Preferred Language
Articles
/
uhcUP48BVTCNdQwCW2US
Survey on distributed denial of service attack detection using deep learning: A review
...Show More Authors

Distributed Denial of Service (DDoS) attacks on Web-based services have grown in both number and sophistication with the rise of advanced wireless technology and modern computing paradigms. Detecting these attacks in the sea of communication packets is very important. There were a lot of DDoS attacks that were directed at the network and transport layers at first. During the past few years, attackers have changed their strategies to try to get into the application layer. The application layer attacks could be more harmful and stealthier because the attack traffic and the normal traffic flows cannot be told apart. Distributed attacks are hard to fight because they can affect real computing resources as well as network bandwidth. DDoS attacks can also be made with smart devices that connect to the Internet, which can be infected and used as botnets. They use Deep Learning (D.L.) techniques like Convolutional Neural Network (C.N.N.) and variants of Recurrent Neural Networks (R.N.N.), such as Long Short-Term Memory (L.S.T.M.), Bidirectional L.S.T.M., Stacked L.S.T.M., and the Gat G.R.U.. These techniques have been used to detect (DDoS) attacks. The Portmap.csv file from the most recent DDoS dataset, CICDDoS2019, has been used to test D.L. approaches. Before giving the data to the D.L. approaches, the data is cleaned up. The pre-processed dataset is used to train and test the D.L. approaches. In the paper, we show how the D.L. approach works with multiple models and how they compare to each other.

View Publication
Publication Date
Fri Jun 20 2025
Journal Name
Journal Of Kufa For Chemical Sciences
Biosynthesis of Zirconium Oxide Nanoparticles from Different Plant Extracts: A Review
...Show More Authors

View Publication
Publication Date
Tue Dec 31 2024
Journal Name
Folia Medica
Microbial boundaries in peri-implantitis: a review of pathogen-related advances
...Show More Authors

In the field of implantology, peri-implantitis is still a common complication of implant failure. Similar to periodontal disease, this kind of pathological condition is characterized by inflammation of the tissues surrounding dental implants or fillings. The sources of infection have been shown to be chronic periodontitis and poor maintenance of the communion. A thorough examination of the intricate components of peri-implantitis was sought in this review in order to identify common characteristics of the disease with regard to bacteria, biofilm formation, host immunological responses, diagnostic tools, and therapeutic treatments. The aim of this study was to provide a detailed overview of the different bacterial species associated

... Show More
View Publication
Scopus (1)
Scopus Crossref
Publication Date
Fri May 01 2020
Journal Name
Iop Conference Series: Materials Science And Engineering
A review of ultra-high temperature materials for thermal protection system
...Show More Authors
Abstract<p>Ultra-High Temperature Materials (UHTMs) are at the base of entire aerospace industry; these high stable materials at temperatures exceeding 1600 °C are used to manage the heat shielding to protect vehicles and probes during the hypersonic flight through reentry trajectory against aerodynamic heating and reducing plasma surface interaction. Those materials are also recognized as Thermal Protection System Materials (TPSMs). The structural materials used during the high-temperature oxidizing environment are mainly limited to SiC, oxide ceramics, and composites. In addition to that, silicon-based ceramic has a maximum-use at 1700 °C approximately; as it is an active oxidation process o</p> ... Show More
View Publication
Scopus (53)
Crossref (45)
Scopus Clarivate Crossref
Publication Date
Fri Apr 25 2025
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences (ihjpas)
Spectrophotometric Investigations for Simultaneous Analysis of Certain Antibacterial: A Brief Review
...Show More Authors

Antibacterial substances belong to a group of compounds that attack dangerous microorganisms. Therefore, killing bacteria or reducing their metabolic activity will lessen their adverse effects on a biological system. They originated from either synthetic materials, microbes, or mold. Many of these medications treat the gram-negative bacteria from the critical precedence group, such as pseudomonas, carbapenem-resistant acinetobacter, and enterobacterales. This study aims to investigate the simultaneous analysis of specific antibacterial spectrophotometrically. The WHO maintains this list of priority infections with antibiotic resistance. Drug combinations in single dosage forms are becoming increasingly popular in the pharmaceutical industry

