Preferred Language
Articles
/
joe-2119
Enhancement of the Detection of the TCP SYN Flooding (DDoS) Attack
...Show More Authors

The major of DDoS attacks use TCP protocol and the TCP SYN flooding attack is the most common one among them. The SYN Cookie mechanism is used to defend against the TCP SYN flooding attack. It is an effective defense, but it has a disadvantage of high calculations and it doesn’t differentiate spoofed packets from legitimate packets. Therefore, filtering the spoofed packet can effectively enhance the SYN Cookie activity. Hop Count Filtering (HCF) is another mechanism used at the server side to filter spoofed packets. This mechanism has a drawback of being not a perfect and final solution in defending against the TCP SYN flooding attack. An enhanced mechanism of Integrating and combining the SYN Cookie with Hop Count Filtering (HCF) mechanism is proposed to protect the server from TCP SYN flooding. The results show that the defense against SYN flood DDoS attack is enhanced, since the availability of legitimate packets is increased and the time of SYN Cookie activity is delayed.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Sep 25 2021
Journal Name
International Journal Of Drug Delivery Technology
Phytochemical investigation of some active components in Iraqi conyza canadensis (Syn. erigeron canadensis)
...Show More Authors

This study aimed to explore and separate the phytochemicals of the whole plant Conyza canadensis, a naturally growing plant in Iraq, since no phytochemical research was done previously in Iraq. The whole plant of C. canadensis was defatted by maceration in hexane for 24 hours. The defatted plant materials were extracted using Soxhlet apparatus, the aqueous ethanol 85% as a solvent extraction for 9 hours, and fractionated by petroleum ether, chloroform, ethyl acetate, and n-butanol. The petroleum ether, chloroform, and ethyl acetate fractions were analyzed by high-performance liquid chromatography (HPLC) for their steroids, alkaloids, and polyphenolic (phenolic acids and flavonoids) contents. One alkaloid was isolated from chloroform fractio

... Show More
Scopus (9)
Scopus
Publication Date
Mon Feb 27 2023
Journal Name
Applied Sciences
Comparison of ML/DL Approaches for Detecting DDoS Attacks in SDN
...Show More Authors

Software-defined networking (SDN) presents novel security and privacy risks, including distributed denial-of-service (DDoS) attacks. In response to these threats, machine learning (ML) and deep learning (DL) have emerged as effective approaches for quickly identifying and mitigating anomalies. To this end, this research employs various classification methods, including support vector machines (SVMs), K-nearest neighbors (KNNs), decision trees (DTs), multiple layer perceptron (MLP), and convolutional neural networks (CNNs), and compares their performance. CNN exhibits the highest train accuracy at 97.808%, yet the lowest prediction accuracy at 90.08%. In contrast, SVM demonstrates the highest prediction accuracy of 95.5%. As such, an

... Show More
View Publication
Scopus (15)
Crossref (14)
Scopus Clarivate Crossref
Publication Date
Tue Nov 07 2017
Journal Name
Spe Symposium: Production Enhancement And Cost Optimisation
Wettability Alteration of Carbonate Rocks via Nanoparticle-Anionic Surfactant Flooding at Reservoirs Conditions
...Show More Authors

Nanofluids, liquid suspensions of nanoparticles (NPs) dispersed in deionized (DI) water, brine, or surfactant micelles, have become a promising solution for many industrial applications including enhanced oil recovery (EOR) and carbon geostorage. At ambient conditions, nanoparticles can effectively alter the wettability of the strongly oil-wet rocks to water-wet. However, the reservoir conditions present the greatest challenge for the success of this application at the field scale. In this work, the performance of anionic surfactant-silica nanoparticle formulation on wettability alteration of oil-wet carbonate surface at reservoir conditions was investigated. A high-pressure temperature vessel was used to apply nano-modification of oil-wet

... Show More
Scopus (38)
Crossref (18)
Scopus Crossref
Publication Date
Sun Jan 19 2025
Journal Name
University Of Anbar Sport And Physical Education Science Journal
The study of comparing the cognitive teaching method effect ( total and analytic ) in teaching the counter- attack of Epee
...Show More Authors

The research's aim is to place two teaching methods ( total and analytical method) and to know which one of them is better than the other in teaching the counter-attack with Epee. The researchers have used the experimental method for being considered suitable to solve the problem of the research. The sample of the research includes third –stage female students of college of physical education and sport sciences / Baghdad University in the subject of fencing, their number amounted 60 female students. It has been used SPSS for processing the results. They have concluded that the two groups of the research and the two methods (( total and analytical) have learnt the counter- attack of the two over mentioned groups. they have recommended to c

