Preferred Language
Articles
/
uhcUP48BVTCNdQwCW2US
Survey on distributed denial of service attack detection using deep learning: A review
...Show More Authors

Distributed Denial of Service (DDoS) attacks on Web-based services have grown in both number and sophistication with the rise of advanced wireless technology and modern computing paradigms. Detecting these attacks in the sea of communication packets is very important. There were a lot of DDoS attacks that were directed at the network and transport layers at first. During the past few years, attackers have changed their strategies to try to get into the application layer. The application layer attacks could be more harmful and stealthier because the attack traffic and the normal traffic flows cannot be told apart. Distributed attacks are hard to fight because they can affect real computing resources as well as network bandwidth. DDoS attacks can also be made with smart devices that connect to the Internet, which can be infected and used as botnets. They use Deep Learning (D.L.) techniques like Convolutional Neural Network (C.N.N.) and variants of Recurrent Neural Networks (R.N.N.), such as Long Short-Term Memory (L.S.T.M.), Bidirectional L.S.T.M., Stacked L.S.T.M., and the Gat G.R.U.. These techniques have been used to detect (DDoS) attacks. The Portmap.csv file from the most recent DDoS dataset, CICDDoS2019, has been used to test D.L. approaches. Before giving the data to the D.L. approaches, the data is cleaned up. The pre-processed dataset is used to train and test the D.L. approaches. In the paper, we show how the D.L. approach works with multiple models and how they compare to each other.

View Publication
Publication Date
Thu Dec 01 2022
Journal Name
Journal Of Education For Pure Science- University Of Thi-qar
Dorsal Hand Vein Image Recognition: A Review
...Show More Authors

Subcutaneous vascularization has become a new solution for identification management over the past few years. Systems based on dorsal hand veins are particularly promising for high-security settings. The dorsal hand vein recognition system comprises the following steps: acquiring images from the database and preprocessing them, locating the region of interest, and extracting and recognizing information from the dorsal hand vein pattern. This paper reviewed several techniques for obtaining the dorsal hand vein area and identifying a person. Therefore, this study just provides a comprehensive review of existing previous theories. This model aims to offer the improvement in the accuracy rate of the system that was shown in previous studies and

... Show More
Publication Date
Wed Aug 27 2025
Journal Name
Al-salam Journal For Medical Science
Nanotechnology in Molecular Genetics: A literature review
...Show More Authors

Nanotechnology extends the limits of molecular diagnostics to the nanoscale. This study describes some of the details of how the body interacts with nanoparticles. Biological tests measuring the presence or activity of selected substances become quicker, more sensitive, and more flexible when certain nanoscale particles are put to work as tags. Particular emphasis is placed on the effects of surface changes on body-borne particles, their transport within the body, and the dose-response effect. Other considerations include the definition of "persistent" in the context of therapy, FDA scientific committees, and the need for nanoparticle tracking. In short, there have been dramatic changes in molecular and genetic research findings, as well as

... Show More
View Publication Preview PDF
Publication Date
Wed Jan 01 2020
Journal Name
Annals Of Tropical Medicine And Public Health
Dithiocarbamates derivatives as anticancer agents: A Review
...Show More Authors

View Publication
Crossref (9)
Crossref
Publication Date
Sun Jun 30 2024
Journal Name
Tikrit Journal For Dental Sciences
Additive Manufacturing Technologies in Dentistry (A Review)
...Show More Authors

Background: Significant advancements have been observed in the additive manufacturing (AM) technology industry in recent decades. Due to the inherent variations among each AM manufacturing technique, new areas of investigation continually arise and require consideration. Additionally, the novel applications of additive manufacturing present new difficulties and possibilities for targeted focus. The aim of this manuscript is to conduct a comprehensive literature review that describes the various processing methods, precision levels, types of materials utilized, and potential applications of 3D printing technology in the field of dentistry. Data: An online search was conducted on databases including Research Gate, Google Scholar, and

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Jun 15 2023
Journal Name
Journal Of Baghdad College Of Dentistry
Molar tubes and failure rates–A review
...Show More Authors

Objectives: To review the failure rates of molar tubes and the effect of molar tube base design, adhesive type, and bonding technique on the failure rates of molar tubes. Data: The revolution of molar bonding greatly impacted fixed orthodontic appliance treatment by reducing chair-side time and improving patient comfort. Even with the many advantages of molar bonding, clinicians sometimes hesitate to use molar tubes due to their failure rates. Sources: Internet sources, such as Pubmed and Google Scholar. Study selection: studies testing the bond failure rate of molar tubes. Conclusions: The failure rate of the molar tubes can be reduced and the bond strength of the molar tubes can be improved by changing the design of the molar tube base

