Preferred Language
Articles
/
uhcUP48BVTCNdQwCW2US
Survey on distributed denial of service attack detection using deep learning: A review
...Show More Authors

Distributed Denial of Service (DDoS) attacks on Web-based services have grown in both number and sophistication with the rise of advanced wireless technology and modern computing paradigms. Detecting these attacks in the sea of communication packets is very important. There were a lot of DDoS attacks that were directed at the network and transport layers at first. During the past few years, attackers have changed their strategies to try to get into the application layer. The application layer attacks could be more harmful and stealthier because the attack traffic and the normal traffic flows cannot be told apart. Distributed attacks are hard to fight because they can affect real computing resources as well as network bandwidth. DDoS attacks can also be made with smart devices that connect to the Internet, which can be infected and used as botnets. They use Deep Learning (D.L.) techniques like Convolutional Neural Network (C.N.N.) and variants of Recurrent Neural Networks (R.N.N.), such as Long Short-Term Memory (L.S.T.M.), Bidirectional L.S.T.M., Stacked L.S.T.M., and the Gat G.R.U.. These techniques have been used to detect (DDoS) attacks. The Portmap.csv file from the most recent DDoS dataset, CICDDoS2019, has been used to test D.L. approaches. Before giving the data to the D.L. approaches, the data is cleaned up. The pre-processed dataset is used to train and test the D.L. approaches. In the paper, we show how the D.L. approach works with multiple models and how they compare to each other.

View Publication
Publication Date
Sun Feb 03 2019
Journal Name
Journal Of The College Of Education For Women
The Yamanies Service to al- Haj between the 4 – up to 9 centuries A.H.
...Show More Authors

The Yemen Kings and gaverners allered notable services to the pilgrims, who
were in their way to perform the pilgrimage to Mecca. Among them Al-Hysen Ibn
Salama (dead 384, Aih). The governer of Al- Zeadiea state, who concern about
pilgrimage route from its beginning at Hudrumot to its end at Mecca Al Makruma, the
distant was estimated by 60th days to pass the way he also eastablished asystem of
water “artesian wells” as long as the pilgrimage way also setting up large Mosqeses
and Marking out the way of the caravans of pilgrimage to save these caravans from
lossing the right way, he setting up under ground water chanal started from Arafat to
holy Mecca in order to ensure water supplies for the erea. This proje

... Show More
View Publication Preview PDF
Publication Date
Sat Apr 01 2023
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Intrusion detection method for internet of things based on the spiking neural network and decision tree method
...Show More Authors

The prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices

... Show More
Scopus (14)
Crossref (5)
Scopus Crossref
Publication Date
Sat Apr 01 2023
Journal Name
International Journal Of Electrical And Computer Engineering
Intrusion detection method for internet of things based on the spiking neural network and decision tree method
...Show More Authors

The prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices

... Show More
Preview PDF
Publication Date
Sat Jun 15 2019
Journal Name
Journal Of Baghdad College Of Dentistry
Taste Detection Thresholds in Relation to Salivary and Serum Zinc in Patients on Simvastatin Treatment
...Show More Authors

Background: Hyperlipidemia is an elevated fat (lipids), mostly cholesterol and triglycerides, in the blood. These lipids usually bind to proteins to remain circulated so-called lipoprotein. Aims of the study: To determine taste detection threshold and estimate the trace elements (zinc) in serum and saliva of those patients and compare all of these with healthy control subjects. Methods: Eighty subjects were incorporated in this study, thy were divided into two groups: forty patients on simvastatin treatment age between (35-60) years, and forty healthy control of age range between (35-60) years. Saliva was collected by non-stimulated technique within 10 minutes. Serum was obtained from each subject. Zinc was estimated in serum and saliva

... Show More
View Publication
Scopus (2)
Crossref (2)
Scopus Crossref
Publication Date
Fri Jun 01 2018
Journal Name
International Journal Of Civil Engineering And Technology (ijciet)
Performance assessment of biological treatment of sequencing batch reactor using artificial neural network technique.
...Show More Authors

Artificial Neural Network (ANN) model's application is widely increased for wastewater treatment plant (WWTP) variables prediction and forecasting which can enable the operators to take appropriate action and maintaining the norms. It is much easier modeling tool for dealing with complex nature WWTP modeling comparing with other traditional mathematical models. ANN technique significance has been considered at present study for the prediction of sequencing batch reactor (SBR) performance based on effluent's (BOD5/COD) ratio after collecting the required historical daily SBR data for two years operation (2015-2016) from Baghdad Mayoralty and Al-Rustamiya WWTP office, Iraq. The prediction was gotten by the application of a feed-forwa

