Preferred Language
Articles
/
uhcUP48BVTCNdQwCW2US
Survey on distributed denial of service attack detection using deep learning: A review
...Show More Authors

Distributed Denial of Service (DDoS) attacks on Web-based services have grown in both number and sophistication with the rise of advanced wireless technology and modern computing paradigms. Detecting these attacks in the sea of communication packets is very important. There were a lot of DDoS attacks that were directed at the network and transport layers at first. During the past few years, attackers have changed their strategies to try to get into the application layer. The application layer attacks could be more harmful and stealthier because the attack traffic and the normal traffic flows cannot be told apart. Distributed attacks are hard to fight because they can affect real computing resources as well as network bandwidth. DDoS attacks can also be made with smart devices that connect to the Internet, which can be infected and used as botnets. They use Deep Learning (D.L.) techniques like Convolutional Neural Network (C.N.N.) and variants of Recurrent Neural Networks (R.N.N.), such as Long Short-Term Memory (L.S.T.M.), Bidirectional L.S.T.M., Stacked L.S.T.M., and the Gat G.R.U.. These techniques have been used to detect (DDoS) attacks. The Portmap.csv file from the most recent DDoS dataset, CICDDoS2019, has been used to test D.L. approaches. Before giving the data to the D.L. approaches, the data is cleaned up. The pre-processed dataset is used to train and test the D.L. approaches. In the paper, we show how the D.L. approach works with multiple models and how they compare to each other.

View Publication
Publication Date
Wed May 19 2010
Journal Name
Journal Of College Of Science, University Of Babylon
H-Point Standard Addition Method for Simultaneous Determination of Cimetidine and Erythromycin Ethylsuccinate Drugs Using Bromothymol Blue as a Chromogenic Complexing Agent
...Show More Authors

The H-Point Standard Addition Method (H-PSAM) has been applied for spectrophotometric simultaneous determination of Cimetidine and Erythromycin ethylsuccinate using Bromothymol Blue (BTB) as a chromogenic complexing agent in a buffer solution at pH 5.5.

Publication Date
Tue Nov 01 2016
Journal Name
Our Dermatology Online
Topical therapy of molluscum contagiosum as a comparative therapeutic study using 15% phenol in lactic acid, 5% tincture iodine and pricking alone
...Show More Authors

KE Sharquie, AA Noaimi, GA Ibrahim, AS Al-Husseiny, Our Dermatology Online, 2016 - Cited by 3

View Publication
Publication Date
Wed Dec 08 2021
Journal Name
J. Inf. Hiding Multim. Signal Process.
Predication of Most Significant Features in Medical Image by Utilized CNN and Heatmap.
...Show More Authors

The growth of developments in machine learning, the image processing methods along with availability of the medical imaging data are taking a big increase in the utilization of machine learning strategies in the medical area. The utilization of neural networks, mainly, in recent days, the convolutional neural networks (CNN), have powerful descriptors for computer added diagnosis systems. Even so, there are several issues when work with medical images in which many of medical images possess a low-quality noise-to-signal (NSR) ratio compared to scenes obtained with a digital camera, that generally qualified a confusingly low spatial resolution and tends to make the contrast between different tissues of body are very low and it difficult to co

... Show More
View Publication Preview PDF
Scopus (3)
Scopus
Publication Date
Wed Mar 10 2021
Journal Name
Baghdad Science Journal
Continuous On-Line Tar Measurements for Gasification Process Monitoring using Fluorescence Excitation-Emission Matrices at Elevated Temperature
...Show More Authors

Biomass has been extensively investigated, because of its presence as clean energy source. Tars and particulates formation problems are still the major challenges in development especially in the implementation of gasification technologies into nowadays energy supply systems. Laser Induced Fluorescence spectroscopy (LIF) method is incorporated for determining aromatic and Polycyclic Aromatic Hydrocarbons (PAH) produced at high temperature gasification technology. The effect of tars deposition when the gases are cooled has been highly reduced by introducing a new concept of measurement cell. The samples of PAH components have been prepared with the standard constrictions of measured PAHs by using gas chromatograph (GC). OPO laser with tun

