Preferred Language
Articles
/
OhdOPo8BVTCNdQwCHmXk
Construct an efficient distributed denial of service attack detection system based on data mining techniques
...Show More Authors

<span>Distributed denial-of-service (DDoS) attack is bluster to network security that purpose at exhausted the networks with malicious traffic. Although several techniques have been designed for DDoS attack detection, intrusion detection system (IDS) It has a great role in protecting the network system and has the ability to collect and analyze data from various network sources to discover any unauthorized access. The goal of IDS is to detect malicious traffic and defend the system against any fraudulent activity or illegal traffic. Therefore, IDS monitors outgoing and incoming network traffic. This paper contains a based intrusion detection system for DDoS attack, and has the ability to detect the attack intelligently, dynamically and periodically by evaluating the set of attackers of the current node with its neighbors. We use dataset named CICDDoS2019 that contains on binary classes benign and DDoS. Performance has evaluated by applying data mining algorithms as well as applying the best features to discover potential attack classes.</span>

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Apr 04 2023
Journal Name
International Journal Of Professional Business Review
An Empirical Study to Measure the Impact of Information Technology Governance Under the Control Objectives for Information and Related Technologies on Financial Performance
...Show More Authors

Purpose: To determine the effect of information technology governance (ITG) under the control objectives for information and related technologies (COBIT) on financial performance is the objective of this study. Additionally, the article seeks to look into the relationships between the factors under consideration.   Theoretical framework: Information technology and operational processes are evaluated and ensure their compliance with the instructions of the Central Bank of Iraq. Therefore, the research dealt with a conceptual framework by reviewing the literature on the importance of the COBIT framework in assessing financial performance.   Design/methodology/approach: To investigate the effect of information technology; we the valu

... Show More
View Publication
Scopus (25)
Crossref (5)
Scopus Crossref
Publication Date
Wed Dec 20 2023
Journal Name
Migration Letters
Women's Image in Arabic Songs (An Analytical Study of how Women Appear in the Most Viewed Songs on YouTube for the Year 2021)
...Show More Authors

Preview PDF
Publication Date
Thu Mar 14 2024
Journal Name
Al-rafidain Journal Of Medical Sciences ( Issn 2789-3219 )
Impact of MDR-1 Gene Polymorphism (rs1128503) on Response to Imatinib or Nilotinib in Iraqi Patients with Chronic Myeloid Leukemia: An Observational Study
...Show More Authors

Background: There is a significant molecular response to imatinib given at standard doses in individuals with chronic myeloid leukemia (CML) whose ABCB1 polymorphisms are present. Objective: To investigate the impact of the polymorphism in the ABCB1 gene rs1128503 on the effectiveness of nilotinib or imatinib therapy. Methods: From May 2022 until the end of January 2023, the current study was carried out in a single research institution, the National Center of Hematology, Baghdad Teaching Hospital at Medical City, Iraq. 76 people with chronic phase myeloid leukemia (CML-CP), who had previously received a diagnosis using the European Leukemia Net (ELN) criteria, enrolled in the trial. The PCR product was delivered to Macrogen Corpora

... Show More
View Publication
Scopus Crossref
Publication Date
Tue Mar 30 2021
Journal Name
Iraqi Journal Of Science
Electrochemical Polymerization and Biological Activity of 4-(Nicotinamido)-4-Oxo-2-Butenoic Acid as An Anticorrosion Coating on A 316L Stainless Steel Surface
...Show More Authors

In this study, poly4-(nicotinamido)-4-oxo-2-butenoic acid (PNOE) was prepared by the electro polymerization of 4-(nicotinamido)-4-oxo-2-butenoic acid (NOE) monomer on a 316 stainless steel (St.St) which acts as an anticorrosion coating.  Fourier transforms infrared (FTIR), atomic force microscopy (AFM), scanning electron microscopy (SEM), and cyclic voltammetry were used to diagnose the structure and the properties of the prepared polymer layer. The corrosion behavior of the uncoated and coated 316  St.St were evaluated by using an electro chemical polarization technique in 0.2 M hydrochloric acid  solution as a corrosive medium at a temperature range of 293 to 323 K. Nano materials, such as nano ZnO and graphene were added in di

... Show More
View Publication
Scopus (6)
Crossref (2)
Scopus Crossref
Publication Date
Mon Jul 04 2022
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The possibility of adopting strategic management accounting techniques to increase competitiveness Iraqi economic units in light of the variables of the contemporary business environment.
...Show More Authors

