Preferred Language
Articles
/
OhdOPo8BVTCNdQwCHmXk
Construct an efficient distributed denial of service attack detection system based on data mining techniques
...Show More Authors

<span>Distributed denial-of-service (DDoS) attack is bluster to network security that purpose at exhausted the networks with malicious traffic. Although several techniques have been designed for DDoS attack detection, intrusion detection system (IDS) It has a great role in protecting the network system and has the ability to collect and analyze data from various network sources to discover any unauthorized access. The goal of IDS is to detect malicious traffic and defend the system against any fraudulent activity or illegal traffic. Therefore, IDS monitors outgoing and incoming network traffic. This paper contains a based intrusion detection system for DDoS attack, and has the ability to detect the attack intelligently, dynamically and periodically by evaluating the set of attackers of the current node with its neighbors. We use dataset named CICDDoS2019 that contains on binary classes benign and DDoS. Performance has evaluated by applying data mining algorithms as well as applying the best features to discover potential attack classes.</span>

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Apr 30 2018
Journal Name
Journal Of Theoretical And Applied Information Technology
An efficient artificial fish swarm algorithm with harmony search for scheduling in flexible job-shop problem
...Show More Authors

Flexible job-shop scheduling problem (FJSP) is one of the instances in flexible manufacturing systems. It is considered as a very complex to control. Hence generating a control system for this problem domain is difficult. FJSP inherits the job-shop scheduling problem characteristics. It has an additional decision level to the sequencing one which allows the operations to be processed on any machine among a set of available machines at a facility. In this article, we present Artificial Fish Swarm Algorithm with Harmony Search for solving the flexible job shop scheduling problem. It is based on the new harmony improvised from results obtained by artificial fish swarm algorithm. This improvised solution is sent to comparison to an overall best

... Show More
View Publication Preview PDF
Scopus (3)
Scopus
Publication Date
Wed Mar 10 2021
Journal Name
Baghdad Science Journal
Synthesis of Bimetallic Au–Pt / TiO2 Catalysts as an Efficient Catalyst for the Photodegradation of Crystal Violet Dye
...Show More Authors

     Bimetallic Au –Pt catalysts supporting TiO2 were synthesised using two methods; sol immobilization and impregnation methods. The prepared catalyst underwent a thermal treatment process at 400 C, while the reduction reaction under the same condition was done and the obtained catalysts were identified with transmission electron microscopy (TEM) and energy-dispersive spectroscopy (EDS). It has been found that the prepared catalysts have a dimension around 2.5 nm and the particles have uniform orders leading to high dispersion of platinum molecules .The prepared catalysts have been examined as efficient photocatalysts to degrade the Crystal violet dye under UV-light. The optimum values of Bimetallic Au –

... Show More
View Publication Preview PDF
Scopus (1)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Wed Feb 20 2019
Journal Name
Iraqi Journal Of Physics
Assessment of nuclear radiation pollution in uranium mining-impacted soil
...Show More Authors

Activities associated with mining of uranium have generated significant quantities of waste materials containing uranium and other toxic metals. A qualitative and quantitative study was performed to assess the situation of nuclear pollution resulting from waste of drilling and exploration left on the surface layer of soil surrounding the abandoned uranium mine hole located in the southern of Najaf province in Iraq state. To measure the specific activity, twenty five surface soil samples were collected, prepared and analyzed by using gamma- ray spectrometer based on high counting efficiency NaI(Tl) scintillation detector. The results showed that the specific activities in Bq/kg are 37.31 to 1112.47 with mean of 268.16, 0.28 to 18.57 with

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Oct 01 2011
Journal Name
Journal Of Engineering
POLLUTION OF MINING INDUSTRY SULFUR PURIFICATION PLANT AT AL MISHRAQ
...Show More Authors

The Al Mishraq site has been the subject of many scientific studies for the period before and
after the fire in 2003. Five visits to the site were conducted twice in 2003 for general fact-finding, twice
in 2004, and once in 2005 for detailed sampling and monitoring. Desk-based research and laboratory analysis of soil and water samples results indicate that surface water and groundwater pollution from Al Mishraq site was significant at the time of its operation. The primary pollution source was the superheated water injection process, while the principal receptor is the River Tigris. Now that the plant is idle, this source is absent. Following the June 2003 sulphur fire, initial investigations indicate that short damage to
vegeta

