Preferred Language
Articles
/
oRf6Po8BVTCNdQwC6WUP
Evaluation of DDoS attacks Detection in a New Intrusion Dataset Based on Classification Algorithms
...Show More Authors

Intrusion detection system is an imperative role in increasing security and decreasing the harm of the computer security system and information system when using of network. It observes different events in a network or system to decide occurring an intrusion or not and it is used to make strategic decision, security purposes and analyzing directions. This paper describes host based intrusion detection system architecture for DDoS attack, which intelligently detects the intrusion periodically and dynamically by evaluating the intruder group respective to the present node with its neighbors. We analyze a dependable dataset named CICIDS 2017 that contains benign and DDoS attack network flows, which meets certifiable criteria and is openly accessible. It evaluates the performance of a complete arrangement of machine learning algorithms and network traffic features to indicate the best features for detecting the assured attack classes. Our goal is storing the address of destination IP that is utilized to detect an intruder by method of misuse detection.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Dec 01 2021
Journal Name
Baghdad Science Journal
Improvement of the Fault Tolerance in IoT Based Positioning Systems by Applying for Redundancy in the Controller Layer
...Show More Authors

In recent years, the positioning applications of Internet-of-Things (IoT) based systems have grown increasingly popular, and are found to be useful in tracking the daily activities of children, the elderly and vehicle tracking. It can be argued that the data obtained from GPS based systems may contain error, hence taking these factors into account, the proposed method for this study is based on the application of IoT-based positioning and the replacement of using IoT instead of GPS.  This cannot, however, be a reason for not using the GPS, and in order to enhance the reliability, a parallel combination of the modern system and traditional methods simultaneously can be applied. Although GPS signals can only be accessed in open spaces, GP

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Tue Jan 01 2019
Journal Name
Biochemical And Cellular Archives
Effect of HPV infection on the expression of fibronectin in a group of Iraqi women with cervical carcinoma
...Show More Authors

: Cervical malignancy positioned as the fourth most prevalent disease among women around the world. HPVs especially HPV16 are the causative agent of cervical cancer, responsible of about 5% of all human cancers worldwide. Some researchers found that the fibronectin is repressed by the papillomavirus (HPV) type 16 E7 oncoprotein in both HPV-positive nontumorigenic and tumorigenic cell lines, while others found that the HPV oncoprotein increase the levels of fibronectin. The aim is to study the effect of HPV infection on Fibronectin expression and their correlation onthe development of Cervicalcancinoma. The current retrospective study enrolled paraffinized blocks of two groups. The research included 30 cervical carcinomatous tissues as well

... Show More
Scopus (2)
Scopus
Publication Date
Fri Jan 01 2016
Journal Name
Journal Of The College Of Languages (jcl)
ARZI KANBER HİKAYESİ'NİN IRAK TÜRKMENLERİ ARASINDA TESPİT EDİLEN YENİ BİR VARYANTI'NIN İNCELENMESİ ANALYZING A NEW TEXT OF " ARZO AND QENBER "TALE AMONG IRAQI TURKMENS
...Show More Authors

Öz      

            Arzı Kanber/Kamber hikayesi Anadolu, Rumeli, Azerbaycan, Türkmenistan ve Irak gibi Türk dünyasının birçok yerinde birden fazla varyantı bulunan, çok sevilen ve yaygın olarak anlatılan aşk ve dramatik maceralı bir halk hikayesidir. Türk halk hikayelerinin en popüler olanlarından biri sayılan Arzı Kanber/Kamber hikayesi, Anadolu'nun birçok yöresinde bilinmesine rağmen Irak Türkmenleri arasında daha çok sevildiği ve yaygın olarak anlatıldığı tespit edilen birden fazla varyantından da görülebilir. Irak Türkmenleri arasında günümüze kadar hikayenin iki varyantı tespit edilmi

... Show More
View Publication Preview PDF
Publication Date
Mon Jan 01 2018
Journal Name
Portugaliae Electrochimica Acta
A Kinetic Study of Oxalic Acid Electrochemical Oxidation on a Manganese Dioxide Rotating Cylinder Anode
...Show More Authors

View Publication
Scopus (9)
Crossref (7)
Scopus Crossref
Publication Date
Thu Dec 31 2020
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
EVALUATION OF ELECTRONIC TRADING AND CENTRAL DEPOSITERY IN THE IRAQ STOCK EXCHANGE FOR THE PERIOS (2008- 2018): EVALUATION OF ELECTRONIC TRADING AND CENTRAL DEPOSITERY IN THE IRAQ STOCK EXCHANGE FOR THE PERIOS (2008- 2018)
...Show More Authors

The rapid developmemt of information technology and its use in all fields has a bositive influence on all fields , and financial markets have a share of this development through the use of an electronic trading system to settle transactions and enhance transparency and disclosure in all activities of these markets and stimulate their performance .