... Show More
Publication Date
Tue Sep 15 2020
Journal Name
Al-academy
Appearance and Decay of Split-brain Theory to Explain Human Artistic Activity: A Historical Review: بدر محمد المعمري
...Show More Authors

Nearly, in the middle of 1970s the split-brain theory became the only theory that explains human creativity used in all fine art and art education schools. In fact, this theory- which appeared for first time in the middle of 1940s – faced many radical changes including its concepts and structures, and these changes affected both teaching art and art criticism. To update people awareness within art field of study, this paper reviews the split-brain theory and its relationship with teaching art from its appearance to its decay in 2013 and after.

View Publication Preview PDF
Crossref
Publication Date
Fri Feb 19 2021
Journal Name
Annals Of Telecommunications
Challenges and limits of fractal and slot antennas for WLAN, LTE, ISM, and 5G communication: a review paper
...Show More Authors

Abstract Portable communication devices such as WLAN, WiMAX, LTE, ISM, and 5G utilize one or more of the triple bands at (2.32.7 GHz,3.4–3.6GHz,and5–6GHz)andsufferfromtheeffectofmultipathproblemsbecausetheyareusedinurbanregions.To date, no one has performed a review of the antennas used for these types of wireless communications. This study reviewed two types of microstrip antennas (slot and fractal) that have been reported by researchers (as a single element) using a survey that included the evaluation of several important specifications of the antennas in previous research, such as operating bandwidth, gain, efficiency, axial ratio bandwidth (ARBW), and size. The weaknesses in the design of all antennas were carefully identified to de

... Show More
View Publication
Scopus (12)
Crossref (13)
Scopus Clarivate Crossref
Publication Date
Mon Aug 02 2021
Journal Name
International Journal Of Dental Hygiene
Efficacy of erythritol powder air‐polishing in active and supportive periodontal therapy: A systematic review and meta‐analysis
...Show More Authors
Abstract<sec><title>Objective

This systematic review aimed to analyse available evidence to answer two focused questions about the efficacy of erythritol powder air‐polishing (EPAP) (i) as an adjunctive during active periodontal therapy (APT) and (ii) as an alternative to hand/ultrasonic instrumentation during supportive periodontal therapy (SPT). Additionally, microbiological outcomes and patient's comfort/perceptions were assessed as secondary outcomes.

Methods

PubMed, Cochrane and Medline were searched for relevant articles published before February 2021 following PRISMA guidelines. The search was conducted by three indep

... Show More
View Publication
Scopus (16)
Crossref (17)
Scopus Clarivate Crossref
Publication Date
Fri Oct 01 2021
Journal Name
Ace Journal Of Clinical Chemistry And Laboratory Medicine
Comparison Between of Five Drugs Anti‐Virus for COVID‐19th in Chemicals Properties and Pharmacological Effectiveness: A Review
...Show More Authors

The corona virus epidemic outbreak has urged an extreme worldwide effort for re‐purposing obtainable approved medications for its treatment. In this review, we're focusing on the chemicals properties andpharmacologicaleffectiveness of medicationsofsmallmolecule that are presently being evaluated in clinical trials for the management of corona virus (COVID‐19). The current review sheds light on a number of drugs that have been diagnosed to treat COVID‐19 and their biological effects.

Publication Date
Sun Mar 30 2025
Journal Name
Mustansiriyah Journal Of Pure And Applied Sciences
Secure E-voting authentication system employing biometric technology, Crypto-Watermarking Approach and blockchain technology: A Review
...Show More Authors

Moderately, advanced national election technologies have improved political systems. As electronic voting (e-voting) systems advance, security threats like impersonation, ballot tampering, and result manipulation increase. These challenges are addressed through a review covering biometric authentication, watermarking, and blockchain technologies, each of which plays a crucial role in improving the security of e-voting systems. More precisely, the biometric authentication is being examined due to its ability in identify the voters and reducing the risks of impersonation. The study also explores the blockchain technology to decentralize the elections, enhance the transparency and ensure the prevention of any unauthorized alteration or

... Show More
View Publication
Crossref