Preferred Language
Articles
/
uhcUP48BVTCNdQwCW2US
Survey on distributed denial of service attack detection using deep learning: A review
...Show More Authors

Distributed Denial of Service (DDoS) attacks on Web-based services have grown in both number and sophistication with the rise of advanced wireless technology and modern computing paradigms. Detecting these attacks in the sea of communication packets is very important. There were a lot of DDoS attacks that were directed at the network and transport layers at first. During the past few years, attackers have changed their strategies to try to get into the application layer. The application layer attacks could be more harmful and stealthier because the attack traffic and the normal traffic flows cannot be told apart. Distributed attacks are hard to fight because they can affect real computing resources as well as network bandwidth. DDoS attacks can also be made with smart devices that connect to the Internet, which can be infected and used as botnets. They use Deep Learning (D.L.) techniques like Convolutional Neural Network (C.N.N.) and variants of Recurrent Neural Networks (R.N.N.), such as Long Short-Term Memory (L.S.T.M.), Bidirectional L.S.T.M., Stacked L.S.T.M., and the Gat G.R.U.. These techniques have been used to detect (DDoS) attacks. The Portmap.csv file from the most recent DDoS dataset, CICDDoS2019, has been used to test D.L. approaches. Before giving the data to the D.L. approaches, the data is cleaned up. The pre-processed dataset is used to train and test the D.L. approaches. In the paper, we show how the D.L. approach works with multiple models and how they compare to each other.

View Publication
Publication Date
Fri Nov 09 2018
Journal Name
Iraqi National Journal Of Nursing Specialties
Review of Histopathological Diagnoses of One Year Appendectomy Specimens in Sulaimani City
...Show More Authors

Objective: To review and see the pattern of histopathological diagnoses of one year appendectomy specimens.
Methodology: This retrospective study was carried in Sulaimani Teaching Hospital over the period of one year (from 1st
of January to 31st of December 2009). All pathological reports were reviewed retrospectively for patient’s age, sex,
histopathological diagnosis and operative findings (if present). Histopathological diagnoses then were classified into
either positive or negative for acute inflammation. Any associated findings or any surgical specimen removed with the
appendix was recorded. The obtained data were analyzed by using the statistical package social sciences (SPSS) version
19; with Chi square to test

... Show More
View Publication Preview PDF
Publication Date
Sun Jun 30 2024
Journal Name
Iraqi Geological Journal
Electrical Resistivity Synthetic Modeling and Field Survey for Subsurface Features Investigation of the Borsippa Archaeological Site, Babylon Governorate, Middle Iraq
...Show More Authors

The selection of proper field survey parameters of electrical resistivity can significantly provide efficient results within a reasonable time and cost. Four electrode arrays of 2D Electric Resistivity Imaging (ERI) surveys were applied to characterize and detect subsurface archaeological bodies and to determine the appropriate array type that should be applied in the field survey. This research is to identify the subsurface features of the Borsippa archaeological site, Babylon Governorate, Middle Iraq. Synthetic modeling studies were conducted to determine the proper array and parameters for imaging the shallow subsurface features or targets. The efficiency of many array types has been tested for the detection the buried archaeolog

... Show More
View Publication Preview PDF
Scopus (2)
Scopus Crossref
Publication Date
Thu Oct 01 2020
Journal Name
Biochemical & Cellular Archives
STUDY ON ABILITY OF PROTEUS MIRABILIS ISOLATED FROM BURNS AND WOUNDS INFECTIONS TO BIOFILM FORMATION AND DETECTION URE C GENE RESPONSIBLE FOR PRODUCE UREASE ENZYME
...Show More Authors

A total of 200 clinical samples included Burns and Wounds infections were collected from Baghdad Governorate. Results showed that rate all isolates of P. mirabilis was 31(15.5%) and rate of Burns infections was 14 (45%) and rate of wounds infection 17 (55%). Where was diagnostic based on conventional biochemical tests and confirmed by the Vitek-2 Compact system and the specific primer of the16SrRNA gene, the ability of bacterial isolates to biofilm formation to be studied. It's considered an important virulence factor in Incidence of diseases and play important role in increasing resistance to antibiotic of encased bacteria, by two methods Congo Red Agar method and Microtiter Plate method. The Congo Red Agar method showed that most isolates

