Preferred Language
Articles
/
OhdOPo8BVTCNdQwCHmXk
Construct an efficient distributed denial of service attack detection system based on data mining techniques
...Show More Authors

<span>Distributed denial-of-service (DDoS) attack is bluster to network security that purpose at exhausted the networks with malicious traffic. Although several techniques have been designed for DDoS attack detection, intrusion detection system (IDS) It has a great role in protecting the network system and has the ability to collect and analyze data from various network sources to discover any unauthorized access. The goal of IDS is to detect malicious traffic and defend the system against any fraudulent activity or illegal traffic. Therefore, IDS monitors outgoing and incoming network traffic. This paper contains a based intrusion detection system for DDoS attack, and has the ability to detect the attack intelligently, dynamically and periodically by evaluating the set of attackers of the current node with its neighbors. We use dataset named CICDDoS2019 that contains on binary classes benign and DDoS. Performance has evaluated by applying data mining algorithms as well as applying the best features to discover potential attack classes.</span>

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Feb 25 2025
Journal Name
Al-rafidain University College For Sciences
“Simple Regression Analysis by using Linear Programming Technique and illustration of Absolute Residuals method with another Estimation Techniques”
...Show More Authors

This research deals with unusual approach for analyzing the Simple Linear Regression via Linear Programming by Two - phase method, which is known in Operations Research: “O.R.”. The estimation here is found by solving optimization problem when adding artificial variables: Ri. Another method to analyze the Simple Linear Regression is introduced in this research, where the conditional Median of (y) was taken under consideration by minimizing the Sum of Absolute Residuals instead of finding the conditional Mean of (y) which depends on minimizing the Sum of Squared Residuals, that is called: “Median Regression”. Also, an Iterative Reweighted Least Squared based on the Absolute Residuals as weights is performed here as another method to

... Show More
View Publication Preview PDF
Publication Date
Tue Dec 11 2018
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Contribution of Some Managerial Accounting Techniques to Achieve Market Share Requirements / Applied researchin the Al-Muthanna Cement Company
...Show More Authors

The research aims to achieve market share requirements and reach the targeted competitive price through the application of management accounting techniques represented by continuous improvement technique and target costing under an Activity Based Cost (ABC) system and Activity Based Management (ABM), In Muthanna Cement Company to reach the rationalization of the cost of the product and maintain the required quality and improve the profitability of the company.

The problem of research has emerged in the inability of local firms to enter into effective competition with other companies operating in the same economic sector, Because of the high cost of its products, Which led to the sale of the product at prices below its cost, and t

... Show More
View Publication
Crossref
Publication Date
Fri Dec 08 2023
Journal Name
Iraqi Journal Of Science
Integration Remote Sensing and GIS Techniques to Evaluate Land Use-Land Cover of Baghdad Region and Nearby Areas
...Show More Authors

The study area of Baghdad region and nearby areas lies within the central part of the Mesopotamia plain. It covers about 5700 Km2. The remote sensing techniques are used in order to produce possible Land Use – Land Cover (LULC) map for Baghdad region and nearby areas depending on Landsat TM satellite image 2007. The classification procedure which was developed by USGS used and followed with field checking in 2010. Land Use-land cover digital map is created depending on maximum likelihood classifications (ML) of TM image using ERDAS 9.2.The LULC raster image is converted to vector structure, using Arc GIS 9.3 Program in order to create a digital LULC map. This study showed it is possible to produce a digital map of LULC and it can be co

... Show More
View Publication Preview PDF
Publication Date
Tue Jun 01 2021
Journal Name
Journal Of The College Of Languages (jcl)
Translation Techniques In Reproducing The Semantics Of Russian Political Terms: Переводческие Приемы В Воспроизведении Семантики Русскоязычных Политических Терминов
...Show More Authors

 Political terminology differs from any other type of terminology not only in the presence of political terminology, but also in content, structure, functions and the recipient who perceives it. Taking this into account, it is inappropriate to consider the semantic difficulties of translating Russian-language political terms solely at the semantic level. In our opinion, it is inextricably linked with the lexical, syntactic and grammatical levels. If we combine all 4 levels, then the following translation techniques can be distinguished: lexical borrowing (transcription / transliteration, tracing); modulation; generalization / concretization; omission / addition; descriptive translation; conversion [Komissarov 2013]. One of the most

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Feb 25 2025
Journal Name
Journal Of Baghdad College Of Dentistry
Marginal leakage of amalgam and modern composite materials related to restorative techniques in class II cavity (Comparative study)
...Show More Authors

