Preferred Language
Articles
/
OhdOPo8BVTCNdQwCHmXk
Construct an efficient distributed denial of service attack detection system based on data mining techniques
...Show More Authors

<span>Distributed denial-of-service (DDoS) attack is bluster to network security that purpose at exhausted the networks with malicious traffic. Although several techniques have been designed for DDoS attack detection, intrusion detection system (IDS) It has a great role in protecting the network system and has the ability to collect and analyze data from various network sources to discover any unauthorized access. The goal of IDS is to detect malicious traffic and defend the system against any fraudulent activity or illegal traffic. Therefore, IDS monitors outgoing and incoming network traffic. This paper contains a based intrusion detection system for DDoS attack, and has the ability to detect the attack intelligently, dynamically and periodically by evaluating the set of attackers of the current node with its neighbors. We use dataset named CICDDoS2019 that contains on binary classes benign and DDoS. Performance has evaluated by applying data mining algorithms as well as applying the best features to discover potential attack classes.</span>

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Dec 15 2023
Journal Name
Al-academy
Pioneering and Growth of Plastic vision data in Modern Art
...Show More Authors

The achievements of the art that we know today are questioned in motives that differ from what art knew before, including dramatic artistic transformations, which he called modern art.
In view of the enormity of such a topic, its ramifications and its complexity, it was necessary to confine its subject to the origin of the motives of the transformations of its first pioneers, and then to stand on what resulted from that of the data of vision in composition and drawing exclusively, and through exploration in that, we got to know the vitality of change from the art of its time.
And by examining the ruling contemporary philosophical concepts and their new standards and their epistemological role in contemporary life, since they includ

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Jan 01 2018
Journal Name
Lecture Notes Of The Institute For Computer Sciences, Social Informatics And Telecommunications Engineering
Sensor Data Classification for the Indication of Lameness in Sheep
...Show More Authors

View Publication Preview PDF
Scopus (6)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Sun Feb 10 2019
Journal Name
Journal Of The College Of Education For Women
Designand Implementation of New DES64X and DES128X on 32, 64 Bit Operating System Environments
...Show More Authors

In this paper, a description of a design for new DES block cipher, namely DES64X and DES128X. The goals of this design, a part of its security level, are large implementation flexibility on various operating systems as well as high performances. The high level structure is based on the principle of DES and Feistel schema, and proposes the design of an efficient key-schedule algorithm which will output pseudorandomsequences of subkeys. The main goal is to reach the highest possible flexibility, in terms of round numbers, key size, and block size. A comparison of the proposed systems on 32-bit, 64-bit operating system, using 32-bit and 64-bit Java Virtual Machine (JVM), showed that the latter has much better performance than the former.

... Show More
View Publication Preview PDF
Publication Date
Sun Jun 05 2022
Journal Name
Network
A Computationally Efficient Gradient Algorithm for Downlink Training Sequence Optimization in FDD Massive MIMO Systems
...Show More Authors

Future wireless networks will require advance physical-layer techniques to meet the requirements of Internet of Everything (IoE) applications and massive communication systems. To this end, a massive MIMO (m-MIMO) system is to date considered one of the key technologies for future wireless networks. This is due to the capability of m-MIMO to bring a significant improvement in the spectral efficiency and energy efficiency. However, designing an efficient downlink (DL) training sequence for fast channel state information (CSI) estimation, i.e., with limited coherence time, in a frequency division duplex (FDD) m-MIMO system when users exhibit different correlation patterns, i.e., span distinct channel covariance matrices, is to date ve

... Show More
View Publication
Scopus (3)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Sun Aug 07 2022
Journal Name
Nanomaterials
Efficient Heat Transfer Augmentation in Channels with Semicircle Ribs and Hybrid Al2O3-Cu/Water Nanofluids
...Show More Authors