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (2)
Scopus Crossref
Publication Date
Wed Sep 07 2022
Journal Name
2022 Iraqi International Conference On Communication And Information Technologies (iiccit)
Vehicular Ad-hoc Network (VANET) – A Review
...Show More Authors

This paper explores VANET topics: architecture, characteristics, security, routing protocols, applications, simulators, and 5G integration. We update, edit, and summarize some of the published data as we analyze each notion. For ease of comprehension and clarity, we give part of the data as tables and figures. This survey also raises issues for potential future research topics, such as how to integrate VANET with a 5G cellular network and how to use trust mechanisms to enhance security, scalability, effectiveness, and other VANET features and services. In short, this review may aid academics and developers in choosing the key VANET characteristics for their objectives in a single document.

View Publication
Scopus (11)
Crossref (7)
Scopus Crossref
Publication Date
Tue Feb 01 2022
Journal Name
Int. J. Nonlinear Anal. Appl.
Computer-based plagiarism detection techniques: A comparative study
...Show More Authors

Plagiarism is becoming more of a problem in academics. It’s made worse by the ease with which a wide range of resources can be found on the internet, as well as the ease with which they can be copied and pasted. It is academic theft since the perpetrator has ”taken” and presented the work of others as his or her own. Manual detection of plagiarism by a human being is difficult, imprecise, and time-consuming because it is difficult for anyone to compare their work to current data. Plagiarism is a big problem in higher education, and it can happen on any topic. Plagiarism detection has been studied in many scientific articles, and methods for recognition have been created utilizing the Plagiarism analysis, Authorship identification, and

... Show More
Publication Date
Mon Dec 20 2021
Journal Name
Baghdad Science Journal
Generative Adversarial Network for Imitation Learning from Single Demonstration
...Show More Authors

Imitation learning is an effective method for training an autonomous agent to accomplish a task by imitating expert behaviors in their demonstrations. However, traditional imitation learning methods require a large number of expert demonstrations in order to learn a complex behavior. Such a disadvantage has limited the potential of imitation learning in complex tasks where the expert demonstrations are not sufficient. In order to address the problem, we propose a Generative Adversarial Network-based model which is designed to learn optimal policies using only a single demonstration. The proposed model is evaluated on two simulated tasks in comparison with other methods. The results show that our proposed model is capable of completing co

... Show More
View Publication Preview PDF
Scopus Clarivate Crossref
Publication Date
Mon Jan 08 2024
Journal Name
Al-academy
Designing a module in light of cognitive learning theories and their impact on the achievement of students of the Department of Art Education and their motivation in learning the subject of aesthetics.
...Show More Authors

This research aims to:
1 – Make a proposed module for (aesthetics) for the second stage - Department of Art Education under education theories.
2 - Verification from the effect of the proposed module on student achievement and motivation towards learning aesthetics material.
To verification the second goal we wording these two hypotheses:
1- There are no individual differences with statistically significant at level (0.05) between the student's scores average. (Experimental group ) who studied according to the proposed module and the average student's scores (control group) who studied in the usual way for the achievement test for the Aesthetics material.
2- There are no individual differences with statistically signifi

... Show More
View Publication Preview PDF
Publication Date
Mon Jul 08 2024
Journal Name
Journal Of Microbiology, Biotechnology And Food Sciences
SYNERGISTIC EFFECTS OF NEEM OIL AND GENTAMICIN ON PSEUDOMONAS AERUGINOSA VIA PHZM GENE DOWNREGULATION: A COMPREHENSIVE REVIEW
...Show More Authors

Exploring the antibacterial potential of neem oil (Azadirachta indica) in combination with gentamicin (GEN) against pathogenic molds, especially Pseudomonas aeruginosa, has drawn concern due to the quest for natural treatment options against incurable diseases. Prospective research directions include looking for natural cures for many of the currently incurable diseases available now. microbial identification system, were used to identify the isolates. The research utilized a range of methods, such as the diffusion agar well (AWD) assays, TEM (transmission electron microscopy) analysis, minimum inhibitory concentration (MIC) assays, and real-time PCR (RT-qPCR) to analyze bacterial expression and the antibacterial action of neem oil (Azadira

... Show More
View Publication
Scopus (7)
Crossref (8)
Scopus Clarivate Crossref