... Show More
View Publication Preview PDF
Scopus (1)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Sat Aug 02 2025
Journal Name
Journal Of Physical Education
Unbalanced Strength Exercises Using Designed Tools and Their Effects on Some Biomechanical Variables in Young 110m Hurdles
...Show More Authors

View Publication
Publication Date
Sat Jan 01 2022
Journal Name
3rd International Scientific Conference Of Alkafeel University (iscku 2021)
Exposure and etching time effects on the fission track density in CR-39 detectors using teeth samples
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Sat Feb 01 2020
Journal Name
Structures
Experimental and numerical study on wrapping concrete cylinders post heating and cooling under preload using CFRP fabrics
...Show More Authors

This paper reports test results and describes a numerical investigation of the effectiveness of using carbon fibre reinforced polymer (CFRP) fabrics for strengthening concrete cylinders that have been undamaged and damaged due to heating under preload. The purpose of this research was to investigate whether there is any difference in the performance of CFRP-wrapped cylinders if the wrapping is done under preload, and those for which neither heating, cooling nor wrapping was done under preload. The cylinders were exposed to 30% of maximum load at ambient temperature during heating and cooling before being wrapped under preload. Of 18 Ø 100 × 200 mm identical cylinders, 6 were left as control samples without heating, 12 were exposed t

... Show More
Scopus (14)
Crossref (10)
Scopus Clarivate Crossref
Publication Date
Tue Dec 05 2023
Journal Name
Baghdad Science Journal
Robust Color Image Encryption Scheme Based on RSA via DCT by Using an Advanced Logic Design Approach
...Show More Authors

Information security in data storage and transmission is increasingly important. On the other hand, images are used in many procedures. Therefore, preventing unauthorized access to image data is crucial by encrypting images to protect sensitive data or privacy. The methods and algorithms for masking or encoding images vary from simple spatial-domain methods to frequency-domain methods, which are the most complex and reliable. In this paper, a new cryptographic system based on the random key generator hybridization methodology by taking advantage of the properties of Discrete Cosine Transform (DCT) to generate an indefinite set of random keys and taking advantage of the low-frequency region coefficients after the DCT stage to pass them to

... Show More
View Publication Preview PDF
Scopus (5)
Crossref (1)
Scopus Crossref
Publication Date
Wed Mar 02 2022
Journal Name
Journal Of Educational And Psychological Researches
The Effectiveness of a Training Program to Improve some Aspects of Sensory Integration Disorder and Its Effect on Self-Direction Among a Sample of Children with Intellectual Disabilities
...Show More Authors

The present research was conducted to investigate the effectiveness of a training program to improve some aspects of sensory integration disorder and its effect on self-direction among a sample of children with intellectual disabilities. The study sample consists of (10 subjects as an experimental group) were exposed to the training program، and the control group consists of (10 subjects as a control group) were not exposed to the training program. The study included the following tools: A scale of self-direction for intellectual disability (prepared by the researcher). Training program (prepared by the researcher). The Results of the study showed the following: There are no statistically significant differences between the means ranks

... Show More
View Publication Preview PDF
Publication Date
Fri Jan 01 2016
Journal Name
Ieee Access
Towards an Applicability of Current Network Forensics for Cloud Networks: A SWOT Analysis
...Show More Authors

In recent years, the migration of the computational workload to computational clouds has attracted intruders to target and exploit cloud networks internally and externally. The investigation of such hazardous network attacks in the cloud network requires comprehensive network forensics methods (NFM) to identify the source of the attack. However, cloud computing lacks NFM to identify the network attacks that affect various cloud resources by disseminating through cloud networks. In this paper, the study is motivated by the need to find the applicability of current (C-NFMs) for cloud networks of the cloud computing. The applicability is evaluated based on strengths, weaknesses, opportunities, and threats (SWOT) to outlook the cloud network. T

... Show More
View Publication Preview PDF
Scopus (17)
Crossref (15)
Scopus Clarivate Crossref