Global technological advancements drive daily energy consumption, generating additional carbon-induced climate challenges. Modifying process parameters, optimizing design, and employing high-performance working fluids are among the techniques offered by researchers for improving the thermal efficiency of heating and cooling systems. This study investigates the heat transfer enhancement of hybrid “Al2O3-Cu/water” nanofluids flowing in a two-dimensional channel with semicircle ribs. The novelty of this research is in employing semicircle ribs combined with hybrid nanofluids in turbulent flow regimes. A computer modeling approach using a finite volume approach with k-ω shear stress transport turbulence model was used in these simu

... Show More
View Publication
Scopus (14)
Crossref (18)
Scopus Clarivate Crossref
Publication Date
Sun Sep 06 2009
Journal Name
Baghdad Science Journal
A note on an –module with -pure intersection property
...Show More Authors

Let be a ring. Given two positive integers and , an module is said to be -presented, if there is an exact sequence of -modules with is -generated. A submodule of a right -module is said to be -pure in , if for every -Presented left -module the canonical map is a monomorphism. An -module has the -pure intersection property if the intersection of any two -pure submodules is again -pure. In this paper we give some characterizations, theorems and properties of modules with the -pure intersection property.

View Publication Preview PDF
Crossref
Publication Date
Sun Sep 06 2009
Journal Name
Baghdad Science Journal
A note on an –module with -pure intersection property
...Show More Authors

Let be a ring. Given two positive integers and , an module is said to be -presented, if there is an exact sequence of -modules with is -generated. A submodule of a right -module is said to be -pure in , if for every -Presented left -module the canonical map is a monomorphism. An -module has the -pure intersection property if the intersection of any two -pure submodules is again -pure. In this paper we give some characterizations, theorems and properties of modules with the -pure intersection property.

View Publication
Crossref
Publication Date
Sat Feb 01 2020
Journal Name
Iop Conference Series: Materials Science And Engineering
The rationing system effect on seepage from the cement-treated gypsum canals
...Show More Authors
Abstract<p>The shortage of irrigation water requires specific measures. One of these measures is the application of the rationing system (a period of irrigation followed by a period of drought). This system could have an effect on the behavior and properties of irrigation canals. So, studying rationing system on the irrigation canals is important both in civil engineering and water resources engineering, especially if these channels constructed with gypsum soil. This study includes the calculation of seepage velocity and water content in each cycle (10 days wetting and 10 days of drying). The model is built for this research contains four samples, two samples for untreated soil one of them expos</p> ... Show More
View Publication
Scopus (1)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Fri Feb 05 2021
Journal Name
Research In Intelligent And Computing In Engineering
Implementing Web Testing System Depending on Performance Testing Using Load Testing Method.
...Show More Authors

Web testing is very important method for users and developers because it gives the ability to detect errors in applications and check their quality to perform services to users performance abilities, user interface, security and other different types of web testing that may occur in web application. This paper focuses on a major branch of the performance testing, which is called the load testing. Load testing depends on an important elements called request time and response time. From these elements, it can be decided if the performance time of a web application is good or not. In the experimental results, the load testing applied on the website (http://ihcoedu.uobaghdad.edu.iq) the main home page and all the science departments pages. In t

... Show More
Publication Date
Wed Jul 06 2022
Journal Name
Journal Of Asian Multicultural Research For Social Sciences Study
Remote Data Auditing in a Cloud Computing Environment
...Show More Authors

In the current paradigms of information technology, cloud computing is the most essential kind of computer service. It satisfies the need for high-volume customers, flexible computing capabilities for a range of applications like as database archiving and business analytics, and the requirement for extra computer resources to provide a financial value for cloud providers. The purpose of this investigation is to assess the viability of doing data audits remotely inside a cloud computing setting. There includes discussion of the theory behind cloud computing and distributed storage systems, as well as the method of remote data auditing. In this research, it is mentioned to safeguard the data that is outsourced and stored in cloud serv

... Show More
View Publication
Crossref