Preferred Language
Articles
/
uhcUP48BVTCNdQwCW2US
Survey on distributed denial of service attack detection using deep learning: A review
...Show More Authors

Distributed Denial of Service (DDoS) attacks on Web-based services have grown in both number and sophistication with the rise of advanced wireless technology and modern computing paradigms. Detecting these attacks in the sea of communication packets is very important. There were a lot of DDoS attacks that were directed at the network and transport layers at first. During the past few years, attackers have changed their strategies to try to get into the application layer. The application layer attacks could be more harmful and stealthier because the attack traffic and the normal traffic flows cannot be told apart. Distributed attacks are hard to fight because they can affect real computing resources as well as network bandwidth. DDoS attacks can also be made with smart devices that connect to the Internet, which can be infected and used as botnets. They use Deep Learning (D.L.) techniques like Convolutional Neural Network (C.N.N.) and variants of Recurrent Neural Networks (R.N.N.), such as Long Short-Term Memory (L.S.T.M.), Bidirectional L.S.T.M., Stacked L.S.T.M., and the Gat G.R.U.. These techniques have been used to detect (DDoS) attacks. The Portmap.csv file from the most recent DDoS dataset, CICDDoS2019, has been used to test D.L. approaches. Before giving the data to the D.L. approaches, the data is cleaned up. The pre-processed dataset is used to train and test the D.L. approaches. In the paper, we show how the D.L. approach works with multiple models and how they compare to each other.

View Publication
Publication Date
Thu Dec 01 2022
Journal Name
Journal Of Education For Pure Science- University Of Thi-qar
Dorsal Hand Vein Image Recognition: A Review
...Show More Authors

Subcutaneous vascularization has become a new solution for identification management over the past few years. Systems based on dorsal hand veins are particularly promising for high-security settings. The dorsal hand vein recognition system comprises the following steps: acquiring images from the database and preprocessing them, locating the region of interest, and extracting and recognizing information from the dorsal hand vein pattern. This paper reviewed several techniques for obtaining the dorsal hand vein area and identifying a person. Therefore, this study just provides a comprehensive review of existing previous theories. This model aims to offer the improvement in the accuracy rate of the system that was shown in previous studies and

... Show More
Publication Date
Thu Dec 09 2021
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Cressa cretica Pharmacognosy, and Pharmacology (A review )
...Show More Authors

 

Cressa cretica (Shuwwayl) is a halophytic that belongs to Convolvulaceae, naturally grown in the Middle East including Iraq. Traditionally the plant is used as a paste for sore treatment, also it is used for fever, jaundice, and other illness. Regarding nonclinical use it is used as goat, sheep, and camel feed also as an oil source. Flavonoids including quercetin, kamepferol, apigenin, and their glycosides, phenolic acid as chlorogenic acid, and phytosterols mainly ?–sitosterol were the most important phytochemicals that were detected in this halophyte. Crude ethanolic, methanolic extracts and ethyl acetate fraction of the areal parts were used in clinical studies and demonstrated various effe

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (1)
Scopus Crossref
Publication Date
Wed Sep 07 2022
Journal Name
2022 Iraqi International Conference On Communication And Information Technologies (iiccit)
Vehicular Ad-hoc Network (VANET) – A Review
...Show More Authors

This paper explores VANET topics: architecture, characteristics, security, routing protocols, applications, simulators, and 5G integration. We update, edit, and summarize some of the published data as we analyze each notion. For ease of comprehension and clarity, we give part of the data as tables and figures. This survey also raises issues for potential future research topics, such as how to integrate VANET with a 5G cellular network and how to use trust mechanisms to enhance security, scalability, effectiveness, and other VANET features and services. In short, this review may aid academics and developers in choosing the key VANET characteristics for their objectives in a single document.