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Mar 08 2021
Journal Name
Baghdad Science Journal
An approximate solution for solving linear system of integral equation with application on "Stiff" problems
...Show More Authors

An approximate solution of the liner system of ntegral cquations fot both fredholm(SFIEs)and Volterra(SIES)types has been derived using taylor series expansion.The solusion is essentailly

View Publication Preview PDF
Publication Date
Thu Oct 01 2020
Journal Name
Palarch’s Journal Of Archaeology Of Egypt/egyptology
Delivering an information resources service to users' homes to ensure Healthcare during COVID -19: Case study"
...Show More Authors

ABSTRACT University college libraries are one of the most important information institutions for all researchers during their research and study life, they seeks to provide information sources such as; books, periodicals, theses, databases, Inquiry service and answering questions services in various disciplines to achieve its goals. In 2020, college libraries of all types stepped up to meet the needs of their users' as they responded to the impacts of COVID-19, also extended necessary lifelines to community members facing job losses, healthcare crises, and remote work and learning during an unprecedented and uncertain time. The research aim to identifying the services provided to the postgraduate students users at University of Baghdad coll

... Show More
Preview PDF
Publication Date
Thu Jun 02 2016
Journal Name
Alustath Journal For Human And Social Sciences
Islamic Electronic Libraries and The service for downloading Research and Comic books (PDF): An Evaluation study
...Show More Authors

The research aims to evaluate Islamic electronic libraries and their service for downloading research and illustrated books, explaining their origins, features and types. The research was limited to the libraries available on the Internet that provide the service for downloading research and illustrated books. The researcher relied on the survey approach to identify the libraries and a sample of them (20 libraries) was selected. For the purpose of evaluating it according to five criteria related to the preparation and publication of Islamic electronic libraries (the responsible party, the goals and objectives, the year, the services it provides, the sections and subject specializations of its contents) and five criteria related to the servi

... Show More
View Publication Preview PDF
Publication Date
Mon Aug 01 2011
Journal Name
Journal Of Engineering
DAMAGE DETECTION AND LOCATION FOR IN AND OUT-OFPLANE CURVED BEAMS USING FUZZY LOGIC BASED ON FREQUENCY DIFFERENCE
...Show More Authors

In this study, structures damage identification method based on changes in the dynamic characteristics
(frequencies) of the structure are examined, stiffness as well as mass matrices of the curved
(in and out-of-plane vibration) beam elements is formulated using Hamilton's principle. Each node
of both of them possesses seven degrees of freedom including the warping degree of freedom. The
curved beam element had been derived based on the Kang and Yoo’s thin-walled curved beam theory
in 1994. A computer program was developing to carry out free vibration analyses of the curved
beam as well as straight beam. Comparing with the frequencies for other researchers using the general
purpose program MATLAB. Fuzzy logic syste

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Wed Jan 01 2025
Journal Name
Iv. International Rimar Congress Of Pure, Applied Sciences
A New Intrusion Detection Approach Based on RNA Encoding and K-Means Clustering Algorithm Using KDD-Cup99 Dataset
...Show More Authors

Intrusion detection systems (IDS) are useful tools that help security administrators in the developing task to secure the network and alert in any possible harmful event. IDS can be classified either as misuse or anomaly, depending on the detection methodology. Where Misuse IDS can recognize the known attack based on their signatures, the main disadvantage of these systems is that they cannot detect new attacks. At the same time, the anomaly IDS depends on normal behaviour, where the main advantage of this system is its ability to discover new attacks. On the other hand, the main drawback of anomaly IDS is high false alarm rate results. Therefore, a hybrid IDS is a combination of misuse and anomaly and acts as a solution to overcome the dis

... Show More
Preview PDF
Publication Date
Tue Jul 01 2014
Journal Name
Computer Engineering And Intelligent Systems
Static Analysis Based Behavioral API for Malware Detection using Markov Chain
...Show More Authors

Researchers employ behavior based malware detection models that depend on API tracking and analyzing features to identify suspected PE applications. Those malware behavior models become more efficient than the signature based malware detection systems for detecting unknown malwares. This is because a simple polymorphic or metamorphic malware can defeat signature based detection systems easily. The growing number of computer malwares and the detection of malware have been the concern for security researchers for a large period of time. The use of logic formulae to model the malware behaviors is one of the most encouraging recent developments in malware research, which provides alternatives to classic virus detection methods. To address the l

... Show More