Preferred Language
Articles
/
uhcUP48BVTCNdQwCW2US
Survey on distributed denial of service attack detection using deep learning: A review
...Show More Authors

Distributed Denial of Service (DDoS) attacks on Web-based services have grown in both number and sophistication with the rise of advanced wireless technology and modern computing paradigms. Detecting these attacks in the sea of communication packets is very important. There were a lot of DDoS attacks that were directed at the network and transport layers at first. During the past few years, attackers have changed their strategies to try to get into the application layer. The application layer attacks could be more harmful and stealthier because the attack traffic and the normal traffic flows cannot be told apart. Distributed attacks are hard to fight because they can affect real computing resources as well as network bandwidth. DDoS attacks can also be made with smart devices that connect to the Internet, which can be infected and used as botnets. They use Deep Learning (D.L.) techniques like Convolutional Neural Network (C.N.N.) and variants of Recurrent Neural Networks (R.N.N.), such as Long Short-Term Memory (L.S.T.M.), Bidirectional L.S.T.M., Stacked L.S.T.M., and the Gat G.R.U.. These techniques have been used to detect (DDoS) attacks. The Portmap.csv file from the most recent DDoS dataset, CICDDoS2019, has been used to test D.L. approaches. Before giving the data to the D.L. approaches, the data is cleaned up. The pre-processed dataset is used to train and test the D.L. approaches. In the paper, we show how the D.L. approach works with multiple models and how they compare to each other.

View Publication
Publication Date
Mon Sep 28 2020
Journal Name
Journal Of Physical Education
The Effect of Increasing Rehabilitation Program Using Electric Stimulation On Rehabilitating Knee Joint Working Muscles Due to ACL Tear In Athletes
...Show More Authors

The research aimed at designing a rehabilitation program using electric stimulation for rehabilitating knee joint working muscles as a result of ACL tear using an apparatus developed by the researchers that stimulate the muscle vibration and work as well as the ability to rehabilitate the join in shorter periods. In addition to that, it aimed at identifying the effect of this program on rehabilitating the knee joint working muscles. The researchers used the experimental method on Baghdad clubs’ players who suffer from complete knee joint ACL tear aged (19 – 24) years old. The results showed that the training program developed the working muscles significantly achieving normal levels of activity.

Crossref
Publication Date
Sun Feb 22 2026
Journal Name
Journal Of Physical Education
The Effect of Increasing Rehabilitation Program Using Electric Stimulation On Rehabilitating Knee Joint Working Muscles Due to ACL Tear In Athletes
...Show More Authors

View Publication
Publication Date
Thu Sep 20 2007
Journal Name
Journal Of Physical Education
The effect of high-intensity interval training (using weights) during the special preparation period on functional variables among junior basketball players
...Show More Authors

This study is concerned with the comparison of the results of some tests of passing and dribbling of the basketball of tow different years between teams of chosen young players in Baghdad. Calculative methods were used namely (Arithmetic mean, Value digression and T.test for incompatible specimens). After careful calculative treatments, it has been that there were abstract or no abstract differences in the find results of chestpass, highdribble and cross-over dribble. The clubs were: (Al-Khark, Air defence, Police and Al-Adamiyah) each one separate from the other for the year (2000-2001). After all that many findings were reached such as the lack of objective valuation (periodical tests) between one sport season and the other. In the light

... Show More
Preview PDF
Publication Date
Mon Mar 20 2023
Journal Name
Sustainability
The Economic Impacts of Using Renewable Energy Technologies for Irrigation Water Pumping and Nanoparticle Fertilizers on Agri-Food Production in Iraq
...Show More Authors

While traditional energy sources such as oil, coal, and natural gas drive economic growth, they also seriously affect people’s health and the environment. Renewable energies (RE) are presently seen as an efficient choice for attaining long-term sustainability in development. They provide an adequate response to climate change and supply sufficient electricity. The current situation in Iraq results from a decades-long scarcity of reliable electricity, which has impacted various industries, including agriculture. There are diverse prospects for using renewable energy sources to address the present power crisis. The economic and environmental impacts of renewable energy systems were investigated in this study by using the solar pumpi

... Show More
View Publication
Scopus (3)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Fri Jan 13 2023
Journal Name
Atmosphere
Impact of North African Sand and Dust Storms on the Middle East Using Iraq as an Example: Causes, Sources, and Mitigation
...Show More Authors