The accession of countries to the World Trade Agreement and the openness of markets to each other without restrictions led to the emergence of the philosophy of "a world without borders and business units without countries", which required adapting the modern business environment to that philosophy, which is considered as objectives for the activities of the units that must be implemented in order to achieve competition. The objective of the units has changed from making profit to meeting the desires of customers, which is what imposed a new role for management accounting as a field of knowledge renewed in it visions of competitiveness between units. Because of the increasing needs for information in light of environmental change

... Show More
View Publication Preview PDF
Publication Date
Fri Nov 15 2024
Journal Name
Iraqi Journal Of Science
Comparison of the Physical Trace of Global Luminosity Emission at Multiwavelength and Star Formation Rates of Luminous Infrared Galaxies Using Extragalactic Distance Scale Techniques
...Show More Authors

This paper aims to study the rate of star formation (SFR) in luminous infrared galaxies at different wavelengths using distance measurement techniques (dl, dm) and to know which methods are the most accurate to determine the rate of star formation as we present through this research the results of the statistical analysis (descriptive statistics) for a sample of luminous infrared galaxies. The data used in this research were collected from the NASA Extragalactic Database (NED) and HYPERLEDA, then used to calculate the star formation rate and indicate the accuracy of the distance methods used (dl, dm). Two methods were tested on Hα, OII, FIR, radio continuum at 1.4 GHz, FUV, NUV, and total (FUV + FIR). The results showed that the dl

... Show More
View Publication
Scopus Crossref
Publication Date
Mon Mar 08 2021
Journal Name
Journal Of Physics: Conference Series
Design and Implementation of a Moving Robot Equipped with an Arm and an FPGA to Deliver Objects between Two Positions
...Show More Authors
Abstract<p>In this paper a system is designed and implemented using a Field Programmable Gate Array (FPGA) to move objects from a pick up location to a delivery location. This transportation of objects is done via a vehicle equipped with a robot arm and an FPGA. The path between the two locations is followed by recognizing a black line between them. The black line is sensed by Infrared sensors (IR) located on the front and on the back of the vehicle. The Robot was successfully implemented by programming the Field Programmable Gate Array with the designed system that was described as a state diagram and the robot operated properly.</p>
Preview PDF
Scopus Crossref
Publication Date
Fri Jul 21 2023
Journal Name
Journal Of Engineering
Application of Geographic Information System for Preparing the Bill of Quantities of Construction Projects
...Show More Authors

The information required for construction quantities surveying is not only generated by various participants in different construction phases but also stored in different forms including graphics, text, tables, or various combinations of the three. To report a bill of quantities (BOQ), the project manager has to continuously excerpt information from various resources and record it on papers. Without adequate staff and time, this repetitive and tedious process is difficult for the project manager to handle properly and thus reduces the effectiveness and the accuracy of the quantities surveying process which creates problems during the design, tender, and construction supervision of construction projects for designers and contractors pract

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sun Dec 31 2023
Journal Name
Iraqi Geological Journal
Advanced Geostatistical Techniques for Building 3D Geological Modeling: A Case Study from Cretaceous Reservoir in Bai Hassan Oil Field
...Show More Authors

A 3D Geological model was generated using an advanced geostatistical method for the Cretaceous reservoir in the Bai Hassan oil field. In this study, a 3D geological model was built based on data from four wells for the petrophysical property distribution of permeability, porosity, water saturation, and NTG by using Petrel 2021 software. The geological model was divided into a structural model and a property model. The geological structures of the cretaceous reservoir in the Bai Hassan oil field represent elongated anticline folds with two faults, which had been clarified in the 3D Structural model. Thirteen formations represent the Cretaceous reservoir which includes (Shiranish, Mashurah, U.kometan, Kometan Shale, L. Kometan, Gulnen

... Show More
View Publication Preview PDF
Scopus (2)
Scopus Crossref
Publication Date
Thu Sep 28 2023
Journal Name
Iraqi Journal Of Computer, Communication, Control And System Engineering
A Comparative Study Between the Fragile and Robust Watermarking Techniques and Proposing New Fragile Watermarking with Embedded Value Technique
...Show More Authors

Since the Internet has been more widely used and more people have access to multimedia content, copyright hacking, and piracy have risen. By the use of watermarking techniques, security, asset protection, and authentication have all been made possible. In this paper, a comparison between fragile and robust watermarking techniques has been presented to benefit them in recent studies to increase the level of security of critical media. A new technique has been suggested when adding an embedded value (129) to each pixel of the cover image and representing it as a key to thwart the attacker, increase security, rise imperceptibility, and make the system faster in detecting the tamper from unauthorized users. Using the two watermarking ty

... Show More
View Publication
Crossref