Preferred Language
Articles
/
uhcUP48BVTCNdQwCW2US
Survey on distributed denial of service attack detection using deep learning: A review
...Show More Authors

Distributed Denial of Service (DDoS) attacks on Web-based services have grown in both number and sophistication with the rise of advanced wireless technology and modern computing paradigms. Detecting these attacks in the sea of communication packets is very important. There were a lot of DDoS attacks that were directed at the network and transport layers at first. During the past few years, attackers have changed their strategies to try to get into the application layer. The application layer attacks could be more harmful and stealthier because the attack traffic and the normal traffic flows cannot be told apart. Distributed attacks are hard to fight because they can affect real computing resources as well as network bandwidth. DDoS attacks can also be made with smart devices that connect to the Internet, which can be infected and used as botnets. They use Deep Learning (D.L.) techniques like Convolutional Neural Network (C.N.N.) and variants of Recurrent Neural Networks (R.N.N.), such as Long Short-Term Memory (L.S.T.M.), Bidirectional L.S.T.M., Stacked L.S.T.M., and the Gat G.R.U.. These techniques have been used to detect (DDoS) attacks. The Portmap.csv file from the most recent DDoS dataset, CICDDoS2019, has been used to test D.L. approaches. Before giving the data to the D.L. approaches, the data is cleaned up. The pre-processed dataset is used to train and test the D.L. approaches. In the paper, we show how the D.L. approach works with multiple models and how they compare to each other.

View Publication
Publication Date
Wed Jan 02 2019
Journal Name
Journal Of Educational And Psychological Researches
The Effect of Using the Oral Open-Ended Questions on Achievement and Developing Creative Thinking for Third-stage Arabic Department of Education College Students
...Show More Authors

The problem of present study is determined by answering the following questions:                                                                   

1) What is the effect of using the oral open- ended questions on Students' achievement in the third-stage of Arabic department in the college of Education? 2) What is the effect of the oral open-ended questions on developing the creative thinking of students in

... Show More
View Publication Preview PDF
Publication Date
Sun Sep 26 2021
Journal Name
Modern Sport
The effect of physical exertion exercises using electrical muscle stimulation on the development of some physical and functional characteristics of women aged (40-45) years
...Show More Authors

The researchers have recently noticed the interest in the problem of overweight and how to find solutions to it until it is now at the forefront in terms of innovating various and different methods and treatment methods, and the interest in developing health fitness is one of the most important requirements of physical activity for the trainees, which led to the multiplicity of sports activities that promote the health aspect For the individual, in addition to the aesthetic aspect, the problem lies in not adopting training programs according to codified scientific foundations aiming, in addition to reducing weight, to raise the general health level of the trainee participating in fitness institutes, as the trainers do not follow the

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri May 31 2019
Journal Name
Journal Of Engineering
WSN-WCCS: A Wireless Sensor Network Wavelet Curve Ciphering System
...Show More Authors

With wireless sensor network (WSN) wide applications in popularity, securing its data becomes a requirement. This can be accomplished by encrypting sensor node data. In this paper a new an efficient symmetric cryptographic algorithm is presented. This algorithm is called wireless sensor network wavelet curve ciphering system (WSN-WCCS).  The algorithm idea based on discrete wavelet transformation to generate keys for each node in WSN.  It implements on hierarchical clustering WSN using LEACH protocol. Python programming language version 2.7 was used to create the simulator of WSN framework and implement a WSN-WCCS algorithm. The simulation result of the proposed WSN-WCCS with other symmetric algorithms has show

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Feb 18 2019
Journal Name
British Journal Of Neurosurgery
An enemy hides in the ceiling; pediatric traumatic brain injury caused by metallic ceiling fan: Case series and literature review
...Show More Authors

Purpose: We report a series of 29 pediatric patients who sustained head injuries due to metallic ceiling fans. They all were admitted to the Emergency Department of Neurosurgery Teaching Hospital in Baghdad, Iraq, during January 2015 to January 2017. Results: Pediatric ceiling fan head injuries are characterized by four traits which distinguish them from other types of head injuries; 1- Most of them were because of climbing on or jumping from furniture between the ages of two and five. 2- Most of them sustained compound depressed skull fracture which associated with intracranial lesions and pneumocephalus. 3- The most common indication for surgical intervention was because of dirty wound which mixed with hairs. 4- These variables were stati

... Show More
View Publication
Scopus (8)
Crossref (8)
Scopus Clarivate Crossref
Publication Date
Wed Jun 01 2016
Journal Name
Journal Of Economics And Administrative Sciences
Strategic Risk's Variation as a function of Competitive Intelligence Investment - An applied research on some Iraqi's manufacturing Companies –
...Show More Authors

 

ABSTRUCT

          The main aim of this research has been associated with the study of relationship between competitive intelligence and strategic risk, and to deduct their specific trends, which are interpreted as predicted by research hypotheses according to a review of literature including prior studies. The basic theme  of these hypotheses is related to the probability that declining levels of strategic risk and competitive positions of industrial companies is dependent upon the growing capacity to stay ahead of competitors in the market.

    A purposive non-random

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jan 07 2026
Journal Name
Kufa Journal Of Arts
Compound thought :Or face crises from oneself to politics A Philosophical Study on the Editions of Edgar Moran
...Show More Authors

View Publication
Publication Date
Wed Dec 15 2021
Journal Name
Al-academy
The aesthetic work of theatrical rehearsal and its directing applications "Taqasim on Al-Hayat Play as a model"
...Show More Authors

This research reviews the aesthetic variables that were founded according to (theatrical rehearsal) as one of the most important pillars on which the theatrical process is based, because of its necessity in developing theatrical art on several levels that helped the theatrical director in organizing his work, and this became clear through the research chapters represented in the first chapter (methodological framework) and the second chapter, which consisted of the first topic (the duality of watching / rehearsal) and the second topic (the applications of theatrical rehearsal in theatrical experiences), all the way to the third chapter (research procedures), which included the analysis of theatrical rehearsals (sharing on life), and the

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Nov 03 2022
Journal Name
Journal Of Materials Engineering And Performance
Influence of Scanning Velocity on a CoCrMoW Alloy Built via Selective Laser Melting: Microstructure, Mechanical, and Tribological Properties
...Show More Authors

View Publication
Scopus (8)
Crossref (8)
Scopus Clarivate Crossref
Publication Date
Wed Feb 01 2023
Journal Name
Journal Of Engineering
Study the Effect of Adding Aluminum Nanoparticles to a Smart Alloy (Cu-Al-Ni) on Hardness and Porosity
...Show More Authors

This work deals with the effect of adding aluminum nanoparticles on the mechanical properties, micro-hardness and porosity of memory-shape alloys (Cu-Al-Ni). These alloys have wide applications in various industrial fields such as (high damping compounds and self-lubricating applications). The samples are manufactured using the powder metallurgy method, which involved pressing in only one direction and sintered in a furnace surrounded by an inert gas. Four percentages (0%, 5%, 10%, and 15%) of aluminum nanoparticles were fabricated, which depended on the weight of aluminum powder (13%) in the sample under study. To find out which phase is responsible for the reliability of the formation of this type of alloy and its porosity, X-ray diffr

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jan 01 2021
Journal Name
Italian Journal Of Pure And Applied Mathematics
A note on (m, n)-full stability Banach algebra modules relative to an ideal H of Am×n
...Show More Authors

In this paper the concept of (m, n)- fully stable Banach Algebra-module relative to ideal (F − (m, n) − S − B − A-module relative to ideal) is introducing, we study some properties of F − (m, n) − S − B − A-module relative to ideal and another characterization is given