Preferred Language
Articles
/
OhdOPo8BVTCNdQwCHmXk
Construct an efficient distributed denial of service attack detection system based on data mining techniques
...Show More Authors

<span>Distributed denial-of-service (DDoS) attack is bluster to network security that purpose at exhausted the networks with malicious traffic. Although several techniques have been designed for DDoS attack detection, intrusion detection system (IDS) It has a great role in protecting the network system and has the ability to collect and analyze data from various network sources to discover any unauthorized access. The goal of IDS is to detect malicious traffic and defend the system against any fraudulent activity or illegal traffic. Therefore, IDS monitors outgoing and incoming network traffic. This paper contains a based intrusion detection system for DDoS attack, and has the ability to detect the attack intelligently, dynamically and periodically by evaluating the set of attackers of the current node with its neighbors. We use dataset named CICDDoS2019 that contains on binary classes benign and DDoS. Performance has evaluated by applying data mining algorithms as well as applying the best features to discover potential attack classes.</span>

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Jul 01 2014
Journal Name
Computer Engineering And Intelligent Systems
Static Analysis Based Behavioral API for Malware Detection using Markov Chain
...Show More Authors

Researchers employ behavior based malware detection models that depend on API tracking and analyzing features to identify suspected PE applications. Those malware behavior models become more efficient than the signature based malware detection systems for detecting unknown malwares. This is because a simple polymorphic or metamorphic malware can defeat signature based detection systems easily. The growing number of computer malwares and the detection of malware have been the concern for security researchers for a large period of time. The use of logic formulae to model the malware behaviors is one of the most encouraging recent developments in malware research, which provides alternatives to classic virus detection methods. To address the l

... Show More
Publication Date
Tue Dec 30 2025
Journal Name
Journal Of Baghdad College Of Dentistry
The Influence of Different Fabrication Techniques and Preparation Designs on the Marginal Adaptation of Ceramic Veneers (An In vitro Comparative Study)
...Show More Authors

Background: Ceramic veneers represent the treatment of choice in minimally invasive esthetic dentistry; one of the critical factors in their long term success is marginal adaptation. The aim of the present study is to evaluate the marginal gap of ceramic veneers by using two different fabrication techniques and two different designs of preparation. Material and methods: A typodont maxillary central incisor used in the preparation from which metal dies were fabricated, which were in turn used to make forty stone dies. The dies divided into four experimental groups, each group had ten samples: A1: prepared with butt-joint incisal reduction and restored with IPS e.max CAD, A2: prepared with overlapped incisal reduction and restored with IPS e.

... Show More
View Publication Preview PDF
Publication Date
Sat Mar 01 2025
Journal Name
Iraqi Journal Of Physics
Design an Efficient Neural Network to Determine the Rate of Contamination in the Tigris River in Baghdad City
...Show More Authors

This article proposes a new technique for determining the rate of contamination. First, a generative adversarial neural network (ANN) parallel processing technique is constructed and trained using real and secret images. Then, after the model is stabilized, the real image is passed to the generator. Finally, the generator creates an image that is visually similar to the secret image, thus achieving the same effect as the secret image transmission. Experimental results show that this technique has a good effect on the security of secret information transmission and increases the capacity of information hiding. The metric signal of noise, a structural similarity index measure, was used to determine the success of colour image-hiding t

... Show More
View Publication
Crossref
Publication Date
Fri Jul 01 2022
Journal Name
Journal Of Molecular Structure
Interaction behavior of curcumin encapsulated onto functionalized SBA-15 as an efficient carrier and release in drug delivery
...Show More Authors

In this work, mesoporous silica SBA-15 was prepared and functionalized with amine groups (i.e., NH2) to form NH2/SBA-15. The curcumin (CUR) was encapsulated into the surface and pore of NH2/SBA-15 to create CUR@NH2/SBA-15 as an efficient carrier in drug delivery systems (DDSs). The three samples (i.e., SBA-15, NH2/SBA-15, and CUR@NH2/SBA-15) were characterized. The study investigated the effect of the carrier dose, initial CUR concentration, pH, and contact time on the CUR loading efficiency (DLE%) via adsorption. The best DLE% for the SBA-15 and NH2/SBA-15 were found to be 45% and 89.7%, respectively. The Langmuir isotherm had a greater correlation coefficient (R2) of 0.998 for SBA-15. A pseudo-secondorder kinetic model seemed to fit well

