Preferred Language
Articles
/
ghfcL48BVTCNdQwC-V5h
Nature-inspired optimization algorithms for community detection in complex networks: a review and future trends
...Show More Authors

Scopus Clarivate Crossref
View Publication
Publication Date
Wed Apr 28 2021
Journal Name
2021 1st Babylon International Conference On Information Technology And Science (bicits)
Enhanced Twitter Community Detection using Node Content and Attributes
...Show More Authors

View Publication
Scopus (3)
Crossref (2)
Scopus Crossref
Publication Date
Fri Feb 01 2019
Journal Name
Iraqi Journal Of Information & Communications Technology
Evaluation of DDoS attacks Detection in a New Intrusion Dataset Based on Classification Algorithms
...Show More Authors

Intrusion detection system is an imperative role in increasing security and decreasing the harm of the computer security system and information system when using of network. It observes different events in a network or system to decide occurring an intrusion or not and it is used to make strategic decision, security purposes and analyzing directions. This paper describes host based intrusion detection system architecture for DDoS attack, which intelligently detects the intrusion periodically and dynamically by evaluating the intruder group respective to the present node with its neighbors. We analyze a dependable dataset named CICIDS 2017 that contains benign and DDoS attack network flows, which meets certifiable criteria and is ope

... Show More
View Publication Preview PDF
Crossref (14)
Crossref
Publication Date
Sun Jan 01 2017
Journal Name
Journal Of Sensors
Sequential Monte Carlo Localization Methods in Mobile Wireless Sensor Networks: A Review
...Show More Authors

The advancement of digital technology has increased the deployment of wireless sensor networks (WSNs) in our daily life. However, locating sensor nodes is a challenging task in WSNs. Sensing data without an accurate location is worthless, especially in critical applications. The pioneering technique in range-free localization schemes is a sequential Monte Carlo (SMC) method, which utilizes network connectivity to estimate sensor location without additional hardware. This study presents a comprehensive survey of state-of-the-art SMC localization schemes. We present the schemes as a thematic taxonomy of localization operation in SMC. Moreover, the critical characteristics of each existing scheme are analyzed to identify its advantages

... Show More
View Publication Preview PDF
Scopus (24)
Crossref (16)
Scopus Clarivate Crossref
Publication Date
Sun Feb 02 2025
Journal Name
Engineering, Technology & Applied Science Research
Automated Glaucoma Detection Techniques: A Literature Review
...Show More Authors

Significant advances in the automated glaucoma detection techniques have been made through the employment of the Machine Learning (ML) and Deep Learning (DL) methods, an overview of which will be provided in this paper. What sets the current literature review apart is its exclusive focus on the aforementioned techniques for glaucoma detection using the Preferred Reporting Items for Systematic Reviews and Meta-Analysis (PRISMA) guidelines for filtering the selected papers. To achieve this, an advanced search was conducted in the Scopus database, specifically looking for research papers published in 2023, with the keywords "glaucoma detection", "machine learning", and "deep learning". Among the multiple found papers, the ones focusing

... Show More
View Publication Preview PDF
Scopus (2)
Scopus Crossref
Publication Date
Fri Mar 31 2023
Journal Name
Wasit Journal Of Computer And Mathematics Science
Security In Wireless Sensor Networks Based On Lightweight Algorithms : An Effective Survey
...Show More Authors

At the level of both individuals and companies, Wireless Sensor Networks (WSNs) get a wide range of applications and uses. Sensors are used in a wide range of industries, including agriculture, transportation, health, and many more. Many technologies, such as wireless communication protocols, the Internet of Things, cloud computing, mobile computing, and other emerging technologies, are connected to the usage of sensors. In many circumstances, this contact necessitates the transmission of crucial data, necessitating the need to protect that data from potential threats. However, as the WSN components often have constrained computation and power capabilities, protecting the communication in WSNs comes at a significant performance pena

