Preferred Language
Articles
/
kBflL48BVTCNdQwC2V4k
EXAM QUESTIONS CLASSIFICATION BASED ON BLOOM’S TAXONOMY COGNITIVE LEVEL USING CLASSIFIERS COMBINATION
...Show More Authors

Scopus
Preview PDF
Quick Preview PDF
Publication Date
Sat Feb 25 2017
Journal Name
International Journal On Advanced Science, Engineering And Information Technology
A Novel DNA Sequence Approach for Network Intrusion Detection System Based on Cryptography Encoding Method
...Show More Authors

A novel method for Network Intrusion Detection System (NIDS) has been proposed, based on the concept of how DNA sequence detects disease as both domains have similar conceptual method of detection. Three important steps have been proposed to apply DNA sequence for NIDS: convert the network traffic data into a form of DNA sequence using Cryptography encoding method; discover patterns of Short Tandem Repeats (STR) sequence for each network traffic attack using Teiresias algorithm; and conduct classification process depends upon STR sequence based on Horspool algorithm. 10% KDD Cup 1999 data set is used for training phase. Correct KDD Cup 1999 data set is used for testing phase to evaluate the proposed method. The current experiment results sh

... Show More
View Publication
Scopus (9)
Crossref (5)
Scopus Crossref
Publication Date
Fri Sep 01 2023
Journal Name
Journal Of Engineering
Impact of Sulfate in the Sand on the Compressive Strength of Metakaolin-Based Geopolymer Mortar
...Show More Authors

The advancement of cement alternatives in the construction materials industry is fundamental to sustainable development. Geopolymer is the optimal substitute for ordinary Portland cement, which produces 80% less CO2 emissions than ordinary Portland cement. Metakaolin was used as one of the raw materials in the geopolymerization process. This research examines the influence of three different percentages of sulfate (0.00038, 1.532, and 16.24) % in sand per molarity of NaOH on the compressive strength of metakaolin-based geopolymer mortar (MK-GPM). Samples were prepared with two different molarities (8M and 12M) and cured at room temperature. The best compressive strength value (56.98MPa) was recorded with 12M w

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Dec 27 2020
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Analysis of Docetaxel Adverse Drug Reactions: A Retrospective Study Based on Iraqi Pharmacovigilance Center Database
...Show More Authors

Docetaxel is an effective treatment approved for many types of cancers, but its effectiveness in clinical practice can be compromised by significant occurrence of adverse drug reactions. The aim of the current study was to measure the distribution of adverse drug reactions of docetaxel reported in Iraq and to assess the causality, severity, seriousness, preventability, expectedness and outcome of these adverse reactions. A retrospective study conducted on individual case safety reports from the Iraqi Pharmacovigilance Center / Ministry of Health. The study included 118 individual case safety report containing 236 adverse drug reactions.
Most of the adverse drug reactions were related to skin and subcutaneous tissue disorders(26.7%), f

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Wed Aug 31 2022
Journal Name
Ieee Access
SHE Networks: Security, Health, and Emergency Networks Traffic Priority Management Based on ML and SDN
...Show More Authors

Recently, the increasing demand to transfer data through the Internet has pushed the Internet infrastructure to the nal edge of the ability of these networks. This high demand causes a deciency of rapid response to emergencies and disasters to control or reduce the devastating effects of these disasters. As one of the main cornerstones to address the data trafc forwarding issue, the Internet networks need to impose the highest priority on the special networks: Security, Health, and Emergency (SHE) data trafc. These networks work in closed and private domains to serve a group of users for specic tasks. Our novel proposed network ow priority management based on ML and SDN fullls high control to give the required ow priority to SHE dat

... Show More
View Publication
Scopus (12)
Crossref (13)
Scopus Clarivate Crossref
Publication Date
Thu Feb 24 2022
Journal Name
Journal Of Educational And Psychological Researches
The Academic Problems of Family Counseling Diploma Students At Saudi Universities based on some Variables
...Show More Authors

The research aims to identify the academic problems of family counseling diploma students at Saudi Universities. In addition, to identify the differences in these problems according to gender, marital status, place of study, academic specialization, and GPA. The sample consisted of (491) students. The researcher has used one questionnaire for academic problems prepared by the researcher.  The research revealed the following results: There were academic problems among family counseling diploma students at Saudi Universities, the most problems were related to the systems and administrations of the university, then the field training, the buildings, classrooms and campus facilities, then the academic courses, after that the exams, then

