Preferred Language
Articles
/
OhdOPo8BVTCNdQwCHmXk
Construct an efficient distributed denial of service attack detection system based on data mining techniques
...Show More Authors

<span>Distributed denial-of-service (DDoS) attack is bluster to network security that purpose at exhausted the networks with malicious traffic. Although several techniques have been designed for DDoS attack detection, intrusion detection system (IDS) It has a great role in protecting the network system and has the ability to collect and analyze data from various network sources to discover any unauthorized access. The goal of IDS is to detect malicious traffic and defend the system against any fraudulent activity or illegal traffic. Therefore, IDS monitors outgoing and incoming network traffic. This paper contains a based intrusion detection system for DDoS attack, and has the ability to detect the attack intelligently, dynamically and periodically by evaluating the set of attackers of the current node with its neighbors. We use dataset named CICDDoS2019 that contains on binary classes benign and DDoS. Performance has evaluated by applying data mining algorithms as well as applying the best features to discover potential attack classes.</span>

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Sep 30 2020
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Adoption of the IFRS11 Financial Reporting Standard for Oil Service Contracts Costs and its Reflection on Measurement and Disclosure for National Oil Companies: بحث تطبيق في شركة نفط ميسان (ش . ع)
...Show More Authors

The research seeks to clarify the problems related to the aspects of the financial and accounting process resulting from entering into contractual arrangements with a period of more than 20 years, among which is the research problem represented by the lack of clarity of the foundations and procedures for the recognition of oil costs and additional costs borne by foreign invested companies, which led to a weakening of their credibility and reflection. Negatively "on the measurement and accounting disclosure of financial reports prepared by oil companies, and the research aims to lay down sound procedures for measuring and classifying oil costs and additional costs paid to foreign companies, and recognizing and recording them in th

... Show More
View Publication Preview PDF
Publication Date
Mon Aug 26 2019
Journal Name
Iraqi Journal Of Science
Improving Accuracy in Human Age Classification Using Ensemble Learning Techniques
...Show More Authors

     Age is a predominant parameter for arbitrating an individual, for security and access concerns of the data that exist in cyber space. Nowadays we find a rapid growth in unethical practices from youngsters as well as skilled cyber users. Facial image renders a variety of information that can be used, when processed to ascertain the age of individuals. In this paper, local facial features are considered to predict the age group, where local Binary Pattern (LBP) is extracted from four regions of facial images. The prominent areas where wrinkles are developed naturally in human as age increases are taken for feature extraction. Further these feature vectors are subjected to  ensemble techniques that increases th

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Sun Jul 29 2018
Journal Name
Iraqi Journal Of Science
Cuneiform Tablets Image Preprocessing Proposed Algorithms Techniques for Pattern Recognition
...Show More Authors

Cuneiform symbols recognition represents a complicated task in pattern recognition  and image analysis as a result of problems that related to cuneiform symbols like distortion and unwanted objects that associated with applying Binrizetion process like spots and writing lines. This paper aims to present new proposed algorithms to solve these problems for reaching uniform results about cuneiform symbols recognition that related to (select appropriate Binerized method, erased writing lines and spots) based on statistical Skewness measure, image morphology and distance transform concepts. The experiment results show that our proposed algorithms have excellent result and can be adopted

... Show More
View Publication Preview PDF
Publication Date
Sun Jan 01 2023
Journal Name
Lecture Notes In Networks And Systems
Using Artificial Intelligence and Metaverse Techniques to Reduce Earning Management
...Show More Authors

This study aims to demonstrate the role of artificial intelligence and metaverse techniques, mainly logistical Regression, in reducing earnings management in Iraqi private banks. Synthetic intelligence approaches have shown the capability to detect irregularities in financial statements and mitigate the practice of earnings management. In contrast, many privately owned banks in Iraq historically relied on manual processes involving pen and paper for recording and posting financial information in their accounting records. However, the banking sector in Iraq has undergone technological advancements, leading to the Automation of most banking operations. Conventional audit techniques have become outdated due to factors such as the accuracy of d