... Show More
Publication Date
Tue Oct 18 2022
Journal Name
Ieee Access
Plain, Edge, and Texture Detection Based on Orthogonal Moment
...Show More Authors

Image pattern classification is considered a significant step for image and video processing. Although various image pattern algorithms have been proposed so far that achieved adequate classification, achieving higher accuracy while reducing the computation time remains challenging to date. A robust image pattern classification method is essential to obtain the desired accuracy. This method can be accurately classify image blocks into plain, edge, and texture (PET) using an efficient feature extraction mechanism. Moreover, to date, most of the existing studies are focused on evaluating their methods based on specific orthogonal moments, which limits the understanding of their potential application to various Discrete Orthogonal Moments (DOM

... Show More
Scopus (13)
Crossref (14)
Scopus Clarivate Crossref
Publication Date
Tue Oct 04 2022
Journal Name
Ieee Access
Plain, Edge, and Texture Detection Based on Orthogonal Moment
...Show More Authors

Image pattern classification is considered a significant step for image and video processing.Although various image pattern algorithms have been proposed so far that achieved adequate classification,achieving higher accuracy while reducing the computation time remains challenging to date. A robust imagepattern classification method is essential to obtain the desired accuracy. This method can be accuratelyclassify image blocks into plain, edge, and texture (PET) using an efficient feature extraction mechanism.Moreover, to date, most of the existing studies are focused on evaluating their methods based on specificorthogonal moments, which limits the understanding of their potential application to various DiscreteOrthogonal Moments (DOMs). The

... Show More
Publication Date
Sat Aug 01 2015
Journal Name
International Journal Of Advanced Research In Computer Science And Software Engineering
Partial Encryption for Colored Images Based on Face Detection
...Show More Authors

Publication Date
Mon May 11 2020
Journal Name
Baghdad Science Journal
Moving Objects Detection Based on Frequency Domain: image processing
...Show More Authors

In this research a proposed technique is used to enhance the frame difference technique performance for extracting moving objects in video file. One of the most effective factors in performance dropping is noise existence, which may cause incorrect moving objects identification. Therefore it was necessary to find a way to diminish this noise effect. Traditional Average and Median spatial filters can be used to handle such situations. But here in this work the focus is on utilizing spectral domain through using Fourier and Wavelet transformations in order to decrease this noise effect. Experiments and statistical features (Entropy, Standard deviation) proved that these transformations can stand to overcome such problems in an elegant way.

... Show More
View Publication Preview PDF
Scopus (4)
Scopus Clarivate Crossref
Publication Date
Sat Apr 01 2023
Journal Name
Baghdad Science Journal
Interior Visual Intruders Detection Module Based on Multi-Connect Architecture MCA Associative Memory
...Show More Authors

Most recent studies have focused on using modern intelligent techniques spatially, such as those
developed in the Intruder Detection Module (IDS). Such techniques have been built based on modern
artificial intelligence-based modules. Those modules act like a human brain. Thus, they should have had the
ability to learn and recognize what they had learned. The importance of developing such systems came after
the requests of customers and establishments to preserve their properties and avoid intruders’ damage. This
would be provided by an intelligent module that ensures the correct alarm. Thus, an interior visual intruder
detection module depending on Multi-Connect Architecture Associative Memory (MCA)

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Sat Jun 01 2024
Journal Name
Journal Of Engineering
Copy Move Image Forgery Detection using Multi-Level Local Binary Pattern Algorithm
...Show More Authors

Digital image manipulation has become increasingly prevalent due to the widespread availability of sophisticated image editing tools. In copy-move forgery, a portion of an image is copied and pasted into another area within the same image. The proposed methodology begins with extracting the image's Local Binary Pattern (LBP) algorithm features. Two main statistical functions, Stander Deviation (STD) and Angler Second Moment (ASM), are computed for each LBP feature, capturing additional statistical information about the local textures. Next, a multi-level LBP feature selection is applied to select the most relevant features. This process involves performing LBP computation at multiple scales or levels, capturing textures at different

... Show More
Crossref