It is worth nothing that these revolutions remove the necessity for nonstop connection with persons through the internet or phone networks , novel knowledge decreases the charges of structure original transaction system and reducing the fences of new participants entry .

The development in transportations expertise allows for quicker or

... Show More
View Publication Preview PDF
Publication Date
Mon Jun 01 2009
Journal Name
Journal Of Economics And Administrative Sciences
The contemporary vision of marketing And its impact in crystallizing the chances of success of the new product
...Show More Authors

The current research aims at identifying the new marketing directions that in the picture because if the changes and challenges that face the business nowadays, these effect on the future of the new product.

The problem of the research concentrate on the new marketing activities and how to make it appropriate between the product and the market's need, and to fulfill the needs and desire of the customer and it's importance for achieving the economical goals of the organization for a long relationship with the customer.

The resume of the research is about the impact of nowadays marketing and it's effect on knowing the customer instead of concentrating on the important roll of mark

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Sun Aug 01 2021
Journal Name
Journal Of Engineering
Practical comparation of the accuracy and speed of YOLO, SSD and Faster RCNN for drone detection
...Show More Authors

Convolutional Neural Networks (CNN) have high performance in the fields of object recognition and classification. The strength of CNNs comes from the fact that they are able to extract information from raw-pixel content and learn features automatically. Feature extraction and classification algorithms can be either hand-crafted or Deep Learning (DL) based. DL detection approaches can be either two stages (region proposal approaches) detector or a single stage (non-region proposal approach) detector. Region proposal-based techniques include R-CNN, Fast RCNN, and Faster RCNN. Non-region proposal-based techniques include Single Shot Detector (SSD) and You Only Look Once (YOLO). We are going to compare the speed and accuracy of Faster RCNN,

... Show More
View Publication Preview PDF
Crossref (21)
Crossref
Publication Date
Mon Jan 01 2018
Journal Name
Biochemical Cellular Archive
Immunological and molecular detection of herpes simplex virus type 1 and 2 in patients clinically diagnosed with parkinson’s disease and multiple sclerosis
...Show More Authors

To determine the relationship between herpes simplex virus 1, 2 and neurological disorders, sixty samples from patients with neurological diseases were collected (40 patients with Multiple sclerosis and 20 patients with Parkinson’s disease) all of whom attended both the Neurological science Hospital as well as the Neuropathology consultation Department in Baghdad Hospital In Iraq. The samples were collected in the time frame between November 2017 and April 2018. The ages of the patients that were investigated were between (17-76) years and compared to a control group consisting of 25 samples collected from apparently healthy individuals. All the studied groups were subjected to the measurement of anti-HSV 1, 2 IgG antibodies by the means

... Show More
Publication Date
Thu Jan 12 2017
Journal Name
Journal Of Agricultural And Food Chemistry
Using Standing Gold Nanorod Arrays as Surface-Enhanced Raman Spectroscopy (SERS) Substrates for Detection of Carbaryl Residues in Fruit Juice and Milk
...Show More Authors

View Publication
Scopus (116)
Crossref (106)
Scopus Clarivate Crossref
Publication Date
Mon Aug 01 2011
Journal Name
International Journal Of Research And Reviews In Computer Science
Detection of the photon number splitting attack by using decoy states quantum key distribution system
...Show More Authors

The goal of this work is to check the presence of PNS (photon number splitting) attack in quantum cryptography system based on BB84 protocol, and to get a maximum secure key length as possible. This was achieved by randomly interleaving decoy states with mean photon numbers of 5.38, 1.588 and 0.48 between the signal states with mean photon numbers of 2.69, 0.794 and 0.24. The average length for a secure key obtained from our system discarding the cases with Eavesdropping was equal to 125 with 20 % decoy states and 82 with 50% decoy states for mean photon number of 0.794 for signal states and 1.588 for decoy states.