Preferred Language
Articles
/
uhcUP48BVTCNdQwCW2US
Survey on distributed denial of service attack detection using deep learning: A review
...Show More Authors

Distributed Denial of Service (DDoS) attacks on Web-based services have grown in both number and sophistication with the rise of advanced wireless technology and modern computing paradigms. Detecting these attacks in the sea of communication packets is very important. There were a lot of DDoS attacks that were directed at the network and transport layers at first. During the past few years, attackers have changed their strategies to try to get into the application layer. The application layer attacks could be more harmful and stealthier because the attack traffic and the normal traffic flows cannot be told apart. Distributed attacks are hard to fight because they can affect real computing resources as well as network bandwidth. DDoS attacks can also be made with smart devices that connect to the Internet, which can be infected and used as botnets. They use Deep Learning (D.L.) techniques like Convolutional Neural Network (C.N.N.) and variants of Recurrent Neural Networks (R.N.N.), such as Long Short-Term Memory (L.S.T.M.), Bidirectional L.S.T.M., Stacked L.S.T.M., and the Gat G.R.U.. These techniques have been used to detect (DDoS) attacks. The Portmap.csv file from the most recent DDoS dataset, CICDDoS2019, has been used to test D.L. approaches. Before giving the data to the D.L. approaches, the data is cleaned up. The pre-processed dataset is used to train and test the D.L. approaches. In the paper, we show how the D.L. approach works with multiple models and how they compare to each other.

View Publication
Publication Date
Sun Sep 01 2013
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Measure the cost of the service in the insurance sector: A study for the Department of Insurance auto / / National Insurance Company
...Show More Authors

Insurance is one of effective high-impact activities in the economic and social aspects of development and that the insurance companies after the creation of stability, balance and support other sectors. The insurance of financial institutions with economic and social importance has an impact on the development and help shoulder the burden of risk and distribution. And measuring Indicators of service and cost her help in evaluating the performance and activity of insurance, and the study of sectors needed by society, institutions and individuals and development of the company. Covering all aspects of life and activity. In this study will focus on the insurance sector in the field of car accidents and so plentiful and their problems and d

... Show More
View Publication Preview PDF
Publication Date
Wed Jul 01 2015
Journal Name
Bulletin Of The Iraq Natural History Museum
SURVEY OF BRACHYCERA; DIPTERA FROM SEVERAL REGIONSOF IRAQ
...Show More Authors

Publication Date
Mon Dec 20 2021
Journal Name
Bulletin Of The Iraq Natural History Museum
SURVEY OF INSECTS IN SOME SOUTHERN IRAQI MARSHES
...Show More Authors

This study included a survey and review of the scientific names of the marsh insects (aquatic and surrounding it) for the purpose of unifying and updating the database. The survey reveals 109 species under 77 genera that belong to 32 families and 7 orders as follow: Coleoptera (44 species), Diptera (7 species) Ephemeroptera (2 species), Hemiptera (14 species), Hymenoptera (11 species), Lepidoptera (2 species) and Odonata with 29 species. Information of specimens' collection for each species, synonyms and geographical distribution were provided.

View Publication
Scopus (1)
Scopus Crossref
Publication Date
Sun Dec 19 2021
Journal Name
Bulletin Of The Iraq Natural History Museum (p-issn: 1017-8678 , E-issn: 2311-9799)
SURVEY OF INSECTS IN SOME SOUTHERN IRAQI MARSHES
...Show More Authors

This study included a survey and review of the scientific names of the marsh insects (aquatic and surrounding it) for the purpose of unifying and updating the database.
The survey reveals 109 species under 77 genera that belong to 32 families and 7 orders as follow: Coleoptera (44 species), Diptera (7 species) Ephemeroptera (2 species), Hemiptera (14 species), Hymenoptera (11 species), Lepidoptera (2 species) and Odonata with 29 species.
Information of specimens' collection for each species, synonyms and geographical distribution were provided.

View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Mon Jan 02 2023
Journal Name
Pakistan Heart Jornal
The Effect of the Strategy of Differentiated Education According to the Auditory Learning Style by Using Assistance in Learning the Back Kick (T-Chagi) for the Young Players of …
...Show More Authors

Publication Date
Thu Jan 30 2020
Journal Name
Al-kindy College Medical Journal
Satisfaction of Patients with Type II Diabetes on Health Service in Specialized Center for Endocrinology and Diabetes /Baghdad 2019
...Show More Authors

Background: Patient satisfaction is of increasing importance and widely recognized as an important indicator of quality of the medical care. There was no homogeneous definition of patient satisfaction, since satisfaction concerns different aspects of care or settings, as well as care given by various professions.

Objective: The objective of this study is to assess the patients’ level of satisfaction with diabetes care and to identify the underlying factors influencing it.

Methods: This cross-sectional study had been conducted in the Specialized Center for Diabetes and Endocrinology in Baghdad Al- Rusafa 2018. Where150 type two diabetic patients attending their follow-up

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Feb 01 2023
Journal Name
Journal Of Engineering
An Empirical Investigation on Snort NIDS versus Supervised Machine Learning Classifiers
...Show More Authors

With the vast usage of network services, Security became an important issue for all network types. Various techniques emerged to grant network security; among them is Network Intrusion Detection System (NIDS). Many extant NIDSs actively work against various intrusions, but there are still a number of performance issues including high false alarm rates, and numerous undetected attacks. To keep up with these attacks, some of the academic researchers turned towards machine learning (ML) techniques to create software that automatically predict intrusive and abnormal traffic, another approach is to utilize ML algorithms in enhancing Traditional NIDSs which is a more feasible solution since they are widely spread. To upgrade t

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Thu Jun 30 2011
Journal Name
Al-khwarizmi Engineering Journal
Nahrain Mobile Learning System (NMLS)
...Show More Authors

The work in this paper involves the planning, design and implementation of a mobile learning system called Nahrain Mobile Learning System (NMLS). This system provides complete teaching resources, which can be accessed by the students, instructors and administrators through the mobile phones. It presents a viable alternative to Electronic learning. It focuses on the mobility and flexibility of the learning practice, and emphasizes the interaction between the learner and learning content. System users are categorized into three categories: administrators, instructors and students. Different learning activities can be carried out throughout the system, offering necessary communication tools to allow the users to communicate with each other

... Show More
View Publication Preview PDF
Publication Date
Wed Aug 24 2022
Journal Name
European Journal Of Research Development And Sustainability
MONKEYPOX A NEW PANDEMIC DISEASE: IMPLICATIONS FOR CLINICAL PRACTICE AND PUBLIC HEALTH EDUCATION. A REVIEW
...Show More Authors

Publication Date
Fri Dec 01 2023
Journal Name
Political Sciences Journal
Using the Nudge Theory in Improving Security Policies and Crime Prevention: Integrative Review
...Show More Authors

The "Nudge" Theory is considered one of the most recent theories, which is clear in the economic, health, and educational sectors, due to the intensity of studies on it and its applications, but it has not yet been included in crime prevention studies. The use of  Nudge theory appears to enrich the theory in the field of crime prevention, and to provide modern, effective, and implementable mechanisms.

The study deals with the "integrative review" approach, which is a distinctive form of research that generates new knowledge on a topic through reviewing, criticizing, and synthesizing representative literature on the topic in an integrated manner so that new frameworks and perspectives are created around it.

The study is bas

... Show More
View Publication Preview PDF
Crossref