Preferred Language
Articles
/
uhcUP48BVTCNdQwCW2US
Survey on distributed denial of service attack detection using deep learning: A review
...Show More Authors

Distributed Denial of Service (DDoS) attacks on Web-based services have grown in both number and sophistication with the rise of advanced wireless technology and modern computing paradigms. Detecting these attacks in the sea of communication packets is very important. There were a lot of DDoS attacks that were directed at the network and transport layers at first. During the past few years, attackers have changed their strategies to try to get into the application layer. The application layer attacks could be more harmful and stealthier because the attack traffic and the normal traffic flows cannot be told apart. Distributed attacks are hard to fight because they can affect real computing resources as well as network bandwidth. DDoS attacks can also be made with smart devices that connect to the Internet, which can be infected and used as botnets. They use Deep Learning (D.L.) techniques like Convolutional Neural Network (C.N.N.) and variants of Recurrent Neural Networks (R.N.N.), such as Long Short-Term Memory (L.S.T.M.), Bidirectional L.S.T.M., Stacked L.S.T.M., and the Gat G.R.U.. These techniques have been used to detect (DDoS) attacks. The Portmap.csv file from the most recent DDoS dataset, CICDDoS2019, has been used to test D.L. approaches. Before giving the data to the D.L. approaches, the data is cleaned up. The pre-processed dataset is used to train and test the D.L. approaches. In the paper, we show how the D.L. approach works with multiple models and how they compare to each other.

View Publication
Publication Date
Mon Jan 29 2024
Journal Name
Al-rafidain Journal Of Medical Sciences ( Issn 2789-3219 )
Role of Ultrasound in Antenatal Detection of Echogenic Amniotic Fluid and Pregnancy Outcome
...Show More Authors

Background: Ultrasound is a valuable tool for evaluating fetal problems throughout pregnancy. Amniotic fluid anomalies have been associated with unfavorable maternal, fetal, and obstetrical outcomes. Objective: To determine the effect of echogenic amniotic fluid during term pregnancy on the presence of meconium stain liquor and pregnancy outcome. Methods: A cross-sectional study was conducted on 1080 term pregnant women who visited Al-Elwiya Maternity Teaching Hospital from May 1st, 2021, to May 1st, 2023. Ultrasound was used to analyze echogenic amniotic fluid and turbid liquor. The liquor state was tested either after an artificial membrane rupture in the vaginal delivery trial or during a cesarean section. Results: Echogenic amni

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (1)
Scopus Crossref
Publication Date
Tue Dec 21 2021
Journal Name
Journal Of Engineering Mathematics
Fluid inflow from a source on the base of a channel
...Show More Authors

View Publication
Crossref
Publication Date
Sun Sep 07 2014
Journal Name
Baghdad Science Journal
Exponential Function of a bounded Linear Operator on a Hilbert Space.
...Show More Authors

In this paper, we introduce an exponential of an operator defined on a Hilbert space H, and we study its properties and find some of properties of T inherited to exponential operator, so we study the spectrum of exponential operator e^T according to the operator T.

View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Thu Jun 01 2017
Journal Name
International Journal Of Applied Engineering Research
A Proposed Method for Generating a Private Key Using Digital Color Image Features
...Show More Authors

In this paper, the goal of proposed method is to protect data against different types of attacks by unauthorized parties. The basic idea of proposed method is generating a private key from a specific features of digital color image such as color (Red, Green and Blue); the generating process of private key from colors of digital color image performed via the computing process of color frequencies for blue color of an image then computing the maximum frequency of blue color, multiplying it by its number and adding process will performed to produce a generated key. After that the private key is generated, must be converting it into the binary representation form. The generated key is extracted from blue color of keyed image then we selects a c

... Show More
Publication Date
Mon Jun 01 2020
Journal Name
Al-khwarizmi Engineering Journal
Developing a Prosthesis Design using A Gearbox to Replicate the Human Hand Mechanism
...Show More Authors