This study aims to determine the reasons for the increase in the frequency of sand and dust storms in the Middle East and to identify their sources and mitigate them. A set of climatic data from 60 years (1960–2022) was analyzed. Sand storms in Iraq are a silty sand mature arkose composed of 72.7% sand, 25.1% silt, and 2.19% clay; the clay fraction in dust storms constitutes 70%, with a small amount of silt (20.6%) and sand (9.4%). Dust and sand storms (%) are composed of quartz (49.2, 67.1), feldspar (4.9, 20.9), calcite (38, 5), gypsum (4.8, 0.4), dolomite (0.8, 1.0), and heavy minerals (3.2, 6.6). Increasing temperatures in Iraq, by an average of 2 °C for sixty years, have contributed to an increase in the number of dust storm

... Show More
View Publication Preview PDF
Crossref (57)
Crossref
Publication Date
Thu Jun 15 2023
Journal Name
Journal Of Population Therapeutics And Clinical Pharmacology
Detection the Phylogenetic groups of E. coli that isolated from diarrheal in children under five years and study their relationship of common serotypes in Baghdad hospitals.
...Show More Authors

Preview PDF
Publication Date
Fri Jan 01 2016
Journal Name
Ieee Access
Towards an Applicability of Current Network Forensics for Cloud Networks: A SWOT Analysis
...Show More Authors

In recent years, the migration of the computational workload to computational clouds has attracted intruders to target and exploit cloud networks internally and externally. The investigation of such hazardous network attacks in the cloud network requires comprehensive network forensics methods (NFM) to identify the source of the attack. However, cloud computing lacks NFM to identify the network attacks that affect various cloud resources by disseminating through cloud networks. In this paper, the study is motivated by the need to find the applicability of current (C-NFMs) for cloud networks of the cloud computing. The applicability is evaluated based on strengths, weaknesses, opportunities, and threats (SWOT) to outlook the cloud network. T

... Show More
View Publication Preview PDF
Scopus (17)
Crossref (15)
Scopus Clarivate Crossref
Publication Date
Thu Jun 01 2023
Journal Name
Journal Of Engineering
A Control Program for Hydropower Operation Based on Minimizing the Principal Stress Values on the Dam Body: Mosul Dam Case Study
...Show More Authors

This study examines the vibrations produced by hydropower operations to improve embankment dam safety. This study consists of two parts: In the first part, ANSYS-CFX was used to generate a three-dimensional (3-D) finite volume (FV) model to simulate a vertical Francis turbine unit in the Mosul hydropower plant. The pressure pattern result of the turbine model was transformed into the dam body to show how the turbine unit's operation affects the dam's stability. The upstream reservoir conditions, various flow rates, and fully open inlet gates were considered. In the second part of this study, a 3-D FE Mosul dam model was simulated using an ANSYS program. The operational turbine model's water pressure pattern is conveyed t

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Mar 21 2025
Journal Name
The Indonesian Journal Of Community And Occupational Medicine
Observance of the Adherence to Antibiotic Prescriptions by Iraqi Dental Patients: A Different Perspective on Antimicrobial Resistance
...Show More Authors

Background: The excessive use and abuse of antibiotics contribute to bacterial resistance, raising the risk of complications and treatment failures. This study investigates adherence to antibiotic prescriptions among Iraqi dental patients, highlighting implications for antimicrobial resistance.Objective: To assess adherence levels and identify factors influencing antibiotic therapy compliance among dental patients.Methods: A cross-sectional survey was conducted in which adult dental patients aged 18 and older, who had been prescribed antibiotics within the past year, participated. The modified Morisky Medication Adherence Scale-8 items was used to evaluate adherence, and data were analyzed with IBM SPSS Statistics software V26.Results: Amon

... Show More
View Publication
Publication Date
Sat Feb 05 2022
Journal Name
Applied Nanoscience
RETRACTED ARTICLE: The impact of fear on a stage structure prey–predator system with anti-predator behavior
...Show More Authors

A prey-predator interaction model has been suggested in which the population of a predator consists of a two-stage structure. Modified Holling's disk equation is used to describe the consumption of the prey so that it involves the additional source of food for the predator. The fear function is imposed on prey. It is supposed that the prey exhibits anti-predator behavior and may kill the adult predator due to their struggle against predation. The proposed model is investigated for existence, uniqueness, and boundedness. After determining all feasible equilibrium points, the local stability analyses are performed. In addition, global stability analyses for this model using the Lyapunov method are investigated. The chance of occurrence of loc

... Show More
Scopus (7)
Crossref (3)
Scopus Clarivate Crossref