Preferred Language
Articles
/
OhdOPo8BVTCNdQwCHmXk
Construct an efficient distributed denial of service attack detection system based on data mining techniques
...Show More Authors

<span>Distributed denial-of-service (DDoS) attack is bluster to network security that purpose at exhausted the networks with malicious traffic. Although several techniques have been designed for DDoS attack detection, intrusion detection system (IDS) It has a great role in protecting the network system and has the ability to collect and analyze data from various network sources to discover any unauthorized access. The goal of IDS is to detect malicious traffic and defend the system against any fraudulent activity or illegal traffic. Therefore, IDS monitors outgoing and incoming network traffic. This paper contains a based intrusion detection system for DDoS attack, and has the ability to detect the attack intelligently, dynamically and periodically by evaluating the set of attackers of the current node with its neighbors. We use dataset named CICDDoS2019 that contains on binary classes benign and DDoS. Performance has evaluated by applying data mining algorithms as well as applying the best features to discover potential attack classes.</span>

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Dec 12 2017
Journal Name
Al-khwarizmi Engineering Journal
Model Reference Adaptive Control based on a Self-Recurrent Wavelet Neural Network Utilizing Micro Artificial Immune Systems
...Show More Authors

Abstract 

This paper presents an intelligent model reference adaptive control (MRAC) utilizing a self-recurrent wavelet neural network (SRWNN) to control nonlinear systems. The proposed SRWNN is an improved version of a previously reported wavelet neural network (WNN). In particular, this improvement was achieved by adopting two modifications to the original WNN structure. These modifications include, firstly, the utilization of a specific initialization phase to improve the convergence to the optimal weight values, and secondly, the inclusion of self-feedback weights to the wavelons of the wavelet layer. Furthermore, an on-line training procedure was proposed to enhance the control per

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Thu Feb 07 2019
Journal Name
Iraqi Journal Of Laser
Tapered Splicing Points SMF-PCF-SMF Structure based on Mach-Zehnder interferometer for Enhanced Refractive Index Sensing
...Show More Authors

Photonic crystal fiber interferometers (PCFIs) are widely used for sensing applications. This work presented solid core-PCFs based on Mach-Zehnder modal interferometer for sensing refractive index. The general structure of sensor was applied by splicing short lengths of PCF in both sides with conventional single mode fiber (SMF-28).To apply modal interferometer theory collapsing technique based on fusion splicing used to excite higher order modes (LP01 and LP11). A high sensitive optical spectrum analyzer (OSA) was used to monitor and record the transmitted wavelength. This work studied a Mach-Zahnder interferometer refractive index sensor based on splicing point tapered SMF-PCF-SMF. Relation between refractive index sensitivity and tape

... Show More
View Publication Preview PDF
Publication Date
Tue Dec 29 2020
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Medication Safety in Patients under 18 Years Old; a Retrospective Study based on Iraqi Pharmacovigilance Center Database
...Show More Authors

Medication safety is an important part of the comprehensive patient safety term. Medication safety is gaining more attention as the World Health Organization set the goal of decreasing medication harm by (50%) for the next 5 years when launching the third global challenge. Studying medication safety in the risk groups such as young ages, children are crucial to learn more about the effect of medicines in this risk group since they are not included in the clinical trials. Adverse drug reaction is defined as any harm resulted from the drug itself during medical process journey, while medication errors are any harm resulted from the treatment process rather than the drug or it is the result of the failure in a step of the treatment process

... Show More
View Publication Preview PDF
Crossref (1)
Scopus Crossref
Publication Date
Mon Feb 01 2021
Journal Name
Journal Of Engineering
Design narrow-band frequency amplifier (1.5GHz -1.6GHz) based on InGaP Heterojunction Bipolar Transistor (HBT) and GaAs HBT
...Show More Authors

The research aims to design a narrow-band frequency drive amplifier (1.5GHz -1.6GHz), which is used to boost the transmitter amplifier's input signal or amplify the GPS, GlONASS signals at the L1 band.