Prosthetic is an artificial tool that replaces a member of the human frame that is  absent because of ailment, damage, or distortion. The current research activities in Iraq draw interest to the upper limb discipline because of the growth in the number  of amputees. Thus, it becomes necessary to increase researches in this subject to help in reducing the struggling patients.  This paper describes the design and development of a prosthesis for people able and wear them from persons who have amputation in the hands. This design is composed of a hand with five fingers moving by means of a gearbox ism mechanism. The design of this artificial hand has 5 degrees of freedom. This artificial hand works based on the principle of &n

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Apr 01 2019
Journal Name
Journal Of Engineering
Design of New Hybrid Neural Controller for Nonlinear CSTR System based on Identification
...Show More Authors

This paper proposes improving the structure of the neural controller based on the identification model for nonlinear systems. The goal of this work is to employ the structure of the Modified Elman Neural Network (MENN) model into the NARMA-L2 structure instead of Multi-Layer Perceptron (MLP) model in order to construct a new hybrid neural structure that can be used as an identifier model and a nonlinear controller for the SISO linear or nonlinear systems. Two learning algorithms are used to adjust the parameters weight of the hybrid neural structure with its serial-parallel configuration; the first one is supervised learning algorithm based Back Propagation Algorithm (BPA) and the second one is an intelligent algorithm n

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Fri Aug 05 2016
Journal Name
Wireless Communications And Mobile Computing
A comparison study on node clustering techniques used in target tracking WSNs for efficient data aggregation
...Show More Authors

Wireless sensor applications are susceptible to energy constraints. Most of the energy is consumed in communication between wireless nodes. Clustering and data aggregation are the two widely used strategies for reducing energy usage and increasing the lifetime of wireless sensor networks. In target tracking applications, large amount of redundant data is produced regularly. Hence, deployment of effective data aggregation schemes is vital to eliminate data redundancy. This work aims to conduct a comparative study of various research approaches that employ clustering techniques for efficiently aggregating data in target tracking applications as selection of an appropriate clustering algorithm may reflect positive results in the data aggregati

... Show More
View Publication
Scopus (31)
Crossref (24)
Scopus Clarivate Crossref
Publication Date
Sun Dec 01 2024
Journal Name
Analytical Methods In Environmental Chemistry Journal
Evaluation and quantification of Fe3O4 concentrations in deposits formed inside Iraqi gas supply pipelines using a chemiluminescence method based on flow injection analysis
...Show More Authors

View Publication
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Thu Dec 01 2022
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
A self-balancing platform on a mobile car
...Show More Authors

<span lang="EN-US">In the last years, the self-balancing platform has become one of the most common candidates to use in many applications such as flight, biomedical fields, and industry. In this paper, the physical prototype of a proposed self-balancing platform that described the self-balancing attitude in the (X-axis, Y-axis, or biaxial) under the influence of road disturbance has been introduced. In the physical prototype, the inertial measurement unit (IMU) sensor will sense the disturbance in (X-axis, Y-axis, and biaxial). With the determined error, the corresponding electronic circuit, DC servo motors, and the Arduino software, the platform overcame the tilt angle(disturbance). Optimization of the proportional-integral-

... Show More
View Publication
Scopus (5)
Crossref (2)
Scopus Crossref
Publication Date
Fri Nov 01 2019
Journal Name
Journal Of Environmental Quality
Effects of Conservation Practices on Soil Quality Compared with a Corn–Soybean Rotation on a Claypan Soil
...Show More Authors

Restoration of degraded lands by adoption of recommended conservation management practices can rehabilitate watersheds and lead to improving soil and water quality. The objective was to evaluate the effects of grass buffers (GBs), biomass crops (BCs), grass waterways (GWWs), agroforestry buffers (ABs), landscape positions, and distance from tree base for AB treatment on soil quality compared with row crop (RC) (corn [Zea mays L.]–soybean [Glycine max (L.) Merr.] rotation) on claypan soils. Soil samples were taken from 10‐cm‐depth increments from the soil surface to 30 cm for GB, BC, GWW, and RC with three replicates. Soil samples were collected from

... Show More
View Publication
Scopus (22)
Crossref (23)
Scopus Clarivate Crossref