... Show More
View Publication
Crossref
Publication Date
Thu May 30 2024
Journal Name
Iraqi Journal Of Science
A Review Study on Forgery and Tamper Detection Techniques in Digital Images
...Show More Authors

Digital tampering identification, which detects picture modification, is a significant area of image analysis studies. This area has grown with time with exceptional precision employing machine learning and deep learning-based strategies during the last five years. Synthesis and reinforcement-based learning techniques must now evolve to keep with the research. However, before doing any experimentation, a scientist must first comprehend the current state of the art in that domain. Diverse paths, associated outcomes, and analysis lay the groundwork for successful experimentation and superior results. Before starting with experiments, universal image forensics approaches must be thoroughly researched. As a result, this review of variou

... Show More
View Publication
Scopus Crossref
Publication Date
Wed Jul 01 2015
Journal Name
Al–bahith Al–a'alami
The Role of the Social Networking Site (Facebook) in the Adjustment of Youth Trends / Community Issues and Problems
...Show More Authors

Recent technological developments in the mass media a major paradigm shift in important segments of society, particularly among young people in particular social networking sites including (Facebook) .
it was able to link the sprawling parts of the world and paved the way for all the communities of convergence and exchange views, ideas and desires as provided by their ability to communicate through the use of video clips,pictures,share files, chat, communicate and direct interaction between the audience for this the means. Wondered problem Find the role that can be played using the university youth to the social networking site (Facebook ) to modify their attitudes or their interest in Iraqi society issues, With focused research objec

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Aug 12 2022
Journal Name
Future Internet
Improved DDoS Detection Utilizing Deep Neural Networks and Feedforward Neural Networks as Autoencoder
...Show More Authors

Software-defined networking (SDN) is an innovative network paradigm, offering substantial control of network operation through a network’s architecture. SDN is an ideal platform for implementing projects involving distributed applications, security solutions, and decentralized network administration in a multitenant data center environment due to its programmability. As its usage rapidly expands, network security threats are becoming more frequent, leading SDN security to be of significant concern. Machine-learning (ML) techniques for intrusion detection of DDoS attacks in SDN networks utilize standard datasets and fail to cover all classification aspects, resulting in under-coverage of attack diversity. This paper proposes a hybr

... Show More
View Publication Preview PDF
Scopus (29)
Crossref (22)
Scopus Clarivate Crossref
Publication Date
Tue Mar 14 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Uni and Multivariate Optimization for the Spectrophotometric Determination of Cimetidine Drug via Charge-Transfer Complex Formation
...Show More Authors

  Charge transfer complex formation method has been applied for the spectrophotometric determination of cimetidine, in bulk sample and dosage form. The method was accurate, simple, rapid, inexpensive and sensitive depending on the formed charge- transfer complex between cited drug and, 2,3-Dichloro-5,6-dicyano-p- benzoquinone (DDQ) as a chromogenic reagent. The formed complex shows absorbance maxima at 587 nm against reagent blank. The calibration graph is linear in the ranges of (5.0 - 50.0) µg.mL-1 with detection limit of 0.268µg.mL-1. The results show the absence of interferences from the excipients on the determination of the drug. Therefore the proposed method has been successfully applied for the determination of cimetid

... Show More
View Publication Preview PDF
Publication Date
Sun Jun 02 2019
Journal Name
Baghdad Science Journal
Fog Computing Resource Optimization: A Review on Current Scenarios and Resource Management
...Show More Authors

            The unpredictable and huge data generation nowadays by smart computing devices like (Sensors, Actuators, Wi-Fi routers), to handle and maintain their computational processing power in real time environment by centralized cloud platform is difficult because of its limitations, issues and challenges, to overcome these, Cisco introduced the Fog computing paradigm as an alternative for cloud-based computing. This recent IT trend is taking the computing experience to the next level. It is an extended and advantageous extension of the centralized cloud computing technology. In this article, we tried to highlight the various issues that currently cloud computing is facing. Here

... Show More
View Publication Preview PDF
Scopus (11)
Crossref (5)
Scopus Clarivate Crossref