Preferred Language
Articles
/
joe-2119
Enhancement of the Detection of the TCP SYN Flooding (DDoS) Attack
...Show More Authors

The major of DDoS attacks use TCP protocol and the TCP SYN flooding attack is the most common one among them. The SYN Cookie mechanism is used to defend against the TCP SYN flooding attack. It is an effective defense, but it has a disadvantage of high calculations and it doesn’t differentiate spoofed packets from legitimate packets. Therefore, filtering the spoofed packet can effectively enhance the SYN Cookie activity. Hop Count Filtering (HCF) is another mechanism used at the server side to filter spoofed packets. This mechanism has a drawback of being not a perfect and final solution in defending against the TCP SYN flooding attack. An enhanced mechanism of Integrating and combining the SYN Cookie with Hop Count Filtering (HCF) mechanism is proposed to protect the server from TCP SYN flooding. The results show that the defense against SYN flood DDoS attack is enhanced, since the availability of legitimate packets is increased and the time of SYN Cookie activity is delayed.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Feb 08 2019
Journal Name
Journal Of The College Of Education For Women
Contemporary trends for the treatment of the prisoner in the light of the minimum rules for the treatment of prisoners
...Show More Authors

The issue of the prisoners' rights and the way of dealing with them is not just a minor or
primary issue according to the contemporary attitudes to deal with criminals, but it is a fatal
issue that goes with the development of life and comprehension of human rights. As the
criminal is considered as a human-being who can be reformed and qualified, according to the
aims of the contemporary social service the prisoner is regarded as an idle human source who
can be reformed, treated and qualified so as to make him participate to improve his family and
society in the end.
This study aims at reconstructing the prisons bases when applying the laws of the lowest
level of treatment through the research of oppositions, atti

... Show More
View Publication Preview PDF
Publication Date
Thu Apr 28 2022
Journal Name
Iraqi Journal Of Science
The calculation of the charge density distributions of the 1f-2p shell nuclei using the occupation numbers of the states
...Show More Authors

The charge density distributions (CDD) and the elastic electron scattering form factors, F(q), of the ground state for some 1f-2p shell nuclei, such as 74Ge, 76Ge, 78Se and 80Se nuclei have been calculated based on the use of occupation numbers of the states and the single particle wave functions of the harmonic oscillator potential with size parameters chosen to reproduce the observed root mean square charge radii for all considered nuclei. It is found that introducing additional parameters, namely β1 and β2 which reflect the difference of the occupation numbers of the states from the prediction of the simple shell model leads to a remarkable agreement between the calculated and experimental results of the charge density distributions

... Show More
View Publication Preview PDF
Publication Date
Sun Dec 30 2012
Journal Name
College Of Islamic Sciences
The amusement of the Qur'an shown Of the Prophet, peace and blessings be upon him, the Seal of the Messengers
...Show More Authors

The affliction is a remaining year and not a past incident, and the most evil people are the prophets - peace and blessings be upon them - and the most severe is the Imam of the Prophets Muhammad - may God bless him and grant him peace - because they are exposed to harm from their people because of their call to a religion that violates the religion of parents and grandparents, the religion of injustice and injustice And polytheism and disbelief, and therefore the Qur'an had attitudes towards the entertainment of the people of affliction in general and our beloved - peace be upon him - in particular, this research came about the entertainment of the Qur’an for the Prophet - may God bless him and grant him peace - and many areas of ente

... Show More
View Publication Preview PDF
Publication Date
Mon Oct 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
Role of the evaluation process of the staff in determining the training programs Field research in the Office of the Inspector General of the Ministry of Health / Iraq
...Show More Authors

         The objective of this research is to determine the relationship between the performance evaluation process and the training programs for the employees, to identify the extent of the organization's commitment to perform the performance evaluation process for its employees and to use the results of this process in determining the appropriate training programs. Performance evaluation, functional analysis, evaluation method used, dependent variable (training programs) and its dimensions, type of programs, program objectives, program curriculum, And the application of the field research methodology and the questionnaire, which included 146 individuals to know their views and analyz

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Oct 07 2012
Journal Name
Journal Of Educational And Psychological Researches
The Effect of KWL Strategy on the Achievement of the Students of the fourth class literary in the subject of History and the Development of Cognitive Thinking skills
...Show More Authors