The Power Amplifier printed circuit board (PCB) prototype was designed using InGaP HBT homogeneous technology transistor and GaAs Heterojunction Bipolar Transistor (HBT) transistor. Two models have been compared; one of the models gave 16dB gain, and the other gave 23dB when using an input power signal (-15dBm). The PCB consumes 2.4W of power and has a physical dimension of 11 x 4 cm.

View Publication Preview PDF
Crossref
Publication Date
Sat Oct 31 2020
Journal Name
International Journal Of Intelligent Engineering And Systems
Automatic Computer Aided Diagnostic for COVID-19 Based on Chest X-Ray Image and Particle Swarm Intelligence
...Show More Authors

View Publication
Scopus (22)
Crossref (5)
Scopus Crossref
Publication Date
Mon Jan 01 2024
Journal Name
International Journal Of Neutrosophic Science
A New Paradigm for Decision Making under Uncertainty in Signature Forensics Applications based on Neutrosophic Rule Engine
...Show More Authors

One of the most popular and legally recognized behavioral biometrics is the individual's signature, which is used for verification and identification in many different industries, including business, law, and finance. The purpose of the signature verification method is to distinguish genuine from forged signatures, a task complicated by cultural and personal variances. Analysis, comparison, and evaluation of handwriting features are performed in forensic handwriting analysis to establish whether or not the writing was produced by a known writer. In contrast to other languages, Arabic makes use of diacritics, ligatures, and overlaps that are unique to it. Due to the absence of dynamic information in the writing of Arabic signatures,

... Show More
View Publication Preview PDF
Scopus (5)
Scopus Crossref
Publication Date
Sun Feb 23 2025
Journal Name
Journal Of Baghdad College Of Dentistry
An Evaluation of the Solubility of Four Endodontic Sealers in Different Solvents (An In Vitro Study)
...Show More Authors

Background: Complete removal of filling material from the root canal is an essential requirement for endodontic retreatment. The purpose of the present study is to evaluate and compare the dissolving capabilities of various solvents (Xylene, Eugenate Desobturator, Eucalyptol, EDTA and Distilled water (as a control)) on four different types of sealer (Endofill, Apexit Plus, AH Plus and EndoSequence bioceramic sealer). Materials and method: Eighty samples of each sealer were prepared according to the manufacturers' instructions and then divided into ten groups (of 8 samples) for immersion in the respective solvents for 2 and 5 min immersion periods. Each sealer specimen was weighed to obtain its initial mass. The specimens were immersed in

... Show More
View Publication Preview PDF
Publication Date
Wed Jul 20 2022
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
An Application Model for Linear Programming with an Evolutionary Ranking Function
...Show More Authors

One of the most important methodologies in operations research (OR) is the linear programming problem (LPP). Many real-world problems can be turned into linear programming models (LPM), making this model an essential tool for today's financial, hotel, and industrial applications, among others. Fuzzy linear programming (FLP) issues are important in fuzzy modeling because they can express uncertainty in the real world. There are several ways to tackle fuzzy linear programming problems now available. An efficient method for FLP has been proposed in this research to find the best answer. This method is simple in structure and is based on crisp linear programming. To solve the fuzzy linear programming problem (FLPP), a new ranking function (R

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sun Sep 27 2020
Journal Name
Iraqi National Journal Of Nursing Specialties
Effectiveness of an Educational Program on Patients’ Knowledge Concerning care of Vascular Access of Hemodialysis in Al-Muthana Teaching Hospitals
...Show More Authors

Objectives:  The study aims to identify the effects of an educational program on patients’ knowledge about vascular access care and to find out the relationship between patients knowledge scores and their selected demographic variable.                                                                                  &

... Show More
View Publication Preview PDF
Publication Date
Sun Feb 23 2025
Journal Name
Al Ghary Journal Of Economic And Administrative Sciences
The impact of strategic knowledge on strategic improvisation: an exploratory study of some private hospitals in the city of Baghdad
...Show More Authors

View Publication