Preferred Language
Articles
/
ijs-4003
Crawling and Mining the Dark Web: A Survey on Existing and New Approaches
...Show More Authors

    The last two decades have seen a marked increase in the illegal activities on the Dark Web. Prompt evolvement and use of sophisticated protocols make it difficult for security agencies to identify and investigate these activities by conventional methods. Moreover, tracing criminals and terrorists poses a great challenge keeping in mind that cybercrimes are no less serious than real life crimes. At the same time, computer security societies and law enforcement pay a great deal of attention on detecting and monitoring illegal sites on the Dark Web. Retrieval of relevant information is not an easy task because of vastness and ever-changing nature of the Dark Web; as a result, web crawlers play a vital role in achieving this task. Thereafter, data mining techniques are applied to extract useful patterns that would help security agencies to limit and get rid of cybercrimes. The aim of this paper is to present a survey for those researchers who are interested in this topic. We started by discussing the internet layers and the properties of the Deep Web, followed by explaining the technical characters of The Onion Routing (TOR) network, and finally describing the approaches of accessing, extracting and processing Dark Web data. Understanding the Dark Web, its properties and its threats is vital for internet servers; we do hope this paper be of help in that goal.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Jan 14 2021
Journal Name
Iraqi Journal Of Science
Efficiently-managed Cloudly-Secured Mobile User Data Sharing Code Implementation
...Show More Authors

Increasing Mobile Device on Cloud Technology will dominate the various industries. Cloud has different data storage and data protecting techniques that based on Data User (DU) and industry’s needs. In this paper, an efficient way of managing user data sharing via Mobile Agent (MA) also called Mobile Proxy (MP) is proposed. The role of Mobile Agent Authorize User to collect the data from Cloud like Proxy and supply data to another Client due to this missing of cloud data is not possible. Instead of access data for all clients, the proxy hold required data and share the customer because of this network reliability, Network Bandwidth, User Congestion, Data Security. Also, this proposed scheme have more functionality like Cloud Authen

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Sun Feb 03 2019
Journal Name
Journal Of The College Of Education For Women
Shaikh Al-Fadhali's Thesis in Parsing the phrase 'No god but Allah' written by Al-Shaikh Saif-el-Deen Atta Abu-el Futouh Al-Wafa'y Al- Fadhali (1020 A.D.)
...Show More Authors

Abstract
Praise be to Allah, The Lord of the worlds, and peace be upon
Muhammad the master of former and latter people, and peace be upon His
relatives, companions and those who followed Him to Judgment day.
After recognizing the prescription which is called (Al- Fadhaly's Thesis in
parsing of "There is no god but God") as it is related with the word of the
investigation of this issue attracted me, as being related with the idea of the
only one God that is mentioned in the prophetic speech, which is said by
Anas- God satisfies him- Who said, Said the Messenger Muhammad peace
be upon him " Goes out of the Hell who said: there is no god but God, and in
his heart a hair weight of charity, and goes out of the He

... Show More
View Publication Preview PDF
Publication Date
Sun Jul 02 2023
Journal Name
Iraqi Journal Of Science
Chemiluminometric- CFIA for the Determination of Cobalt (ll) Ion in Commercial Cobalt-Molybdenum Catalyst (K F124-3E) Used in Desulphurization Processes of Petroleum Products via Multi Gel Beads Reactor.
...Show More Authors

Co(II) ion was determined by a new, accurate, sensitive and rapid method via a
continuous flow injection analysis (CFIA) with a chemiluminescence reaction based on
the oxidation of Luminol which is loaded on poly acrylic acid gel beads by hydrogen
peroxide in presence of Cobalt (II) ion as a chemiluminescence catalyst. Chemical and
physical parameters were investigated to obtain the best conditions. Linear dynamic
range of Cobalt (II) ion was from 0.1-20.0 μg.ml-1 with a correlation coefficient r =
0.9758, limit of detection (L.O.D) 0.2 ng/sample from the step wise dilution of lowest
concentration in the calibration graph with the percentage relative standard deviation for
3 μg.ml-1 Co(ll) solution is 0.8537% (n

... Show More
View Publication Preview PDF
Publication Date
Fri Dec 30 2022
Journal Name
Iraqi Journal Of Science
Solving Adaptive Distributed Routing Algorithm Using Crow Search Algorithm
...Show More Authors

    Crow Search Algorithm (CSA) can be defined as one of the new swarm intelligence algorithms that has been developed lately, simulating the behavior of a crow in a storage place and the retrieval of the additional food when required. In the theory of the optimization, a crow represents a searcher, the surrounding environment represents the search space, and the random storage of food location represents a feasible solution. Amongst all the food locations, the one where the maximum amount of the food is stored is considered as the global optimum solution, and objective function represents the food amount. Through the simulation of crows’ intelligent behavior, the CSA attempts to find the optimum solutions to a variety of the proble