... Show More
View Publication
Crossref (1)
Scopus Crossref
Publication Date
Wed Aug 01 2018
Mixed Linearity Improvement Techniques for Ultra-wideband Low Noise Amplifier
...Show More Authors

<span>We present the linearization of an ultra-wideband low noise amplifier (UWB-LNA) operating from 2GHz to 11GHz through combining two linearization methods. The used linearization techniques are the combination of post-distortion cancellation and derivative-superposition linearization methods. The linearized UWB-LNA shows an improved linearity (IIP3) of +12dBm, a minimum noise figure (NF<sub>min.</sub>) of 3.6dB, input and output insertion losses (S<sub>11</sub> and S<sub>22</sub>)  below -9dB over the entire working bandwidth, midband gain of 6dB at 5.8GHz, and overall circuit power consumption of 24mW supplied from a 1.5V voltage source. Both UWB-LNA and linearized UWB-LNA designs are

... Show More
Scopus (1)
Scopus Crossref
Publication Date
Sat Jan 01 2022
Journal Name
Latin American Journal Of Solids And Structures
Peak Ground Acceleration Models Predictions Utilizing Two Metaheuristic Optimization Techniques
...Show More Authors

View Publication
Crossref (9)
Crossref
Publication Date
Mon Aug 01 2016
Journal Name
Indonesian Journal Of Electrical Engineering And Computer Science
Wireless Indoor Localization Systems and Techniques: Survey and Comparative Study
...Show More Authors

<p>The popularity, great influence and huge importance made wireless indoor localization has a unique touch, as well its wide successful on positioning and tracking systems for both human and assists also contributing to take the lead from outdoor systems in the scope of the recent research works. In this work, we will attempt to provide a survey of the existing indoor positioning solutions and attempt to classify different its techniques and systems. Five typical location predication approaches (triangulation, fingerprinting, proximity, vision analysis and trilateration) are considered here in order to analysis and provide the reader a review of the recent advances in wireless indoor localization techniques and systems to hav

... Show More
View Publication
Scopus (47)
Crossref (33)
Scopus Crossref
Publication Date
Sat Jan 01 2022
Journal Name
Latin American Journal Of Solids And Structures
Peak Ground Acceleration Models Predictions Utilizing Two Metaheuristic Optimization Techniques
...Show More Authors

Scopus (11)
Crossref (9)
Scopus Clarivate Crossref
Publication Date
Sun Apr 29 2018
Journal Name
Iraqi Journal Of Science
Intelligent Age Estimation From Facial Images Using Machine Learning Techniques
...Show More Authors

     Lately, a growing interest has been emerging in age estimation from face images because of the wide range of potential implementations in law enforcement, security control, and human computer interactions. Nevertheless, in spite of the advances in age estimation, it is still a challenging issue. This is due to the fact that face aging process is not only set by distinct elements, such as genetic factors, but by extrinsic factors, such as lifestyle, expressions, and environment as well. This paper applied machine learning technique to intelligent age estimation from facial images using J48 classifier on FG_NET dataset. The proposed work consists of three phases; the first phase is image preprocessing which include

... Show More
View Publication Preview PDF
Publication Date
Fri Aug 16 2024
Journal Name
International Journal Of Mathematics And Computer Science
Artificial Intelligence Techniques to Identify Individuals through Palm Image Recognition
...Show More Authors

Artificial intelligence (AI) is entering many fields of life nowadays. One of these fields is biometric authentication. Palm print recognition is considered a fundamental aspect of biometric identification systems due to the inherent stability, reliability, and uniqueness of palm print features, coupled with their non-invasive nature. In this paper, we develop an approach to identify individuals from palm print image recognition using Orange software in which a hybrid of AI methods: Deep Learning (DL) and traditional Machine Learning (ML) methods are used to enhance the overall performance metrics. The system comprises of three stages: pre-processing, feature extraction, and feature classification or matching. The SqueezeNet deep le

... Show More
View Publication Preview PDF
Scopus Clarivate Crossref