Preferred Language
Articles
/
uhcUP48BVTCNdQwCW2US
Survey on distributed denial of service attack detection using deep learning: A review
...Show More Authors

Distributed Denial of Service (DDoS) attacks on Web-based services have grown in both number and sophistication with the rise of advanced wireless technology and modern computing paradigms. Detecting these attacks in the sea of communication packets is very important. There were a lot of DDoS attacks that were directed at the network and transport layers at first. During the past few years, attackers have changed their strategies to try to get into the application layer. The application layer attacks could be more harmful and stealthier because the attack traffic and the normal traffic flows cannot be told apart. Distributed attacks are hard to fight because they can affect real computing resources as well as network bandwidth. DDoS attacks can also be made with smart devices that connect to the Internet, which can be infected and used as botnets. They use Deep Learning (D.L.) techniques like Convolutional Neural Network (C.N.N.) and variants of Recurrent Neural Networks (R.N.N.), such as Long Short-Term Memory (L.S.T.M.), Bidirectional L.S.T.M., Stacked L.S.T.M., and the Gat G.R.U.. These techniques have been used to detect (DDoS) attacks. The Portmap.csv file from the most recent DDoS dataset, CICDDoS2019, has been used to test D.L. approaches. Before giving the data to the D.L. approaches, the data is cleaned up. The pre-processed dataset is used to train and test the D.L. approaches. In the paper, we show how the D.L. approach works with multiple models and how they compare to each other.

View Publication
Publication Date
Sun Sep 06 2020
Journal Name
European Journal Of Dental Education
Evaluation of technology‐based learning by dental students during the pandemic outbreak of coronavirus disease 2019
...Show More Authors

View Publication
Crossref (52)
Crossref
Publication Date
Mon Jul 28 2025
Journal Name
Retos
The effect of the beehive strategy on deliberate thinking and learning the setting skill of volleyball among female students at the College of Physical Education and Sports Sciences for Woman
...Show More Authors

Objective: Develop a deliberate thinking scale for the setting skill in volleyball for second-year female students in the College of Physical Education and Sports Sciences for Woman. Research methodology: The researchers used the experimental approach, employing a two-group approach (pre-test and post-test), to suit the nature of the research. The research community comprised (65) second-year female students from the College of Physical Education and Sports Sciences for Woman at the University of Baghdad for the academic year 2024-2025. The research sample was randomly selected, with (15) students in Section A, the experimental group, and (15) students in Section B, the control group. This group represented (46%) of the students. Th

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jan 01 2016
Journal Name
Journal Of Engineering
A Mathematical Model of a Thermally Activated Roof (TAR) Cooling System Using a Simplified RC-Thermal Model with Time Dependent Supply Water Temperature
...Show More Authors

This paper presents a computer simulation model of a thermally activated roof (TAR) to cool a room using cool water from a wet cooling tower. Modeling was achieved using a simplified 1-D resistance-capacitance thermal network (RC model) for an infinite slab. Heat transfer from the cooling pipe network was treated as 2-D heat flow. Only a limited number of nodes were required to obtain reliable results. The use of 6th order RC-thermal model produced a set of ordinary differential equations that were solved using MATLAB - R2012a. The computer program was written to cover all possible initial conditions, material properties, TAR system geometry and hourly solar radiation. The cool water supply was considered time

... Show More
View Publication Preview PDF
Publication Date
Sat Mar 01 2014
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The use of technology review and evaluate programs PERT to improve the cost method on the basis of activity: بحث تطبيقي في الشركة العامة للصناعات النسيجية /واسط
...Show More Authors

Suffer most of the industrial sector companies from high Kperfi magnitude of the costs of industrial indirect, lack of equitable distribution of these costs on the objectives of cost, increased competition, and the lack of proper planning in line and changes faced by the industrial sector (general) and sample (private), as well as the difficulty in re- directing efforts to improve profitability and in-depth analysis of activities, and to identify untapped resource activities, then link these activities to the final products  The research aims to apply the technology review and evaluate programs with the method (ABC) through the application stages of planning, scheduling and control and a comparison to get to the products of dev

