Preferred Language
Articles
/
oRf6Po8BVTCNdQwC6WUP
Evaluation of DDoS attacks Detection in a New Intrusion Dataset Based on Classification Algorithms
...Show More Authors

Intrusion detection system is an imperative role in increasing security and decreasing the harm of the computer security system and information system when using of network. It observes different events in a network or system to decide occurring an intrusion or not and it is used to make strategic decision, security purposes and analyzing directions. This paper describes host based intrusion detection system architecture for DDoS attack, which intelligently detects the intrusion periodically and dynamically by evaluating the intruder group respective to the present node with its neighbors. We analyze a dependable dataset named CICIDS 2017 that contains benign and DDoS attack network flows, which meets certifiable criteria and is openly accessible. It evaluates the performance of a complete arrangement of machine learning algorithms and network traffic features to indicate the best features for detecting the assured attack classes. Our goal is storing the address of destination IP that is utilized to detect an intruder by method of misuse detection.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Mar 29 2017
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Development and in vitro Evaluation of Bioadhesive Vaginal Tablet using Econazole Nitrate as a Model Drug
...Show More Authors

         In this study, a bioadhesive dosage form of eoconazole nitrate for vaginal delivery was designed using a combination of bioadhesive polymers: Carbopol 941 p and sodium carboxymethylcellulose or methylcellulose in different ratios. The bioadhesive strength was evaluated by measuring the force required to detach the tablet from sheep vaginal mucosal membrane. It was found that the bioadhesive force was directly proportional to Carbopol 941 p content in the different formulae. The formulae were tested for their swelling behavior using agar gel plate method. The results showed that formulae containing a combination of Carbopol 941 p and sodium carboxymethylcellulose had greater swelling index

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Feb 10 2019
Journal Name
Drug Invention Today
Design, characterization, and in vitro evaluation of zaltoprofen solid dispersion as a hollow-type rectal suppository
...Show More Authors

Aim: The present study aims to improve the poor water solubility of zaltoprofen which is a non-steroidal anti-inflammatory drug (NSAIDs) with a potent analgesic effect using solid dispersion then formulate it as a hollow type suppository to be more convenient for geriatric patients. Materials and Method: Zaltoprofen solid dispersions were prepared by solvent evaporation technique in different zaltoprofen: Soluplus® ratios. Results: Among the formulations tested, zaltoprofen solid dispersion preparation using 1:5 (zaltoprofen: Soluplus®) ratio showed the highest solubility and selected for further investigation. Solid dispersion characterization was evaluated by differential scanning calorimetry (DSC), X-ray diffraction study (XRD) and Fou

... Show More
View Publication
Publication Date
Sun Jun 06 2021
Journal Name
Engineering, Technology & Applied Science Research
Evaluation of the Variation in Dynamic Load Factor Throughout a Highly Skewed Steel I-Girder Bridge
...Show More Authors

The Dynamic Load Factor (DLF) is defined as the ratio between the maximum dynamic and static responses in terms of stress, strain, deflection, reaction, etc. DLF adopted by different design codes is based on parameters such as bridge span length, traffic load models, and bridge natural frequency. During the last decades, a lot of researches have been made to study the DLF of simply supported bridges due to vehicle loading. On the other hand, fewer works have been reported on continuous bridges especially with skew supports. This paper focuses on the investigation of the DLF for a highly skewed steel I-girder bridge, namely the US13 Bridge in Delaware State, USA. Field testing under various load passes of a weighed load vehicle was u

... Show More
View Publication
Crossref (4)
Crossref
Publication Date
Thu Feb 13 2025
Journal Name
Journal Of Baghdad College Of Dentistry
An Evaluation of Olive Oil as a Separating Medium and Its Effect on Some Mechanical Properties of Processed Acrylic Resin Denture Base (A Comparative Study). Part Two
...Show More Authors