View Publication
Scopus (5)
Crossref (4)
Scopus Crossref
Publication Date
Thu Jun 15 2023
Journal Name
Journal Of Baghdad College Of Dentistry
Molar tubes and failure rates–A review
...Show More Authors

Objectives: To review the failure rates of molar tubes and the effect of molar tube base design, adhesive type, and bonding technique on the failure rates of molar tubes. Data: The revolution of molar bonding greatly impacted fixed orthodontic appliance treatment by reducing chair-side time and improving patient comfort. Even with the many advantages of molar bonding, clinicians sometimes hesitate to use molar tubes due to their failure rates. Sources: Internet sources, such as Pubmed and Google Scholar. Study selection: studies testing the bond failure rate of molar tubes. Conclusions: The failure rate of the molar tubes can be reduced and the bond strength of the molar tubes can be improved by changing the design of the molar tube base

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (1)
Scopus Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Annals Of Tropical Medicine And Public Health
Dithiocarbamates derivatives as anticancer agents: A Review
...Show More Authors

View Publication
Crossref (5)
Crossref
Publication Date
Tue Jan 02 2018
Journal Name
Journal Of Educational And Psychological Researches
The Effect of Using Brainstorming Technique on the Essay Writing and Self- regulation Learning of the Iraqi Secondary Students
...Show More Authors

         This study investigated the effect of using brainstorming as a teaching technique on the students’ performance in writing different kinds of essays and self regulation among the secondary students. The total population of this study, consisted of (51) female students of the 5th Secondary grade in Al –kawarzmi School in Erbil during the academic year 2015-2016. The chosen sample consisted of 40 female students, has been divided into two groups. Each one consists of (20) students to represent the experimental group and the control one. Brainstorming technique is used to teach the experimental group, and the conventional method is used to teach the control group. The study inst

... Show More
View Publication Preview PDF
Publication Date
Thu Dec 16 2021
Journal Name
Journal Of Advance Research In Chemical Sciences
Study of Schiff Bases Complexes of Trimethoprim: A Review
...Show More Authors

Trimethoprim derivative Schiff bases are versatile ligands synthesized with carbonyl groups from the condensation of primary amines (amino acids). Because of their broad range of biological activity, these compounds are very important in the medical and pharmaceutical fields. Biological activities such as antibacterial, antifungal and antitumor activity are often seen. Transition metal complexes derived from biological activity Schiff base ligands have been commonly used.

View Publication Preview PDF
Publication Date
Thu Sep 16 2021
Journal Name
Journal Of Advance Research In Chemical Sciences
Study of Schiff Bases Complexes of Trimethoprim: A Review
...Show More Authors

Trimethoprim derivative Schiff bases are versatile ligands synthesized with carbonyl groups from the condensation of primary amines (amino acids). Because of their broad range of biological activity, these compounds are very important in the medical and pharmaceutical fields. Biological activities such as antibacterial, antifungal and antitumor activity are often seen. Transition metal complexes derived from biological activity Schiff base ligands have been commonly used

Publication Date
Wed Feb 01 2023
Journal Name
Baghdad Science Journal
Breast Cancer MRI Classification Based on Fractional Entropy Image Enhancement and Deep Feature Extraction
...Show More Authors

Disease diagnosis with computer-aided methods has been extensively studied and applied in diagnosing and monitoring of several chronic diseases. Early detection and risk assessment of breast diseases based on clinical data is helpful for doctors to make early diagnosis and monitor the disease progression. The purpose of this study is to exploit the Convolutional Neural Network (CNN) in discriminating breast MRI scans into pathological and healthy. In this study, a fully automated and efficient deep features extraction algorithm that exploits the spatial information obtained from both T2W-TSE and STIR MRI sequences to discriminate between pathological and healthy breast MRI scans. The breast MRI scans are preprocessed prior to the feature

... Show More
View Publication Preview PDF
Scopus (21)
Crossref (6)
Scopus Clarivate Crossref
Publication Date
Sat Dec 30 2023
Journal Name
Iraqi Journal Of Science
Energy Consumption Prediction of Smart Buildings by Using Machine Learning Techniques
...Show More Authors

     This paper presents an IoT smart building platform with fog and cloud computing capable of performing near real-time predictive analytics in fog nodes. The researchers explained thoroughly the internet of things in smart buildings, the big data analytics, and the fog and cloud computing technologies. They then presented the smart platform, its requirements, and its components. The datasets on which the analytics will be run will be displayed. The linear regression and the support vector regression data mining techniques are presented. Those two machine learning models are implemented with the appropriate techniques, starting by cleaning and preparing the data visualization and uncovering hidden information about the behavior of

... Show More
View Publication Preview PDF
Scopus Crossref