Preferred Language
Articles
/
OhdOPo8BVTCNdQwCHmXk
Construct an efficient distributed denial of service attack detection system based on data mining techniques
...Show More Authors

<span>Distributed denial-of-service (DDoS) attack is bluster to network security that purpose at exhausted the networks with malicious traffic. Although several techniques have been designed for DDoS attack detection, intrusion detection system (IDS) It has a great role in protecting the network system and has the ability to collect and analyze data from various network sources to discover any unauthorized access. The goal of IDS is to detect malicious traffic and defend the system against any fraudulent activity or illegal traffic. Therefore, IDS monitors outgoing and incoming network traffic. This paper contains a based intrusion detection system for DDoS attack, and has the ability to detect the attack intelligently, dynamically and periodically by evaluating the set of attackers of the current node with its neighbors. We use dataset named CICDDoS2019 that contains on binary classes benign and DDoS. Performance has evaluated by applying data mining algorithms as well as applying the best features to discover potential attack classes.</span>

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Oct 30 2022
Journal Name
Iraqi Journal Of Science
Molecular Investigation of Some Beta-lactamase Genes by PCR and DNA Sequencing Techniques in clinical Escherichia coli
...Show More Authors

     In this study, out of 50 isolates of some nosocomial infections from some Baghdad hospitals, only 13 (26%) were identified as Escherichia coli. Depending on selective media, morphological and biochemical tests the species was then confirmed by molecular methods. Later on  antimicrobial resistance test was performed by the Kirby-Bauer method. The molecular characterization of blaTEM and blaCTX-M genes in different clinical isolates of E. coli was done through polymerase chain reaction (PCR) by utilizing special primers. These genes were positive to only 4 (30.7%) isolates. The sequence of nucleotides of positive genes was carried out for four isolates. The results showed that there was no vari

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (1)
Scopus Crossref
Publication Date
Sat Jan 01 2022
Journal Name
Materials Today: Proceedings
Investigating the use of lean manufacturing techniques in liquid batteries production: A field research in Babylon plants
...Show More Authors

View Publication
Scopus (3)
Scopus Clarivate Crossref
Publication Date
Mon Feb 19 2024
Journal Name
Journal Of Engineering
Predicting Biochemical Oxygen Demand at the Inlet of Al-Rustumiya Wastewater Treatment Plant Using Different Mathematical Techniques
...Show More Authors

Water quality planning relies on Biochemical Oxygen Demand BOD. BOD testing takes five days. The Particle Swarm Optimization (PSO) is increasingly used for water resource forecasting. This work designed a PSO technique for estimating everyday BOD at Al-Rustumiya wastewater treatment facility inlet. Al-Rustumiya wastewater treatment plant provided 702 plant-scale data sets during 2012-2022. The PSO model uses the daily data of the water quality parameters, including chemical oxygen demand (COD), chloride (Cl-), suspended solid (SS), total dissolved solids (TDS), and pH, to determine how each variable affects the daily incoming BOD. PSO and multiple linear regression (MLR) findings are compared, and their performance is evaluated usin

... Show More
View Publication
Crossref
Publication Date
Thu Feb 01 2024
Journal Name
Journal Of Engineering
Predicting Biochemical Oxygen Demand at the Inlet of Al-Rustumiya Wastewater Treatment Plant Using Different Mathematical Techniques
...Show More Authors

Water quality planning relies on Biochemical Oxygen Demand BOD. BOD testing takes five days. The Particle Swarm Optimization (PSO) is increasingly used for water resource forecasting. This work designed a PSO technique for estimating everyday BOD at Al-Rustumiya wastewater treatment facility inlet. Al-Rustumiya wastewater treatment plant provided 702 plant-scale data sets during 2012-2022. The PSO model uses the daily data of the water quality parameters, including chemical oxygen demand (COD), chloride (Cl-), suspended solid (SS), total dissolved solids (TDS), and pH, to determine how each variable affects the daily incoming BOD. PSO and multiple linear regression (MLR) findings are compared, and their perfor

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Aug 03 2021
Journal Name
Key Engineering Materials
Comparative Study of Structural Behavior for Asymmetrical Castellated (Concavely - Curved Soffit) Steel Beams with Different Strengthening Techniques
...Show More Authors

