Preferred Language
Articles
/
OhdOPo8BVTCNdQwCHmXk
Construct an efficient distributed denial of service attack detection system based on data mining techniques
...Show More Authors

<span>Distributed denial-of-service (DDoS) attack is bluster to network security that purpose at exhausted the networks with malicious traffic. Although several techniques have been designed for DDoS attack detection, intrusion detection system (IDS) It has a great role in protecting the network system and has the ability to collect and analyze data from various network sources to discover any unauthorized access. The goal of IDS is to detect malicious traffic and defend the system against any fraudulent activity or illegal traffic. Therefore, IDS monitors outgoing and incoming network traffic. This paper contains a based intrusion detection system for DDoS attack, and has the ability to detect the attack intelligently, dynamically and periodically by evaluating the set of attackers of the current node with its neighbors. We use dataset named CICDDoS2019 that contains on binary classes benign and DDoS. Performance has evaluated by applying data mining algorithms as well as applying the best features to discover potential attack classes.</span>

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Nov 28 2018
Journal Name
International Journal Of Engineering &amp; Technology
Using Polyurethane Coating of Concrete Pipes with Acid Attack Resistance in Sewer Lines
...Show More Authors

One of the most important challenges facing the designers of the sewerage system is the corrosion of sewers due to the influence of sewerage contaminates which lead to failure of the main lines of sewers. In this study, a reference mix of 1: 1.5: 3 was used and the 4% Flocrete PC200 by weight of cement was added to the same mixing ratio in the second mixture. Twenty-four samples were tested for each mixture, 12 of which were used to compression strength test in ages (7, 14 and 28) day and six samples were submerged after 28 days of wet treatment at (5 and 10) % concentrations of sulfuric acid. The other six samples were painted after 28 days of wet treatment with coating Polyurethane and after 24 hours were flooded with a concentrat

... Show More
View Publication
Crossref
Publication Date
Wed Mar 18 2020
Journal Name
International Journal Of Research In Social Sciences And Humanities
THE ROLE OF ELECTRONIC-PAYMENT SERVICE PROVIDERS IN THE DEVELOPMENT OF E-BANKING IN IRAQ - AN APPLIED RESEARCH IN CENTRAL BANK OF IRAQ
...Show More Authors

THE ROLE OF ELECTRONIC-PAYMENT SERVICE PROVIDERS IN THE DEVELOPMENT OF E-BANKING IN IRAQ - AN APPLIED RESEARCH IN CENTRAL BANK OF IRAQ

View Publication
Crossref
Publication Date
Tue Dec 05 2023
Journal Name
Baghdad Science Journal
Robust Color Image Encryption Scheme Based on RSA via DCT by Using an Advanced Logic Design Approach
...Show More Authors

Information security in data storage and transmission is increasingly important. On the other hand, images are used in many procedures. Therefore, preventing unauthorized access to image data is crucial by encrypting images to protect sensitive data or privacy. The methods and algorithms for masking or encoding images vary from simple spatial-domain methods to frequency-domain methods, which are the most complex and reliable. In this paper, a new cryptographic system based on the random key generator hybridization methodology by taking advantage of the properties of Discrete Cosine Transform (DCT) to generate an indefinite set of random keys and taking advantage of the low-frequency region coefficients after the DCT stage to pass them to

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (1)
Scopus Crossref
Publication Date
Fri Mar 31 2017
Journal Name
Al-khwarizmi Engineering Journal
Design an Integral Sliding Mode Controller for a Nonlinear System
...Show More Authors

The goal of this paper is to design a robust controller for controlling a pendulum
system. The control of nonlinear systems is a common problem that is facing the researchers in control systems design. The Sliding Mode Controller (SMC) is the best solution for controlling a nonlinear system. The classical SMC consists from two phases. The first phase is the reaching phase and the second is the sliding phase. The SMC suffers from the chattering phenomenon which is considered as a severe problem and undesirable property. It is a zigzag motion along the switching surface. In this paper, the chattering is reduced by using a saturation function instead of sign function. In spite of SMC is a good method for controlling a nonlinear system b

... Show More
View Publication Preview PDF
Crossref (8)
Crossref
Publication Date
Wed Sep 14 2016
Journal Name
Journal Of Baghdad College Of Dentistry
Microleakage of Pit and Fissure Sealants after Using Different Occlusal Surface Preparation Techniques: An In Vitro Study
...Show More Authors