... Show More
View Publication Preview PDF
Publication Date
Fri Sep 01 2023
Journal Name
Migration Letters
Organizational Machiavellianism and Its Impact on Employees’ Passion: A Field Study on a Sample of Electronic Payment Companies in Iraq
...Show More Authors

View Publication
Publication Date
Wed Mar 10 2021
Journal Name
Baghdad Science Journal
Merge Operation Effect On Image Compression Using Fractal Technique
...Show More Authors

Fractal image compression gives some desirable properties like fast decoding image, and very good rate-distortion curves, but suffers from a high encoding time. In fractal image compression a partitioning of the image into ranges is required. In this work, we introduced good partitioning process by means of merge approach, since some ranges are connected to the others. This paper presents a method to reduce the encoding time of this technique by reducing the number of range blocks based on the computing the statistical measures between them . Experimental results on standard images show that the proposed method yields minimize (decrease) the encoding time and remain the quality results passable visually.

View Publication Preview PDF
Publication Date
Fri Apr 30 2010
Journal Name
Journal Of Applied Computer Science & Mathematics
Image Hiding Using Magnitude Modulation on the DCT Coefficients
...Show More Authors

In this paper, we introduce a DCT based steganographic method for gray scale images. The embedding approach is designed to reach efficient tradeoff among the three conflicting goals; maximizing the amount of hidden message, minimizing distortion between the cover image and stego-image,and maximizing the robustness of embedding. The main idea of the method is to create a safe embedding area in the middle and high frequency region of the DCT domain using a magnitude modulation technique. The magnitude modulation is applied using uniform quantization with magnitude Adder/Subtractor modules. The conducted test results indicated that the proposed method satisfy high capacity, high preservation of perceptual and statistical properties of the steg

... Show More
View Publication Preview PDF
Publication Date
Thu Aug 02 2012
Journal Name
International Journal Of Advanced Research In Computer Science
User Authentication based on Keystroke Dynamics Using Backpropagation Network
...Show More Authors

Computer systems and networks are being used in almost every aspect of our daily life; as a result the security threats to computers and networks have also increased significantly. Traditionally, password-based user authentication is widely used to authenticate legitimate user in the current system0T but0T this method has many loop holes such as password sharing, shoulder surfing, brute force attack, dictionary attack, guessing, phishing and many more. The aim of this paper is to enhance the password authentication method by presenting a keystroke dynamics with back propagation neural network as a transparent layer of user authentication. Keystroke Dynamics is one of the famous and inexpensive behavioral biometric technologies, which identi

... Show More
Publication Date
Thu Jan 30 2020
Journal Name
Al-kindy College Medical Journal
Thyroid Hemiagenesis with Ipsilateral Parathyroid Adenoma; Case report with Review of the Literature
...Show More Authors

Thyroid hemiagenesis (THA) is a rare congenital anomaly in which one lobe of thyroid gland fails to develop during embryological stage. Agenesis may be unilateral, total or isthmic. Left thyroid lobe is more commonly involved than right lobe in hemiagenesis. Agenesis of the isthmus was seen in 50% of cases. Left sided hemiagenesis is more common than right sided hemiagenesis with a Left to right ratio of 4:1. Clinically patients can be euthyroid, hypothyroid or hyperthyroid. Often it is diagnosed as an incidental finding during ultrasonography (USG) study of neck, which can easily diagnose this condition.

Actual incidence of THA is unknown; most cases are diagnosed in patients admitted for thyroid scan or thyroid surgery because

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Dec 01 2015
Journal Name
Journal Of Engineering
Ten Years of OpenStreetMap Project: Have We Addressed Data Quality Appropriately? – Review Paper
...Show More Authors

It has increasingly been recognised that the future developments in geospatial data handling will centre on geospatial data on the web: Volunteered Geographic Information (VGI). The evaluation of VGI data quality, including positional and shape similarity, has become a recurrent subject in the scientific literature in the last ten years. The OpenStreetMap (OSM) project is the most popular one of the leading platforms of VGI datasets. It is an online geospatial database to produce and supply free editable geospatial datasets for a worldwide. The goal of this paper is to present a comprehensive overview of the quality assurance of OSM data. In addition, the credibility of open source geospatial data is discussed, highlighting the diff

... Show More
Crossref (3)
Crossref