... Show More
View Publication
Scopus (89)
Crossref (87)
Scopus Clarivate Crossref
Publication Date
Thu Jan 01 2015
Journal Name
Journal Of Al-mansoor College
An Improvement to Face Detection Algorithm for Non-Frontal Faces
...Show More Authors

Publication Date
Fri Feb 08 2019
Journal Name
Iraqi Journal Of Laser
Photoacoustic Imaging for Tumor Detection: An in vitro Simulation Study
...Show More Authors

Photoacoustic is a unique imaging method that combines the absorption contrast of light or radio frequency waves with ultrasound resolution. When the deposition of this energy is sufficiently short, a thermo-elastic expansion takes place whereby acoustic waves are generated. These waves can be recorded and stored to construct an image. This work presents experimental procedure of laser photoacoustic two dimensional imaging to detect tumor embedded within normal tissue. The experimental work is accomplished using phantoms that are sandwiched from fish heart or blood sac (simulating a tumor) 1-14mm mean diameter embedded within chicken breast to simulate a real tissue. Nd: YAG laser of 1.064μm and 532nm wavelengths, 10ns pulse duration, 4

... Show More
View Publication Preview PDF
Publication Date
Thu Dec 01 2022
Journal Name
Journal Of Engineering
Deep Learning-Based Segmentation and Classification Techniques for Brain Tumor MRI: A Review
...Show More Authors

Early detection of brain tumors is critical for enhancing treatment options and extending patient survival. Magnetic resonance imaging (MRI) scanning gives more detailed information, such as greater contrast and clarity than any other scanning method. Manually dividing brain tumors from many MRI images collected in clinical practice for cancer diagnosis is a tough and time-consuming task. Tumors and MRI scans of the brain can be discovered using algorithms and machine learning technologies, making the process easier for doctors because MRI images can appear healthy when the person may have a tumor or be malignant. Recently, deep learning techniques based on deep convolutional neural networks have been used to analyze med

... Show More
View Publication Preview PDF
Crossref (11)
Crossref
Publication Date
Mon Feb 01 2016
Journal Name
Journal Of Engineering
The Effect of Cement and Admixture Types on the Resistance of High Performance Concrete to Internal Sulphate Attack
...Show More Authors

This work is concerned with the study of the effect of cement types, particularly OPC and SRPC, which are the main cement types manufactured in Iraq. In addition, study the effect of mineral admixtures, which are HRM and SF on the resistance of high performance concrete (HPC) to internal sulphate attack. The HRM is used at (10%) and SF is used at (8 and 10)% as a partial replacement by weight of cement for both types. The percentages of sulphate investigated are (1,2 and 3)% by adding natural gypsum as a partial replacement by weight of fine aggregate. The tests carried out in this work are: compressive strength, flexural strength, ultrasonic pulse velocity, and density at the age of 7, 28, 90 and 120 days.

The r

... Show More
View Publication Preview PDF
Publication Date
Mon Jun 01 2020
Journal Name
Journal Of Engineering
An An Accurate Estimation of Shear Wave Velocity Using Well Logging Data for Khasib Carbonate Reservoir - Amara Oil Field
...Show More Authors

   

Shear and compressional wave velocities, coupled with other petrophysical data, are vital in determining the dynamic modules magnitude in geomechanical studies and hydrocarbon reservoir characterization. But, due to field practices and high running cost, shear wave velocity may not available in all wells. In this paper, a statistical multivariate regression method is presented to predict the shear wave velocity for Khasib formation - Amara oil fields located in South- East of Iraq using well log compressional wave velocity, neutron porosity and density. The accuracy of the proposed correlation have been compared to other correlations. The results show that, the presented model provides accurate

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jun 01 2016
Journal Name
International Educational Scientific Research Journal
EFFICIENTMETHODSOFIRISRECOGNITION
...Show More Authors

Identification by biological features gets tremendous importance with the increasing of security systems in society. Various types of biometrics like face, finger, iris, retina, voice, palm print, ear and hand geometry, in all these characteristics, iris recognition gaining attention because iris of every person is unique, it never changes during human lifetime and highly protected against damage. This unique feature shows that iris can be good security measure. Iris recognition system listed as a high confidence biometric identification system; mostly it is divide into four steps: Acquisition, localization, segmentation and normalization. This work will review various Iris Recognition systems used by different researchers for each recognit

... Show More
Preview PDF