... Show More
Scopus
Publication Date
Tue Jun 30 2020
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
DETECTION OF Staphylococcus aureus CAUSED OF FOOD POISONING IN RED & WHITE MEAT OFFERED IN LOCAL MARKETS: DETECTION OF Staphylococcus aureus CAUSED OF FOOD POISONING IN RED & WHITE MEAT OFFERED IN LOCAL MARKETS
...Show More Authors

This study was conducted to investigate the presence of Staphylococcus aureus in the red and white meat available in local markets. They were selected ten samples of red and white meat randomly (Iraq, Saudi Arabia, Turkey, and Brazil) from different markets in Baghdad, and the results of reading the nutrition facts of media indication card showed that all models confirm to the Iraqi standard quality in terms of scanning all data of the media indication card, except for the birds of Bayader, where the date of expire & production date of the product was not mentioned. Also, the results of the study showed that there is no Staphylococcus aureus in local red and white meat as well as imported.

View Publication Preview PDF
Publication Date
Sat Jun 01 2024
Journal Name
Civil And Environmental Engineering
Constructing a Corrected Stations Network Using Some Geomatic Techniques
...Show More Authors
Abstract<p>The major objective of this study is to establish a network of Ground Control Points-GCPs which can use it as a reference for any engineering project. Total Station (type: Nikon Nivo 5.C), Optical Level and Garmin Navigator GPS were used to perform traversing. Traversing measurement was achieved by using nine points covered the selected area irregularly. Near Civil Engineering Department at Baghdad University Al-jadiriya, an attempt has been made to assess the accuracy of GPS by comparing the data obtained from the Total Station. The average error of this method is 3.326 m with the highest coefficient of determination (R<sup>2</sup>) is 0.077 m observed in Northing. While in</p> ... Show More
View Publication Preview PDF
Scopus (2)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Sat Jan 01 2022
Journal Name
Proceedings Of International Conference On Computing And Communication Networks
Speech Age Estimation Using a Ranking Convolutional Neural Network
...Show More Authors

View Publication
Scopus (3)
Scopus Clarivate Crossref
Publication Date
Sun Jul 01 2018
Journal Name
International Journal Of Civil Engineering And Technology (ijciet)
A Proposed Hybird Text Cryptographic Method Using Circular Queue
...Show More Authors

The sensitive and important data are increased in the last decades rapidly, since the tremendous updating of networking infrastructure and communications. to secure this data becomes necessary with increasing volume of it, to satisfy securing for data, using different cipher techniques and methods to ensure goals of security that are integrity, confidentiality, and availability. This paper presented a proposed hybrid text cryptography method to encrypt a sensitive data by using different encryption algorithms such as: Caesar, Vigenère, Affine, and multiplicative. Using this hybrid text cryptography method aims to make the encryption process more secure and effective. The hybrid text cryptography method depends on circular queue. Using circ

... Show More
Publication Date
Sat Jan 01 2022
Journal Name
Proceedings Of International Conference On Computing And Communication Networks
Speech Gender Recognition Using a Multilayer Feature Extraction Method
...Show More Authors

View Publication
Scopus (2)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Tue Dec 31 2024
Journal Name
Journal Of Soft Computing And Computer Applications
Enhancing Image Classification Using a Convolutional Neural Network Model
...Show More Authors

In recent years, with the rapid development of the current classification system in digital content identification, automatic classification of images has become the most challenging task in the field of computer vision. As can be seen, vision is quite challenging for a system to automatically understand and analyze images, as compared to the vision of humans. Some research papers have been done to address the issue in the low-level current classification system, but the output was restricted only to basic image features. However, similarly, the approaches fail to accurately classify images. For the results expected in this field, such as computer vision, this study proposes a deep learning approach that utilizes a deep learning algorithm.

... Show More
View Publication
Crossref
Publication Date
Sat Apr 01 2023
Journal Name
Baghdad Science Journal
Honeyword Generation Using a Proposed Discrete Salp Swarm Algorithm
...Show More Authors

Honeywords are fake passwords that serve as an accompaniment to the real password, which is called a “sugarword.” The honeyword system is an effective password cracking detection system designed to easily detect password cracking in order to improve the security of hashed passwords. For every user, the password file of the honeyword system will have one real hashed password accompanied by numerous fake hashed passwords. If an intruder steals the password file from the system and successfully cracks the passwords while attempting to log in to users’ accounts, the honeyword system will detect this attempt through the honeychecker. A honeychecker is an auxiliary server that distinguishes the real password from the fake passwords and t

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (2)
Scopus Crossref