Whereas conventional methods of teaching history do not meet the sometimes purpose has suggested some educators strategies modern help to improve the level of students in the education process through activating prior knowledge and employed in positions of current learning, and focus attention on the points and the outstanding elements of the content and practice techniques Calendar criticof ideas and meanings and mental and linguistic activities used to verify the extent of reaching understanding.                                       &n

... Show More
View Publication Preview PDF
Publication Date
Mon Jan 01 2024
Journal Name
Fifth International Conference On Applied Sciences: Icas2023
A modified Mobilenetv2 architecture for fire detection systems in open areas by deep learning
...Show More Authors

This research describes a new model inspired by Mobilenetv2 that was trained on a very diverse dataset. The goal is to enable fire detection in open areas to replace physical sensor-based fire detectors and reduce false alarms of fires, to achieve the lowest losses in open areas via deep learning. A diverse fire dataset was created that combines images and videos from several sources. In addition, another self-made data set was taken from the farms of the holy shrine of Al-Hussainiya in the city of Karbala. After that, the model was trained with the collected dataset. The test accuracy of the fire dataset that was trained with the new model reached 98.87%.

Scopus Crossref
Publication Date
Sat Sep 30 2023
Journal Name
Iraqi Journal Of Science
Hybrid CNN-SMOTE-BGMM Deep Learning Framework for Network Intrusion Detection using Unbalanced Dataset
...Show More Authors

This paper proposes a new methodology for improving network security by introducing an optimised hybrid intrusion detection system (IDS) framework solution as a middle layer between the end devices. It considers the difficulty of updating databases to uncover new threats that plague firewalls and detection systems, in addition to big data challenges. The proposed framework introduces a supervised network IDS based on a deep learning technique of convolutional neural networks (CNN) using the UNSW-NB15 dataset. It implements recursive feature elimination (RFE) with extreme gradient boosting (XGB) to reduce resource and time consumption. Additionally, it reduces bias toward

... Show More
View Publication Preview PDF
Scopus (3)
Scopus Crossref
Publication Date
Tue Nov 01 2022
Journal Name
Inorganic Chemistry Communications
Sarin chemical warfare agent detection by Sc-decorated XN nanotubes (X = Al or Ga)
...Show More Authors

In order to scrutinize the impact of the decoration of Sc upon the sensing performance of an XN nanotube (X = Al or Ga, and XNNT) in detecting sarin (SN), the density functionals M06-2X, τ-HCTHhyb, and B3LYP were utilized. The interaction of the pristine XNNT with SN was a physical adsorption with the sensing response (SR) of approximately 5.4. Decoration of the Sc metal into the surface of the AlN and GaN led to an increase in the adsorption energy of SN from −3.4 to −18.9, and −3.8 to −20.1 kcal/mol, respectively. Also, there was a significant increase in the corresponding SR to 38.0 and 100.5, the sensitivity of metal decorated XNNT (metal@XNNT) is increased. So, we found that Sc-decorating more increases the sensitivity of GaNN

... Show More
View Publication
Scopus (1)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Tue Sep 01 2020
Journal Name
Baghdad Science Journal
Developing Arabic License Plate Recognition System Using Artificial Neural Network and Canny Edge Detection
...Show More Authors

In recent years, there has been expanding development in the vehicular part and the number of vehicles moving on the roads in all the sections of the country. Arabic vehicle number plate identification based on image processing is a dynamic area of this work; this technique is used for security purposes such as tracking of stolen cars and access control to restricted areas. The License Plate Recognition System (LPRS) exploits a digital camera to capture vehicle plate numbers is used as input to the proposed recognition system. Basically, the proposed system consists of three phases, vehicle license plate localization, character segmentation, and character recognition, the License Plate (LP) detection is presented using canny edge detection

... Show More
Publication Date
Tue Jan 31 2023
Journal Name
International Journal Of Nonlinear Analysis And Applications
Survey on intrusion detection system based on analysis concept drift: Status and future directions
...Show More Authors

Nowadays, internet security is a critical concern; the One of the most difficult study issues in network security is "intrusion detection". Fight against external threats. Intrusion detection is a novel method of securing computers and data networks that are already in use. To boost the efficacy of intrusion detection systems, machine learning and deep learning are widely deployed. While work on intrusion detection systems is already underway, based on data mining and machine learning is effective, it requires to detect intrusions by training static batch classifiers regardless considering the time-varying features of a regular data stream. Real-world problems, on the other hand, rarely fit into models that have such constraints. Furthermor

... Show More
View Publication