tapering time was 50 min. The multi-mode optical fiber was coated with 60 nm thickness gold metal. The deposition length was 4 cm. The sensor's resonance wavelength was 415 nm. The primary sensor parameters were calculated, including sensitivity (6.25), signal-to-noise ratio (2.38), figure of merit (4.88), and accuracy (3.2)

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Feb 25 2017
Journal Name
International Journal On Advanced Science, Engineering And Information Technology
A Novel DNA Sequence Approach for Network Intrusion Detection System Based on Cryptography Encoding Method
...Show More Authors

A novel method for Network Intrusion Detection System (NIDS) has been proposed, based on the concept of how DNA sequence detects disease as both domains have similar conceptual method of detection. Three important steps have been proposed to apply DNA sequence for NIDS: convert the network traffic data into a form of DNA sequence using Cryptography encoding method; discover patterns of Short Tandem Repeats (STR) sequence for each network traffic attack using Teiresias algorithm; and conduct classification process depends upon STR sequence based on Horspool algorithm. 10% KDD Cup 1999 data set is used for training phase. Correct KDD Cup 1999 data set is used for testing phase to evaluate the proposed method. The current experiment results sh

... Show More
View Publication
Scopus (9)
Crossref (5)
Scopus Crossref
Publication Date
Fri Nov 01 2019
Journal Name
Practice Periodical On Structural Design And Construction
Reducing Damages to Underground Infrastructure: Performance Evaluation of One-Call Notification Program
...Show More Authors

View Publication
Scopus (12)
Crossref (9)
Scopus Clarivate Crossref
Publication Date
Wed Mar 16 2022
Journal Name
2022 Muthanna International Conference On Engineering Science And Technology (micest)
Virtual Performance Evaluation of Net-Zero Energy Building (NZEB) Using BIM Analysis
...Show More Authors

View Publication
Scopus (4)
Crossref (8)
Scopus Crossref
Publication Date
Tue Mar 01 2022
Journal Name
Journal Of Engineering
Performance Evaluation the Turbidity Removal Efficiency of AL-Muthana Water Treatment Plant
...Show More Authors

Turbidity is a visual property of water that expresses the amount of suspended substances in the water. Its presence in quantities more significant than the permissible limit makes the water undrinkable and reduces the effectiveness of disinfectants in treating pathogens. On this basis, turbidity is used as a basic indicator for measuring water quality. This study aims to evaluate the removal efficiency of AL- Muthanna WTP. Water turbidity was used as a basic parameter in the evaluation, using performance improvement evaluation and data from previous years (2016 to 2020). The average raw water turbidity was 26.7 NTU, with a minimum of 14 NTU, with a maximum of 48 NTU. Water turbidity value for 95% of settling daily reading data was

... Show More
Crossref (5)
Crossref
Publication Date
Tue Mar 01 2022
Journal Name
Journal Of Engineering
Performance Evaluation the Turbidity Removal Efficiency of AL-Muthana Water Treatment Plant
...Show More Authors

Turbidity is a visual property of water that expresses the amount of suspended substances in the water. Its presence in quantities more significant than the permissible limit makes the water undrinkable and reduces the effectiveness of disinfectants in treating pathogens. On this basis, turbidity is used as a basic indicator for measuring water quality. This study aims to evaluate the removal efficiency of AL- Muthanna WTP. Water turbidity was used as a basic parameter in the evaluation, using performance improvement evaluation and data from previous years (2016 to 2020). The average raw water turbidity was 26.7 NTU, with a minimum of 14 NTU, with a maximum of 48 NTU. Water turbidity value for 95% of settling daily readi

... Show More
View Publication Preview PDF
Crossref (5)
Crossref
Publication Date
Thu May 14 2015
Journal Name
International Journal Of Computer Applications
Performance Evaluation of Zigbee Routing Protocol under Various Conditions using OPNET Modeler
...Show More Authors

Zigbee, which has the standard IEEE 802.15.4. It is advisable method to build wireless personal area network (WPAN) which demands a low power consumption that can be produced by Zigbee technique. Our paper gives measuring efficiency of Zigbee involving the Physical Layer (PL) and Media Access Control (MAC) sub-layer , which allow a simple interaction between the sensors. We model and simulate two different scenarios, in the first one, we tested the topological characteristics and performance of the IEEE802.15.4 standard in terms of throughput, node to node delay and figure of routers for three network layouts (Star, Mesh and Cluster Tree) using OPNET simulator. The second scenario investigates the self-healing feature on a mesh

... Show More
View Publication Preview PDF
Publication Date
Mon Jan 01 2024
Journal Name
Aip Conference Proceedings
Performance evaluation of sewage treatment plant for Abu Ghraib Dairy Factory, Iraq
...Show More Authors

The objective of this study is to verify the overall performance and evaluate the wastewater quality of the wastewater treatment plant at the Abu Ghraib Dairy Factory and compare the results with the Iraqi Quality Standards (IQS) for effluent disposal and with the national determinants of treated water use. Agricultural irrigation wastewater, which included daily assessment records of the main parameters affecting wastewater [five-day biochemical oxygen demand (BOD5), chemical oxygen demand (COD), total dissolved solids (T.D.S), total suspended solids (TSS), phosphate (PO4), nitrate (NO3), hydrogen ion concentration (pH)] obtained from the quality control department of Abu Ghraib dairy plant registered from January 2017 to December 2020. Th

... Show More
View Publication
Crossref (1)
Scopus Crossref