<span>Distributed denial-of-service (DDoS) attack is bluster to network security that purpose at exhausted the networks with malicious traffic. Although several techniques have been designed for DDoS attack detection, intrusion detection system (IDS) It has a great role in protecting the network system and has the ability to collect and analyze data from various network sources to discover any unauthorized access. The goal of IDS is to detect malicious traffic and defend the system against any fraudulent activity or illegal traffic. Therefore, IDS monitors outgoing and incoming network traffic. This paper contains a based intrusion detection system for DDoS attack, and has the ability to detect the attack intelligently, dynamically and periodically by evaluating the set of attackers of the current node with its neighbors. We use dataset named CICDDoS2019 that contains on binary classes benign and DDoS. Performance has evaluated by applying data mining algorithms as well as applying the best features to discover potential attack classes.</span>
This paper proposes two hybrid feature subset selection approaches based on the combination (union or intersection) of both supervised and unsupervised filter approaches before using a wrapper, aiming to obtain low-dimensional features with high accuracy and interpretability and low time consumption. Experiments with the proposed hybrid approaches have been conducted on seven high-dimensional feature datasets. The classifiers adopted are support vector machine (SVM), linear discriminant analysis (LDA), and K-nearest neighbour (KNN). Experimental results have demonstrated the advantages and usefulness of the proposed methods in feature subset selection in high-dimensional space in terms of the number of selected features and time spe
... Show More: The need for means of transmitting data in a confidential and secure manner has become one of the most important subjects in the world of communications. Therefore, the search began for what would achieve not only the confidentiality of information sent through means of communication, but also high speed of transmission and minimal energy consumption, Thus, the encryption technology using DNA was developed which fulfills all these requirements [1]. The system proposes to achieve high protection of data sent over the Internet by applying the following objectives: 1. The message is encrypted using one of the DNA methods with a key generated by the Diffie-Hellman Ephemeral algorithm, part of this key is secret and this makes the pro
... Show MoreABSTRUCT
In This Paper, some semi- parametric spatial models were estimated, these models are, the semi – parametric spatial error model (SPSEM), which suffer from the problem of spatial errors dependence, and the semi – parametric spatial auto regressive model (SPSAR). Where the method of maximum likelihood was used in estimating the parameter of spatial error ( λ ) in the model (SPSEM), estimated the parameter of spatial dependence ( ρ ) in the model ( SPSAR ), and using the non-parametric method in estimating the smoothing function m(x) for these two models, these non-parametric methods are; the local linear estimator (LLE) which require finding the smoo
... Show MoreThe gravity method is a measurement of relatively noticeable variations in the Earth’s gravitational field caused by lateral variations in rock's density. In the current research, a new technique is applied on the previous Bouguer map of gravity surveys (conducted from 1940–1950) of the last century, by selecting certain areas in the South-Western desert of Iraqi-territory within the provinces' administrative boundary of Najaf and Anbar. Depending on the theory of gravity inversion where gravity values could be reflected to density-contrast variations with the depths; so, gravity data inversion can be utilized to calculate the models of density and velocity from four selected depth-slices 9.63 Km, 1.1 Km, 0.682 Km and 0.407 Km.
... Show MoreMeasuring the efficiency of postgraduate and undergraduate programs is one of the essential elements in educational process. In this study, colleges of Baghdad University and data for the academic year (2011-2012) have been chosen to measure the relative efficiencies of postgraduate and undergraduate programs in terms of their inputs and outputs. A relevant method to conduct the analysis of this data is Data Envelopment Analysis (DEA). The effect of academic staff to the number of enrolled and alumni students to the postgraduate and undergraduate programs are the main focus of the study.
The international financial accounting and reporting standards IFRS/IAS represent the set of rules and foundations that the economic entity must follow in the measurement, presentation, and disclosure of the elements of the financial statements, the implementation of adopting the international financial reporting standards contributes to improving the qualitative characteristics of accounting information, so the current research aims to explain the role of adopting the International Accounting Standard (IAS) in improving the qualitative characteristics as well as analyzing the impact of the adoption of IAS.1 in improving the qualitative characteristics of accounting information within the financi
... Show MoreObjective: To determine the effectiveness of an Intervention Oriented program on the prognosis of Osteopenia among Women at Private clinics in Baghdad City. Methodology: A longitudinal design. A purposive ''non probability'' sample of (25) Women who have bone mineral density (BMD) T- test between (-1 to -2.5). The data are collected through the utilization of a constructed questionnaire and by means of interview with each client who is involved in the study. Each interview takes approximately (20) minutes. Results: The study showed that there is a good improvement in bone density accord after applicatio
The increase in military spending has become a feature of the times for many countries, including China. They have sought to increase their defence spending, not with the aim of domination and possession, but rather to protect their economic interests and to secure their foreign trade. The research aims to identify the impact of military spending by studying the nature of defence spending and its role in providing security. And stability and facilitating foreign investment in it, as well as storming the military industry, securing some humanitarian supplies, and participating in a variety of public works that can be used in the civil and military fields, and the aim of the research is to id
... Show MoreThe research focuses on determining the role of customer relationship management in improving financial performance by surveying the opinions of a number of employees of a number of Iraqi private banks. The customer has become the focus of attention and the most important factors of success and profitability and competition. Therefore, decisions related to the customer are important decisions that support the process of making, And follow-up of administrative decisions, including financial decisions aimed at improving the financial performance of banks and distinguish them from competitors. Thus, the techniques used in customer relations management programs to collect, analyze and use data and information have beco
... Show MoreThe effect of the tensor term in the Skyrme interaction has been estimated in calculating the static and dynamic nuclear properties in sd and fp-shell model spaces nuclei. The nuclear shell gaps have been studied with different Skyrme parameterizations; Skxta and Skxtb with tensor interaction, SkX, SkM, and SLy4 without tensor interaction, and Skxcsb with consideration of the effect of charge symmetry breaking. We have examined the stability of N = 28 for 42Si and 48Ca. The results showed that the disappearance of the magicity occurs in the shell closure of 42Si. Furthermore, excitation energy, quadrupole deformation, neutron separation energy, pairing energy, and density profile have also been calculated. Quadrupole deformation indicates a
... Show More