... Show More
View Publication Preview PDF
Publication Date
Fri Aug 20 2021
Journal Name
Iraqi Journal Of Laser
Design of Tunable Optical Band Pass Filter based on in-Line PM-Mach Zehnder Interferometer
...Show More Authors

In this paper, tunable optical band-pass filters based on Polarization Maintaining Fiber –Mach Zehnder Interferometer presented. Tunability of the band-pass filter implemented by applying different mechanical forces N on the micro-cavities splicing regions (MCSRs). The micro-cavity formed by using three variable-lengths of single-mode polarization-maintaining fiber with (8, 16, 24) cm lengths, splice between two segments of (SMF-28) with (26, 13) cm lengths, using the fusion splicing technique.  Ellipsoidal shape micro-cavities experimentally achieved parallel to the propagation axis having dimensions between (12-24) μm of width and   (4-12) μm of length. A micro-cavity with width and length as high as 24 μm and 12 μ

... Show More
View Publication Preview PDF
Publication Date
Sun Dec 09 2018
Journal Name
Baghdad Science Journal
Proposing an Analysis System to Monitoring Weightlifting Based on Training (Snatch and Clean and Jerk)
...Show More Authors

Analysis system of sports players is very important for individuals in weightlifting. Assessment of player and strength is important for the performance of weightlifting. This paper proposes an analytical method for weightlifters with check-by-frame video. This analysis system can compute the major steps of seven positions in both snatch and clean and jerk methods in frame-video weightlifting monitoring of movements. Each user can compute the major steps of the seven positions of Hu moments among two frames in the video during training, and the Euclidian distance can be computed for the Hu moment values and lifting moment values in the snatch and clean and jerk methods during training. The outcome of the proposed system shows on efficien

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Sat Jan 01 2022
Journal Name
Indonesian Journal Of Electrical Engineering And Computer Science
Construct an efficient distributed denial of service attack detection system based on data mining techniques
...Show More Authors

<span>Distributed denial-of-service (DDoS) attack is bluster to network security that purpose at exhausted the networks with malicious traffic. Although several techniques have been designed for DDoS attack detection, intrusion detection system (IDS) It has a great role in protecting the network system and has the ability to collect and analyze data from various network sources to discover any unauthorized access. The goal of IDS is to detect malicious traffic and defend the system against any fraudulent activity or illegal traffic. Therefore, IDS monitors outgoing and incoming network traffic. This paper contains a based intrusion detection system for DDoS attack, and has the ability to detect the attack intelligently, dynami

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (2)
Scopus Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Communications In Computer And Information Science
Enhancing the Performance of Wireless Body Area Network Routing Protocols Based on Collaboratively Evaluated Values
...Show More Authors

Wireless Body Area Sensor Network (WBASN) is gaining significant attention due to its applications in smart health offering cost-effective, efficient, ubiquitous, and unobtrusive telemedicine. WBASNs face challenges including interference, Quality of Service, transmit power, and resource constraints. Recognizing these challenges, this paper presents an energy and Quality of Service-aware routing algorithm. The proposed algorithm is based on each node's Collaboratively Evaluated Value (CEV) to select the most suitable cluster head (CH). The Collaborative Value (CV) is derived from three factors, the node's residual energy, the distance vector between nodes and personal device, and the sensor's density in each CH. The CEV algorithm operates i

... Show More
View Publication
Scopus Crossref
Publication Date
Tue Dec 10 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
Development of Robust and Efficient Symmetric Random Keys Model based on the Latin Square Matrix
...Show More Authors

Symmetric cryptography forms the backbone of secure data communication and storage by relying on the strength and randomness of cryptographic keys. This increases complexity, enhances cryptographic systems' overall robustness, and is immune to various attacks. The present work proposes a hybrid model based on the Latin square matrix (LSM) and subtractive random number generator (SRNG) algorithms for producing random keys. The hybrid model enhances the security of the cipher key against different attacks and increases the degree of diffusion. Different key lengths can also be generated based on the algorithm without compromising security. It comprises two phases. The first phase generates a seed value that depends on producing a rand

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref