Preferred Language
Articles
/
uhcUP48BVTCNdQwCW2US
Survey on distributed denial of service attack detection using deep learning: A review
...Show More Authors

Distributed Denial of Service (DDoS) attacks on Web-based services have grown in both number and sophistication with the rise of advanced wireless technology and modern computing paradigms. Detecting these attacks in the sea of communication packets is very important. There were a lot of DDoS attacks that were directed at the network and transport layers at first. During the past few years, attackers have changed their strategies to try to get into the application layer. The application layer attacks could be more harmful and stealthier because the attack traffic and the normal traffic flows cannot be told apart. Distributed attacks are hard to fight because they can affect real computing resources as well as network bandwidth. DDoS attacks can also be made with smart devices that connect to the Internet, which can be infected and used as botnets. They use Deep Learning (D.L.) techniques like Convolutional Neural Network (C.N.N.) and variants of Recurrent Neural Networks (R.N.N.), such as Long Short-Term Memory (L.S.T.M.), Bidirectional L.S.T.M., Stacked L.S.T.M., and the Gat G.R.U.. These techniques have been used to detect (DDoS) attacks. The Portmap.csv file from the most recent DDoS dataset, CICDDoS2019, has been used to test D.L. approaches. Before giving the data to the D.L. approaches, the data is cleaned up. The pre-processed dataset is used to train and test the D.L. approaches. In the paper, we show how the D.L. approach works with multiple models and how they compare to each other.

View Publication
Publication Date
Wed May 12 2021
Journal Name
Indian Journal Of Forensic Medicine & Toxicology
The Effect of the Programmed Education Strategy to Learning the Under Hand Service and Receiving Service Skills of Volleyball for Juniors
...Show More Authors

In order to advance the education process and raise the educational level of the players, it became necessary to introduce new educational aids, programmed education in the education process, through which the basic skills to be learned are explained and clarified, and immediate feedback is provided that would enhance the information of the learner, and Reaching the goal to be achieved, taking into account the individual differences between the players, and thus it is possible to move away from the educational methods used in learning skills, which requires great effort and time, in addition to that the open playground may not perform the skill accurately and the player looks from one side, while when using the computer you look from severa

... Show More
View Publication
Crossref (1)
Crossref
Publication Date
Fri Jan 01 2016
Journal Name
Bio-inspired Computing – Theories And Applications
Image Segmentation Using Membrane Computing: A Literature Survey
...Show More Authors

View Publication
Scopus (10)
Crossref (5)
Scopus Crossref
Publication Date
Thu Nov 30 2023
Journal Name
Iraqi Journal Of Science
COVID-19 Detection via Blood Tests using an Automated Machine Learning Tool (Auto-Sklearn)
...Show More Authors

     Widespread COVID-19 infections have sparked global attempts to contain the virus and eradicate it. Most researchers utilize machine learning (ML) algorithms to predict this virus. However, researchers face challenges, such as selecting the appropriate parameters and the best algorithm to achieve an accurate prediction. Therefore, an expert data scientist is needed. To overcome the need for data scientists and because some researchers have limited professionalism in data analysis, this study concerns developing a COVID-19 detection system using automated ML (AutoML) tools to detect infected patients. A blood test dataset that has 111 variables and 5644 cases was used. The model is built with three experiments using Python's Auto-

... Show More
View Publication Preview PDF
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Wed Jul 29 2020
Journal Name
Iraqi Journal Of Science
Automatic Vehicles Detection, Classification and Counting Techniques / Survey
...Show More Authors

Vehicle detection (VD) plays a very essential role in Intelligent Transportation Systems (ITS) that have been intensively studied within the past years. The need for intelligent facilities expanded because the total number of vehicles is increasing rapidly in urban zones. Traffic monitoring is an important element in the intelligent transportation system, which involves the detection, classification, tracking, and counting of vehicles. One of the key advantages of traffic video detection is that it provides traffic supervisors with the means to decrease congestion and improve highway planning. Vehicle detection in videos combines image processing in real-time with computerized pattern recognition in flexible stages. The real-time pro

... Show More
View Publication Preview PDF
Scopus (5)
Crossref (4)
Scopus Crossref
Publication Date
Sun Nov 01 2020
Journal Name
Iop Conference Series: Materials Science And Engineering
Development of an Optimized Botnet Detection Framework based on Filters of Features and Machine Learning Classifiers using CICIDS2017 Dataset
...Show More Authors
Abstract<p>Botnet is a malicious activity that tries to disrupt traffic of service in a server or network and causes great harm to the network. In modern years, Botnets became one of the threads that constantly evolving. IDS (intrusion detection system) is one type of solutions used to detect anomalies of networks and played an increasing role in the computer security and information systems. It follows different events in computer to decide to occur an intrusion or not, and it used to build a strategic decision for security purposes. The current paper <italic>suggests</italic> a hybrid detection Botnet model using machine learning approach, performed and analyzed to detect Botnet atta</p> ... Show More
View Publication
Scopus (15)
Crossref (9)
Scopus Crossref
Publication Date
Thu Nov 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
Strategic orientation and its reflection on the Learning organization: Survey study of a sample of Makers decision the Iraqi Ministry of Communications
...Show More Authors

The current research focuses on the extent to which the strategic orientation(entrepreneurial orientation, customer orientation, technology orientation, learning orientation, and investment orientation) affects the learning organization (building common vision, systemic thinking, personal dominance, mental models, team learning)The first hypothesis to test the connection relation between research variables and The second hypothesis was to test the relationship between these variables. In order to ascertain the validity of the hypotheses, the research was based on a questionnaire questionnaire prepared according to a number of In addition to building a fifth sub-variable for the strategic orientation (investment orientation) based

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sat Sep 23 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Attack Stream Cipher By Using Cipher System Only
...Show More Authors

Attack  stream  cipher  system  , using cipher  text only  , depends on the  characteristics of  plain  teKt language  and  the randomness of  the key , that used  in encryption , without  having detailed  k.nuwh:dgt:: uf cipher algorithm by benefiting  from the balance between O's and  I' in the key to reduce the probability of key space.

 

View Publication Preview PDF
Publication Date
Thu Nov 30 2023
Journal Name
Iraqi Journal Of Science
Machine Learning Approach for New COVID-19 Cases Using Recurrent Neural Networks and Long-Short Term Memory
...Show More Authors

     This research aims to predict new COVID-19 cases in Bandung, Indonesia. The system implemented two types of deep learning methods to predict this. They were the recurrent neural networks (RNN) and long-short-term memory (LSTM) algorithms. The data used in this study were the numbers of confirmed COVID-19 cases in Bandung from March 2020 to December 2020. Pre-processing of the data was carried out, namely data splitting and scaling, to get optimal results. During model training, the hyperparameter tuning stage was carried out on the sequence length and the number of layers. The results showed that RNN gave a better performance. The test used the RMSE, MAE, and R2 evaluation methods, with the best numbers being  0.66975075, 0.470

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Dec 01 2021
Journal Name
Journal Of Economics And Administrative Sciences
The Effect of Using Information and Communication Technology to Improving the Quality of Blended Learning Elements’, a Survey Study at the Technical College of Management /Baghdad
...Show More Authors

 The research has been based on two main variables (information and communication technology) and the quality of blended education (physical and electronic), aiming to reveal the relationship between four dimensions (physical devices, software, databases, communication networks) and the elements of education represented by (the teacher, the student, the teaching process, curriculum).  The methodology and post-analysis-based research were conducted at the Technical College of Management / Baghdad through polling the opinions of a random sample that included (80) teachers out of (86) and the number of students (276) representing a random sample from all departments of the college (for the morning study) out of (3500) stud

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Aug 02 2019
Journal Name
The Fifth Conference On Smart Monitoring, Assessment And Rehabilitation Of Civil Structures Smar 2019
Rehabilitation of Mohammed Al-Qassim Bridge after Fire Attack Using CFRP Sheets: A Case Study
...Show More Authors

View Publication