The Asymmetrical Castellated concavely – curved soffit Steel Beams with RPC and Lacing Reinforcement improves compactness and local buckling (web and flange local buckling), vertical shear strength at gross section (web crippling and web yielding at the fillet), and net section ( net vertical shear strength proportioned between the top and bottom tees relative to their areas (Yielding)), horizontal shear strength in web post (Yielding), web post-buckling strength, overall beam flexure strength, tee Vierendeel bending moment and lateral-torsional buckling, as a result of steel section encasement. This study presents two concentrated loads test results for seven specimens Asymmetrical Castellated concavely – curved soffit Steel Be

... Show More
View Publication
Scopus (3)
Crossref (1)
Scopus Crossref
Publication Date
Wed Sep 30 2020
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The effect of Auditing Quality on the Earnings Quality: (An applied research in a sample of private joint stock companies listed on the Iraq Stock Exchange)
...Show More Authors

The research aims to measure the impact of the quality of the audit on the Earnings Quality, for a sample of private joint stock companies listed on the Iraq Stock Exchange, as the research sample included (14) private and listed joint stock companies in issuing their financial statements for the period from (2010-2018), as well as companies The audit offices in charge of auditing these companies, which number (18) companies or an audit office, and the research relied on two main models for measurement, as the first model reflects the assumed relationship between independent variables represented in the characteristics of external audit quality and measuring the extent of its impact on the dependent variable represented in the Ea

... Show More
View Publication Preview PDF
Publication Date
Wed Jul 01 2020
Journal Name
Indonesian Journal Of Electrical Engineering And Computer Science
Fast and robust approach for data security in communication channel using pascal matrix
...Show More Authors

This paper present the fast and robust approach of English text encryption and decryption based on Pascal matrix. The technique of encryption the Arabic or English text or both and show the result when apply this method on plain text (original message) and how will form the intelligible plain text to be unintelligible plain text in order to secure information from unauthorized access and from steel information, an encryption scheme usually uses a pseudo-random enecryption key generated by an algorithm. All this done by using Pascal matrix. Encryption and decryption are done by using MATLAB as programming language and notepad ++to write the input text.This paper present the fast and robust approach of English text encryption and decryption b

... Show More
View Publication
Scopus (7)
Crossref (2)
Scopus Crossref
Publication Date
Fri Jan 01 2021
Journal Name
Journal Of Intelligent Systems
Void-hole aware and reliable data forwarding strategy for underwater wireless sensor networks
...Show More Authors
Abstract<p>Reliable data transfer and energy efficiency are the essential considerations for network performance in resource-constrained underwater environments. One of the efficient approaches for data routing in underwater wireless sensor networks (UWSNs) is clustering, in which the data packets are transferred from sensor nodes to the cluster head (CH). Data packets are then forwarded to a sink node in a single or multiple hops manners, which can possibly increase energy depletion of the CH as compared to other nodes. While several mechanisms have been proposed for cluster formation and CH selection to ensure efficient delivery of data packets, less attention has been given to massive data co</p> ... Show More
View Publication Preview PDF
Scopus (8)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Sun Jan 01 2017
Journal Name
Iraqi Journal Of Science
Strong Triple Data Encryption Standard Algorithm using Nth Degree Truncated Polynomial Ring Unit
...Show More Authors

Cryptography is the process of transforming message to avoid an unauthorized access of data. One of the main problems and an important part in cryptography with secret key algorithms is key. For higher level of secure communication key plays an important role. For increasing the level of security in any communication, both parties must have a copy of the secret key which, unfortunately, is not that easy to achieve. Triple Data Encryption Standard algorithm is weak due to its weak key generation, so that key must be reconfigured to make this algorithm more secure, effective, and strong. Encryption key enhances the Triple Data Encryption Standard algorithm securities. This paper proposed a combination of two efficient encryption algorithms to

... Show More
Publication Date
Sun Mar 01 2015
Journal Name
Journal Of Engineering
Multi-Sites Multi-Variables Forecasting Model for Hydrological Data using Genetic Algorithm Modeling
...Show More Authors

A two time step stochastic multi-variables multi-sites hydrological data forecasting model was developed and verified using a case study. The philosophy of this model is to use the cross-variables correlations, cross-sites correlations and the two steps time lag correlations simultaneously, for estimating the parameters of the model which then are modified using the mutation process of the genetic algorithm optimization model. The objective function that to be minimized is the Akiake test value. The case study is of four variables and three sites. The variables are the monthly air temperature, humidity, precipitation, and evaporation; the sites are Sulaimania, Chwarta, and Penjwin, which are located north Iraq. The model performance was

... Show More
View Publication Preview PDF