... Show More
View Publication
Publication Date
Tue Jun 01 2021
Journal Name
Journal Of Engineering
Numerical Study for HAWT Wake shape with different Angles of Attack
...Show More Authors

Increasing world demand for renewable energy resources as wind energy was one of the goals behind research optimization of energy production from wind farms. Wake is one of the important phenomena in this field. This paper focuses on understanding the effect of angle of attack (α) on wake characteristics behind single horizontal axis wind turbines (HAWT). This was done by design three rotors different from each other in value of α used in the rotor design process. Values of α were (4.8˚,9.5˚,19˚). The numerical simulations were conducted using Ansys Workbench 19- Fluent code; the used turbulence model was (k-ω SST). The results showed that best value for extracted wind energy was at α=19˚, spread distance of wak

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Aug 01 2015
Journal Name
Journal Of Engineering
Influence of Internal Sulfate Attack on Some Properties of High Strength Concrete
...Show More Authors

One of the most important problems that faces the concrete industry in Iraq is the deterioration due to internal sulfate attack , since it  reduces the compressive strength and increases the expansion of concrete. Consequently, the concrete structure may be damage .The effects of total and total effective sulfate contents on high strength concrete (HSC) have been studied in the present study.

The research studied the effect of sulfate content in cement , sand and gravel , as well as comparing  the total sulfate content with the total effective SO3 content. Materials used were divided into two groups of SO3 in cement ,three groups of SO3 in sand ,and two groups of SO

... Show More
View Publication Preview PDF
Publication Date
Sat Aug 01 2015
Journal Name
Journal Of Engineering
Influence of Internal Sulfate Attack on Some Properties of High Strength Concrete
...Show More Authors

One of the most important problems that faces the concrete industry in Iraq is the deterioration due to internal sulfate attack , since it reduces the compressive strength and increases the expansion of concrete. Consequently, the concrete structure may be damage .The effects of total and total effective sulfate contents on high strength concrete (HSC) have been studied in the present study. The research studied the effect of sulfate content in cement , sand and gravel , as well as comparing the total sulfate content with the total effective SO3 content. Materials used were divided into two groups of SO3 in cement ,three groups of SO3 in sand ,and two groups of SO3 in gravel. The results show that considering the total effective sulfate con

... Show More
Preview PDF
Publication Date
Thu Jun 30 2022
Journal Name
Sports Culture
Analysis of the kinetic path of some physical measurements and kinetic abilities in terms of the direct attack in the foil
...Show More Authors

Through the researchers' acquaintance with the previous studies, the problem was identified as that the preparation of training curricula in all its units must be based on accurate scientific foundations. Positively affect the type of attack and its implication in the presence of correlational relations, whether direct or indirect, i.e., precedence in training and in preparing units Therefore, the researcher decided to build a causal model to know the relationships to show the best model of the direct straight attack. The study aimed to build a causal model for the most important physical measurements and kinetic capabilities of the direct straight attack in the research sample. The two researchers used the descriptive approach in t

... Show More
View Publication
Crossref (4)
Crossref
Publication Date
Sun Jan 01 2017
Journal Name
Spe/iatmi Asia Pacific Oil & Gas Conference And Exhibition
Influence of miscible CO2 flooding on wettability and asphaltene precipitation in Indiana Lime Stone
...Show More Authors

Carbon dioxide (CO2) flooding is an EOR technique in which carbon dioxide is injected into the reservoir to improve the oil recovery. The reservoir oil and rock properties are altered when carbon dioxide interacts with the oil and rock present in the reservoir. Carbon dioxide injection alters the oil and rock properties by causing reduction in oil viscosity, oil swelling and wettability alteration of the rock. This paper will present a proposal to study the wettability alteration in carbonate formations during miscible carbon dioxide flooding. In miscible carbon dioxide flooding, the injection pressure of carbon dioxide would be kept above the minimum miscibility pressure. Thus carbon dioxide is miscible with the oil present in the reservoi

... Show More
Publication Date
Thu Jun 23 2022
Journal Name
American Scientific Research Journal For Engineering, Technology, And Sciences
A Review of TCP Congestion Control Using Artificial Intelligence in 4G and 5G Networks
...Show More Authors

In recent years, the field of research around the congestion problem of 4G and 5G networks has grown, especially those based on artificial intelligence (AI). Although 4G with LTE is seen as a mature technology, there is a continuous improvement in the infrastructure that led to the emergence of 5G networks. As a result of the large services provided in industries, Internet of Things (IoT) applications and smart cities, which have a large amount of exchanged data, a large number of connected devices per area, and high data rates, have brought their own problems and challenges, especially the problem of congestion. In this context, artificial intelligence (AI) models can be considered as one of the main techniques that can be used to solve ne

... Show More
View Publication