Background: During acrylic resin processing, the mold must be separated from the surface of the gypsum to prevent liquid resin from penetrating into the gypsum, and water from the gypsum seeping into the acrylic resin. For many years, tin foil was the most acceptable separating medium, and because it's difficult to apply, a tin-foil substitute is used. In this study, olive oil is used as an alternative to tin foil separating medium for first time, and evaluating its effect as a separating medium on some mechanical properties such as (indentation hardness and transverse strength) of acrylic resins denture base comparing it with those processed using tin-foil and tin foil substitute such as (cold mold seal) separating medium. Materials and M

... Show More
View Publication Preview PDF
Publication Date
Wed Aug 11 2021
Journal Name
International Journal Of Pharmaceutical Research
Evaluation of Serum Adropin Levels in Nonalcoholic Fatty Liver Disease as A Complication of Hypothyroidism In Iraqi Patients المؤلفون
...Show More Authors

Publication Date
Sat Oct 30 2021
Journal Name
Iraqi Journal Of Science
The Effects of Conductance on Metastable Switches in Memristive Devices Based on Anti-Hebbian and Hebbian (AHaH) Learning Rules
...Show More Authors

     In the last few years, the literature conferred a great interest in studying the feasibility of using memristive devices for computing. Memristive devices are important in structure, dynamics, as well as functionalities of artificial neural networks (ANNs) because of their resemblance to biological learning in synapses and neurons regarding switching characteristics of their resistance. Memristive architecture consists of a number of metastable switches (MSSs). Although the literature covered a variety of memristive applications for general purpose computations, the effect of low or high conductance of each MSS was unclear. This paper focuses on finding a potential criterion to calculate the conductance of each MMS rather t

... Show More
Scopus (1)
Scopus Crossref
Publication Date
Sat Oct 30 2021
Journal Name
Iraqi Journal Of Science
The Effects of Conductance on Metastable Switches in Memristive Devices Based on Anti-Hebbian and Hebbian (AHaH) Learning Rules
...Show More Authors

     In the last few years, the literature conferred a great interest in studying the feasibility of using memristive devices for computing. Memristive devices are important in structure, dynamics, as well as functionalities of artificial neural networks (ANNs) because of their resemblance to biological learning in synapses and neurons regarding switching characteristics of their resistance. Memristive architecture consists of a number of metastable switches (MSSs). Although the literature covered a variety of memristive applications for general purpose computations, the effect of low or high conductance of each MSS was unclear. This paper focuses on finding a potential criterion to calculate the conductance of each M

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Sun Dec 04 2016
Journal Name
Baghdad Science Journal
Classification of Elliptic Cubic Curves Over The Finite Field of Order Nineteen
...Show More Authors

Plane cubics curves may be classified up to isomorphism or projective equivalence. In this paper, the inequivalent elliptic cubic curves which are non-singular plane cubic curves have been classified projectively over the finite field of order nineteen, and determined if they are complete or incomplete as arcs of degree three. Also, the maximum size of a complete elliptic curve that can be constructed from each incomplete elliptic curve are given.

View Publication Preview PDF
Crossref
Publication Date
Fri Sep 23 2022
Journal Name
Specialusis Ugdymas
Text Cryptography based on Arabic Words Characters Number
...Show More Authors

Cryptography is a method used to mask text based on any encryption method, and the authorized user only can decrypt and read this message. An intruder tried to attack in many manners to access the communication channel, like impersonating, non-repudiation, denial of services, modification of data, threatening confidentiality and breaking availability of services. The high electronic communications between people need to ensure that transactions remain confidential. Cryptography methods give the best solution to this problem. This paper proposed a new cryptography method based on Arabic words; this method is done based on two steps. Where the first step is binary encoding generation used t

... Show More
Publication Date
Mon Apr 15 2019
Journal Name
Proceedings Of The International Conference On Information And Communication Technology
Hybrid LDPC-STBC communications system based on chaos
...Show More Authors

View Publication
Scopus Clarivate Crossref