... Show More
View Publication
Scopus Crossref
Publication Date
Wed Sep 12 2018
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Solving Capacitated Vehicle Routing Problem (CVRP) Using Tabu Search Algorithm (TSA)
...Show More Authors

This paper investigates the capacitated vehicle routing problem (CVRP) as it is one of the numerous issues that have no impeccable solutions yet. Numerous scientists in the recent couple of decades have set up various explores and utilized numerous strategies with various methods to deal with it. However, for all researches, finding the least cost is exceptionally complicated. In any case, they have figured out how to think of rough solutions that vary in efficiencies relying upon the search space. Furthermore, tabu search (TS) is utilized to resolve this issue as it is fit for solving numerous complicated issues. The algorithm has been adjusted to resolve the exploration issue, where its methodology is not quite the same as the normal a

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Mon Sep 25 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Novel Approach of Oxidative Coupling Reaction with 1-Naphthol of the Simultaneous Metformin Drug Determination in Either Pharmaceutics Formulations or Environmental Samples of Water Using Homemade CFIA- Merging Zones Techniques
...Show More Authors

A newly developed FIA-merging zones spectrophotometric system, the method is rapid, accurate and sensitive for metformin hydrochloride determination through the oxidation of 1- naphthol by sodium hypochlorite and coupling with metformin.HCl in the presence of sodium hydroxide to form a blue soluble ion pair   and this product was determined using homemade CFIA-Merging zones techniques , at 580 nm. Data treatment shows that linear range is (0.5-35) µg/ ml. The optimization conditions for various chemical and physical conditions of [MTF- NaOCl-α-naphthol-NaOH] system were investigated. The LOD was 0.01µg / ml and LOQ 0.1µg/ml from the lowest concentration of the calibration graph with r2% 99.18 and RSD% did

... Show More
View Publication Preview PDF
Publication Date
Sun Apr 01 2012
Journal Name
2012 International Conference On Future Communication Networks
Efficient method to find the multiplicative inverse in GF (2<sup>m</sup>) using FPGA by exponentiation to (2<sup>k</sup>)
...Show More Authors

Crossref (1)
Crossref
Publication Date
Sun Apr 01 2012
Journal Name
2012 International Conference On Future Communication Networks
Efficient method to find the multiplicative inverse in GF (2<sup>m</sup>) using FPGA by exponentiation to (2<sup>k</sup>)
...Show More Authors

Multiplicative inverse in GF (2 m ) is a complex step in some important application such as Elliptic Curve Cryptography (ECC) and other applications. It operates by multiplying and squaring operation depending on the number of bits (m) in the field GF (2 m ). In this paper, a fast method is suggested to find inversion in GF (2 m ) using FPGA by reducing the number of multiplication operations in the Fermat's Theorem and transferring the squaring into a fast method to find exponentiation to (2 k ). In the proposed algorithm, the multiplicative inverse in GF(2 m ) is achieved by number of multiplications depending on log 2 (m) and each exponentiation is operates in a single clock cycle by generating a reduction matrix for high power of two ex

... Show More
View Publication
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Sun Oct 01 2017
Journal Name
International Journal Of Scientific & Engineering Research
Horizontal Fragmentation for Most Frequency Frequent Pattern Growth Algorithm
...Show More Authors

Abstract: Data mining is become very important at the present time, especially with the increase in the area of information it's became huge, so it was necessary to use data mining to contain them and using them, one of the data mining techniques are association rules here using the Pattern Growth method kind enhancer for the apriori. The pattern growth method depends on fp-tree structure, this paper presents modify of fp-tree algorithm called HFMFFP-Growth by divided dataset and for each part take most frequent item in fp-tree so final nodes for conditional tree less than the original fp-tree. And less memory space and time.

View Publication Preview PDF
Publication Date
Wed May 10 2017
Journal Name
Journal Of The College Of Languages (jcl)
ФОРМИРОВАНИЕ КОММУНИКАТИВНО-РЕЧЕВОЙ КОМПЕТЕНЦИИ СТУДЕНТОВ КАФЕДРЫ Р The formation of verbal communication for students of Russian Language Department at College of Languages at University of Baghdad by using multiple technological means
...Show More Authors

В статье рассматривается вопрос об использовании мультимедийных средств для оптимизации процесса формирования коммуникативной компетенции  в иракской аудитории с привлечением компьютерных технологий. Статья посвящена  использованию мультимедийных технологий  и  различных  приемов формирования интереса к русскому языку. Включение в процесс обучения коммуникативно-значимого, аутентичн

... Show More
View Publication Preview PDF