Background: The marginal seal is essential for sealant success because penetration of bacteria under the sealant might allow caries onset or progression. The aim of the present study was to estimate and compare the microleakage of pit and fissure sealant after various methods of occlusal surface preparation. Materials and methods: Thirty non-carious premolars extracted for orthodontic reasons were equally divided into three groups. In group one, occlusal fissures were opened with round carbide bur, in group two, occlusal surfaces of the teeth were cleaned with a dry pointed bristle brush and samples of group three were cleaned with a slurry of fine flour of pumice in water using rubber cup. Then fissures of all teeth were etched using 35% p

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Dec 01 2022
Journal Name
Baghdad Science Journal
Distributed Heuristic Algorithm for Migration and Replication of Self-organized Services in Future Networks
...Show More Authors

Nowadays, the mobile communication networks have become a consistent part of our everyday life by transforming huge amount of data through communicating devices, that leads to new challenges. According to the Cisco Networking Index, more than 29.3 billion networked devices will be connected to the network during the year 2023. It is obvious that the existing infrastructures in current networks will not be able to support all the generated data due to the bandwidth limits, processing and transmission overhead. To cope with these issues, future mobile communication networks must achieve high requirements to reduce the amount of transferred data, decrease latency and computation costs. One of the essential challenging tasks in this subject

... Show More
View Publication Preview PDF
Scopus (2)
Scopus Clarivate Crossref
Publication Date
Fri Jan 01 2021
Journal Name
E3s Web Of Conferences
Behavioral Investigation of Reinforced Concrete T-Beams with Distributed Reinforcement in the Tension Flange
...Show More Authors

Current design codes and specifications allow for part of the bonded flexure tension reinforcement to be distributed over an effective flange width when the T-beams' flanges are in tension. This study presents an experimental and numerical investigation on the reinforced concrete flanged section's flexural behavior when reinforcement in the tension flange is laterally distributed. To achieve the goals of the study, numerical analysis using the finite element method was conducted on discretized flanged beam models validated via experimentally tested T-beam specimen. Parametric study was performed to investigate the effect of different parameters on the T-beams flexural behavior. The study revealed that a significant reduction in the

... Show More
View Publication
Scopus (3)
Crossref (4)
Scopus Crossref
Publication Date
Thu Jun 15 2017
Journal Name
Journal Of Baghdad College Of Dentistry
The effect of nano-hydroxy apatite on re-mineralize white spot lesions prior to orthodontic adhesive removal by different techniques (An In vitro comparative study)
...Show More Authors

Background: White-spot lesion is one of the problems associated with the fixed orthodontic treatment. The aims of this in-vitro study were to investigate enamel damage depth on adhesive removal when the adhesive were surrounded by sound, demineralized or demineralized enamel that had been re-mineralized prior to adhesive removal using 10% Nano-Hydroxy apatite and to determine the effect of three different adhesive removal techniques. Materials and methods: Composite resin adhesive (3M Unitek) was bonded to 60 human upper premolars teeth which were randomly divided in to three groups each containing ten sound teeth and ten teeth with demineralized and re-mineralized lesions adjacent to the adhesive. A window of 2 mm was prepared on the bucca

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Mon Dec 01 2014
Journal Name
Journal Of Economics And Administrative Sciences
the response to service marketing failure
...Show More Authors

Because of the tremendous changes in the business environment and significant growth in living standards, increased demand for services in general and about the realized practitioners in the field of service that traditional marketing strategies and models administrative based solutions to mono as the price alone does not lead to the desired outcomes with customers and even organizations as it does not apply always for the manufacture of their services unique . therefore , the need to learn marketing service order and a clear and critical to avoid failures in service and the marketing document to knowledge would avoid the organization that the failure in the delivery of service and enhances the desired response to fix it in a tim

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Dec 01 2022
Journal Name
Baghdad Science Journal
Using Graph Mining Method in Analyzing Turkish Loanwords Derived from Arabic Language
...Show More Authors

Loanwords are the words transferred from one language to another, which become essential part of the borrowing language. The loanwords have come from the source language to the recipient language because of many reasons. Detecting these loanwords is complicated task due to that there are no standard specifications for transferring words between languages and hence low accuracy. This work tries to enhance this accuracy of detecting loanwords between Turkish and Arabic language as a case study. In this paper, the proposed system contributes to find all possible loanwords using any set of characters either alphabetically or randomly arranged. Then, it processes the distortion in the pronunciation, and solves the problem of the missing lette

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (4)
Scopus Clarivate Crossref