Preferred Language
Articles
/
uhcUP48BVTCNdQwCW2US
Survey on distributed denial of service attack detection using deep learning: A review
...Show More Authors

Distributed Denial of Service (DDoS) attacks on Web-based services have grown in both number and sophistication with the rise of advanced wireless technology and modern computing paradigms. Detecting these attacks in the sea of communication packets is very important. There were a lot of DDoS attacks that were directed at the network and transport layers at first. During the past few years, attackers have changed their strategies to try to get into the application layer. The application layer attacks could be more harmful and stealthier because the attack traffic and the normal traffic flows cannot be told apart. Distributed attacks are hard to fight because they can affect real computing resources as well as network bandwidth. DDoS attacks can also be made with smart devices that connect to the Internet, which can be infected and used as botnets. They use Deep Learning (D.L.) techniques like Convolutional Neural Network (C.N.N.) and variants of Recurrent Neural Networks (R.N.N.), such as Long Short-Term Memory (L.S.T.M.), Bidirectional L.S.T.M., Stacked L.S.T.M., and the Gat G.R.U.. These techniques have been used to detect (DDoS) attacks. The Portmap.csv file from the most recent DDoS dataset, CICDDoS2019, has been used to test D.L. approaches. Before giving the data to the D.L. approaches, the data is cleaned up. The pre-processed dataset is used to train and test the D.L. approaches. In the paper, we show how the D.L. approach works with multiple models and how they compare to each other.

View Publication
Publication Date
Sat Oct 01 2022
Journal Name
Baghdad Science Journal
Human Face Recognition Based on Local Ternary Pattern and Singular Value Decomposition
...Show More Authors

There is various human biometrics used nowadays, one of the most important of these biometrics is the face. Many techniques have been suggested for face recognition, but they still face a variety of challenges for recognizing faces in images captured in the uncontrolled environment, and for real-life applications. Some of these challenges are pose variation, occlusion, facial expression, illumination, bad lighting, and image quality. New techniques are updating continuously. In this paper, the singular value decomposition is used to extract the features matrix for face recognition and classification. The input color image is converted into a grayscale image and then transformed into a local ternary pattern before splitting the image into

... Show More
View Publication Preview PDF
Scopus (6)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Sun Dec 27 2020
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Evaluation the profitability of public commercial banks using liquidity indicators: A comparison of the Rafidain and Rasheed study
...Show More Authors

The issue of liquidity, profitability, and money employment, and capital fullness is one of the most important issues that gained high consideration by other authors and researchers in their attempts to find out the real relationship and how can balance be achieved, which is the main goal of each deposits.

For the sake of comprising the study variables, the research has formed the problem of the study which refers to the bank capability to enlarge profits without dissipation in liquidity   of the bank which will negatively reflect on the bank's fame as well as the customers' trust. For all these matters, the researcher has proposed a set of aims, the important of which is the estimation of the bank profitability; liquid

... Show More
View Publication Preview PDF
Publication Date
Fri Jan 20 2023
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
A Study of the Land Cover of Razzaza Lake during the Past 25 Years Using Remote Sensing Methods
...Show More Authors

In this study, the Earth's surface was studied in Razzaza Lake for 25 years, using remote sensing methods. Images of the satellites Landsat 5 (TM) and 8 (OLI) were used to study and determine the components of the land cover. The study covered the years 1995-2021 with an interval of 5 years, as this region is uninhabited, so the change in the land cover is slow. The land cover was divided into three main classes and seven subclasses and classified using the maximum likelihood classifier with the help of training sets collected to represent the classes that made up the land cover. The changes detected in the land cover were studied by considering 1995 as a reference year. It was found that there was a significant reduction in the water mass

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Mon Aug 31 2020
Journal Name
Bmc Oral Health
The success of using 2% lidocaine in pain removal during extraction of mandibular premolars: a prospective clinical study
...Show More Authors
Abstract<sec><title>Background

The purpose of this study was to evaluate the anesthetic effectiveness of a buccal infiltration technique combined with local massage (using 2% lidocaine) in the extraction of mandibular premolars to be utilized as an alternative to the conventional inferior alveolar nerve block.

