Preferred Language
Articles
/
uhcUP48BVTCNdQwCW2US
Survey on distributed denial of service attack detection using deep learning: A review
...Show More Authors

Distributed Denial of Service (DDoS) attacks on Web-based services have grown in both number and sophistication with the rise of advanced wireless technology and modern computing paradigms. Detecting these attacks in the sea of communication packets is very important. There were a lot of DDoS attacks that were directed at the network and transport layers at first. During the past few years, attackers have changed their strategies to try to get into the application layer. The application layer attacks could be more harmful and stealthier because the attack traffic and the normal traffic flows cannot be told apart. Distributed attacks are hard to fight because they can affect real computing resources as well as network bandwidth. DDoS attacks can also be made with smart devices that connect to the Internet, which can be infected and used as botnets. They use Deep Learning (D.L.) techniques like Convolutional Neural Network (C.N.N.) and variants of Recurrent Neural Networks (R.N.N.), such as Long Short-Term Memory (L.S.T.M.), Bidirectional L.S.T.M., Stacked L.S.T.M., and the Gat G.R.U.. These techniques have been used to detect (DDoS) attacks. The Portmap.csv file from the most recent DDoS dataset, CICDDoS2019, has been used to test D.L. approaches. Before giving the data to the D.L. approaches, the data is cleaned up. The pre-processed dataset is used to train and test the D.L. approaches. In the paper, we show how the D.L. approach works with multiple models and how they compare to each other.

View Publication
Publication Date
Tue Jun 01 2021
Journal Name
Baghdad Science Journal
Improved Image Security in Internet of Thing (IOT) Using Multiple Key AES
...Show More Authors

Image is an important digital information that used in many internet of things (IoT) applications such as transport, healthcare, agriculture, military, vehicles and wildlife. etc. Also, any image has very important characteristic such as large size, strong correlation and huge redundancy, therefore, encrypting it by using single key Advanced Encryption Standard (AES) through IoT communication technologies makes it vulnerable to many threats, thus, the pixels that have the same values will be encrypted to another pixels that have same values when they use the same key. The contribution of this work is to increase the security of transferred image. This paper proposed multiple key AES algorithm (MECCAES) to improve the security of the tran

... Show More
View Publication Preview PDF
Scopus (19)
Crossref (8)
Scopus Clarivate Crossref
Publication Date
Thu Jun 01 2023
Journal Name
Baghdad Science Journal
Determination of essential and trace elements in various vegetables using ICP-MS
...Show More Authors

Metal contents in vegetables are interesting because of issues related to food safety and ‎potential health risks. The availability of these metals in the human body ‎may perform many biochemical functions and some of them linked with various diseases at ‎high levels. The current study aimed to evaluate the concentration of various metals in ‎common local consumed vegetables using ICP-MS. The concentrations of metals in vegetables ‎of tarragon, Bay laurel, dill, Syrian mesquite, vine leaves, thymes, arugula, basil, common ‎purslane and parsley of this study were found to be in the range of, 76-778 for Al, 10-333 for B, 4-119 for ‎Ba, ‎2812‎-24645 for Ca, 0.1-0.32 for Co, 201-464 for Fe, 3661-46400 for K, 0.31–‎‎1.

... Show More
View Publication Preview PDF
Scopus (5)
Crossref (2)
Scopus Crossref
Publication Date
Wed Mar 16 2022
Journal Name
2022 Muthanna International Conference On Engineering Science And Technology (micest)
Virtual Performance Evaluation of Net-Zero Energy Building (NZEB) Using BIM Analysis
...Show More Authors

View Publication
Scopus (4)
Crossref (8)
Scopus Crossref
Publication Date
Wed Dec 14 2016
Journal Name
Journal Of Baghdad College Of Dentistry
Evaluation of Mandibular Third Molar Position by Using Space-Width Ratio Method
...Show More Authors

Background: The prediction of changes in the mandibular third molar position and eruption is an important clinical concern because third molar retention may be beneficial for orthodontic anchorage. The aims of this study were to assess the mandibular third molar position by using medical CT scan and lateral reconstructed radiograph and evaluate gender differences. Materials and Methods: The sample of present study consisted of 39 patients (18 males and 21 females) with age range 11-15 years who were attending at Al-Suwayra General Hospital/ the Computerized Tomography department. The distance from anterior edge of ramus to distal surface of permanent mandibular second molar and mesio-distal width of developing mandibular third molar were