Background: Restoration of the gingival margin of Class II cavities with composite resin continues to be problematic, especially where no enamel exists for bonding to the gingival margin. The aim of study is to evaluate the marginal leakage at enamel and cementum margin of class II MOD cavities using amalgam restoration and modern composite restorations Filtek™ P90, Filtek™ Z250 XT (Nano Hybrid Universal Restorative) and SDR bulk fill with different restoratives techniques. Materials and method: Eighty sound maxillary first premolar teeth were collected and divided into two main groups, enamel group and cementum group (40 teeth) for each group. The enamel group was prepared with standardized Class II MOD cavity with gingival margin (1 m

... Show More
View Publication Preview PDF
Publication Date
Thu Aug 30 2018
Journal Name
Journal Of Engineering
Monitoring Land Cover Change Using Remote Sensing and GIS Techniques: a Case Study of Al-Dalmaj Marsh, Iraq
...Show More Authors

Al-Dalmaj marsh and the near surrounding area is a very promising area for energy resources, tourism, agricultural and industrial activities. Over the past century, the Al-Dalmaje marsh and near surroundings area endrous from a number of changes. The current study highlights the spatial and temporal changes detection in land cover for Al-Dalmaj marsh and near surroundings area using different analyses methods the supervised maximum likelihood classification method, the Normalized  Difference Vegetation Index (NDVI), Geographic Information Systems(GIS),  and Remote Sensing (RS). Techniques spectral indices were used in this study to determine the change of wetlands and drylands area and of other land classes, th

... Show More
View Publication Preview PDF
Crossref (9)
Crossref
Publication Date
Sat Dec 30 2023
Journal Name
Iraqi Journal Of Science
Proposed Security Models for Node-level and Network-level Aspects of Wireless Sensor Networks Using Machine Learning Techniques
...Show More Authors

     As a result of the pandemic crisis and the shift to digitization, cyber-attacks are at an all-time high in the modern day despite good technological advancement. The use of wireless sensor networks (WSNs) is an indicator of technical advancement in most industries. For the safe transfer of data, security objectives such as confidentiality, integrity, and availability must be maintained. The security features of WSN are split into node level and network level. For the node level, a proactive strategy using deep learning /machine learning techniques is suggested. The primary benefit of this proactive approach is that it foresees the cyber-attack before it is launched, allowing for damage mitigation. A cryptography algorithm is put

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Mon Jan 28 2019
Journal Name
Iraqi Journal Of Science
Extraction and Delineation of Pera Magroon Alluvial Fans North East Iraq Using Remote Sensing Techniques and GIS application
...Show More Authors

Pera Magroon anticline is located within the northeastern of Iraq, covering area estimated by 958 Km2. The Landsat ETM+ false color composite imagery was produced by assigning [741] bands. It is used to distinguish alluvial fans in the southwestern limb of Pera Magroon anticline. Digital elevation models (DEM) were used for describing topographic features related to the alluvial fans, as well as, three dominations model (3D) was created from (DEM) and the Landsat ETM+ image.

 Arc GIS, hydro tool set was used to draw the drainage patterns, the area of study was covered by dendritic and parallel patterns. Contour lines across the fans form segments of ellipses reveal the pattern of tectonic act

... Show More
View Publication Preview PDF
Publication Date
Sun Dec 01 2019
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Technical requirements for the application of economic intelligence and its impact On the dimensions of strategic success of banks: An applied research on a sample of Iraqi banks private
...Show More Authors

This research sheds light on one of the important and vital topics for the banking sectors (technical requirements for the application of economic intelligence) namely by (Hardware, equipment, communication networks, software, databases). And the dimensions of the strategic success of the banks represented by(Customer satisfaction, customer trust, quality of service, growth) In the three Iraqi private banks, namely(Assyria International Investment, Mansour Investment, International Development Investment and Finance). Its implementation is an urgent necessity in order to improve the quality of its banking services to win the satisfaction of its customers and their confidence and then grow to achieve stra

... Show More
View Publication Preview PDF
Publication Date
Fri Jan 01 2021
Journal Name
Biochemical Cellular Archive
detection of anti-helicobacter pylori cag a antibody in sera of patients with eye diseases
...Show More Authors

The study conducted to investigate the association between Helicobacter pylori infection and eye diseases (Glaucoma, Cataract, CSR and Uveitis). One hundred and four patients with multiple eye disorders (10-80) years were observed from 10/9/2020 to 18/11/2020 and compared to thirty-one healthy people (19 female and 12 male). Each participant was tested for H. pylori CagAAbs and TNF-α using an enzyme-linked immunosorbent assay (ELISA). The results have shown that there was a non-significant difference (p≥0.05) in the concentration of CagAantibodies in sera of patients with eye diseases except in the case of CSR (central serous chorioretinopathy), which was a significant difference (P≤0.05) compared to the control group. Also, the result

... Show More