Methods

Patients eligible included any subject with a clinical indication for tooth extraction of the mandibular 1st or 2nd premolars. All patients were anesthetized buccally by local infiltration technique followed by an external pressure applied for 1 min directly over the injection area. In each case, another local

... Show More
View Publication
Crossref (8)
Crossref
Publication Date
Mon Sep 20 2021
Journal Name
Journal Of Craniofacial Surgery
Presurgical Assessment of Anatomical Landmark Position Using Two Views of Cone Beam Computed Tomography: A Comparative Radiological Study
...Show More Authors

View Publication
Scopus (2)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Sat Jul 30 2022
Journal Name
Global Academic Journal Of Linguistics And Literature
A Critical Stylistic Analysis of Transcultural Identity in Lyer’s The Global Soul (2001) Using the Tool of Negation
...Show More Authors

This study is intended to examine the concept of transcultural identity in the travel book The Global Soul: Jet Lag, Shopping Malls, and the Search for Home by (Iyer, 2001). Jeffries’ model of critical stylistics (2010) (henceforth, CS) has been selected to analyze the book. To be more specific, Negation is selected to analyze the concept under study. As such, the study aims at finding out how Negation is used to portray ideological meanings representing the concept of transcultural identity in one non-fictional travel book; and finding out the ideologies related to the concept analyzed. The analysis of the data shows that Negation is a suitable analytical tool to reach the ideational meaning of the text towards the concept of tra

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Jul 01 2021
Journal Name
Energy
Experimental investigations of the performance of a flat-plate solar collector using carbon and metal oxides based nanofluids
...Show More Authors

View Publication
Scopus (143)
Crossref (139)
Scopus Clarivate Crossref
Publication Date
Sat Dec 31 2022
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
EFFECT OF USING DIFFERENT LEVELS OF CAMEL FAT (HUMP FAT) ON PHYSIOCHEMICAL COMPOSITION OF SAUSAGE FROM BEEF CAMEL AND CHICKEN : EFFECT OF USING DIFFERENT LEVELS OF CAMEL FAT (HUMP FAT) ON PHYSIOCHEMICAL COMPOSITION OF SAUSAGE FROM BEEF CAMEL AND CHICKEN
...Show More Authors

ABSTRACT

This study was conducted to determine the effect of various levels of hump fat (HF) used in manufacturing of camel, beef and chicken sausage to understand the effect of (HF) on physicochemical composition sausage, Different levels of hump fat (5, 7, and 10 %) were used, physicochemical compositions like (moisture, protein, fat, Ash, water holding capacity, shrinkage, cooking loss and pH) were determined. Results of the study revealed that moisture content showed high significant differences (P≤0.01)among treatments groups, Camel sausage and beef sausage tended to have highest values while chicken sausage reported the lowest value. The study showed no significant difference (P≤0.05) among the

... Show More
View Publication Preview PDF
Publication Date
Fri Mar 31 2023
Journal Name
Journal Of Al-qadisiyah For Computer Science And Mathematics
A Cryptosystem for Database Security Based on RC4 Algorithm
...Show More Authors

Because of vulnerable threats and attacks against database during transmission from sender to receiver, which is one of the most global security concerns of network users, a lightweight cryptosystem using Rivest Cipher 4 (RC4) algorithm is proposed. This cryptosystem maintains data privacy by performing encryption of data in cipher form and transfers it over the network and again performing decryption to original data. Hens, ciphers represent encapsulating system for database tables

View Publication
Crossref (1)
Crossref
Publication Date
Wed Mar 20 2019
Journal Name
Journal Of Legal Sciences
Sale Based on an Open Price – A Comparative Study
...Show More Authors

The ultimate goal of any sale contract is to maximize the combined returns of the parties, knowing that these returns are not realized (in long-term contracts) except in the final stages of the contract. Therefore, this requires the parties to the contract to leave some elements open, including the price, because the adoption of a fixed price and inflexible will not be appropriate to meet their desires when contracting, especially with ignorance of matters beyond their will and may affect the market conditions, and the possibility of modifying the fixed price through The elimination is very limited, especially when the parties to the contract are equally in terms of economic strength. Hence, in order to respond to market uncertainties, the

... Show More
View Publication