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue May 01 2018
Journal Name
Journal Of Physics: Conference Series
Producing High Purity of Metal Oxide Nano Structural Using Simple Chemical Method
...Show More Authors

View Publication
Scopus (12)
Crossref (10)
Scopus Clarivate Crossref
Publication Date
Thu Nov 14 2019
Journal Name
Journal Of Physics: Conference Series
Estimate the Rate of Contamination in Baghdad Soils By Using Numerical Method
...Show More Authors

Journal of Physics: Conference Series PAPER • THE FOLLOWING ARTICLE ISOPEN ACCESS Estimate the Rate of Contamination in Baghdad Soils By Using Numerical Method Luma Naji Mohammed Tawfiq1, Nadia H Al-Noor2 and Taghreed H Al-Noor1 Published under licence by IOP Publishing Ltd Journal of Physics: Conference Series, Volume 1294, Issue 3 Citation Luma Naji Mohammed Tawfiq et al 2019 J. Phys.: Conf. Ser. 1294 032020 DOI 10.1088/1742-6596/1294/3/032020 DownloadArticle PDF References Download PDF 135 Total downloads 88 total citations on Dimensions. Turn on MathJax Share this article Share this content via email Share on Facebook (opens new window) Share on Twitter (opens new window) Share on Mendeley (opens new window) Hide article and author

... Show More
View Publication Preview PDF
Scopus (18)
Crossref (10)
Scopus Crossref
Publication Date
Tue Jan 05 2021
Journal Name
Kufa Journal Of Engineering
IMPROVEMENT OF MARSHALL PROPERTIES FOR HOT MIX ASPHALT BY USING CERAMIC FIBER
...Show More Authors

Crossref
Publication Date
Sun Jun 03 2018
Journal Name
Baghdad Science Journal
Synthesis, Spectroscopic Characterization of Cobalt ComplexfromC16H19N3O3S and photodegradation using prepared Nano TiO2catalyst
...Show More Authors

Coblatcomplex has been prepared by reaction between C16H19N3O3S (L) as ligand and metal salt (II). The prepared complex were characterized by infrared spectra, electromic spectra, magnetic susceptibility, molar conductivity measurement and metal analysis by atomic absorption and (C.H.N) analysis. From these studies tetrahedral geometry structure for the complex was suggested. The photodegredation of complex were study using photoreaction cell and preparednanoTiO2 catalyst in different conditions (concentration, temperatures, pH).The results show that the recation is of a first order with activation energy equal to (6.6512 kJ /mol).

Scopus (1)
Scopus Crossref
Publication Date
Wed Mar 01 2023
Journal Name
Journal Of Engineering
Producing Load Bearing Block Using LECA as Partial Replacement of Coarse Aggregate
...Show More Authors

The ability to produce load-bearing masonry units adopting ACI 211.1 mix design using (1:3.2:2.5) as (cement: fine aggregate: coarse aggregate) with slump range (25-50mm) which can conform (dimension, absorption, and compressive strength) within IQS 1077/1987 requirements type A was our main goal of the study. The ability to use low cement content (300 kg/m3) to handle our market price products since the most consumption in wall construction for low-cost buildings was encouraging. The use of (10 and 20%) of LECA as partial volume replacement of coarse aggregate to reduce the huge weight of masonry blocks can also be recommended. The types of production of the load-bearing masonry units were A and B for (

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sun Jan 01 2017
Journal Name
Al–bahith Al–a'alami
The Motivations of Using Facebook by Old People and their Achieved Need
...Show More Authors

This research deals with the motives of the use of Facebook by elderly people and the achieved needs, which leads the researcher to ask an important question: why an old persons use Facebook and are the achieved needs through   which they got?  The research aims to find out the habits and patterns of using Facebook by old men and stands on the main motives of the elderly in their use of Facebook. It also identifies the most prominent needs that have been made for the elderly as a result of their use of Facebook.

The research is a descriptive one in which the researcher uses survey method to achieve the desired goals. The researcher has chosen a group of old men from Diyala province. The total sample number is about

... Show More
View Publication Preview PDF
Crossref