Preferred Language
Articles
/
vRhcJ5gBVTCNdQwCOLns
Enhancing Cloud Security Implementing AI-Based Intrusion Detection Systems
...Show More Authors

The increasing complexity of assaults necessitates the use of innovative intrusion detection systems (IDS) to safeguard critical assets and data. There is a higher risk of cyberattacks like data breaches and unauthorised access since cloud services have been used more frequently. The project's goal is to find out how Artificial Intelligence (AI) could enhance the IDS's ability to identify and classify network traffic and identify anomalous activities. Online dangers could be identified with IDS. An intrusion detection system, or IDS, is required to keep networks secure. We must create efficient IDS for the cloud platform as well, since it is constantly growing and permeating more aspects of our daily life. However, using standard intrusion detection systems in the cloud may provide challenges. The pre-established IDS design may overburden a cloud segment due to the additional detection overhead. Within the framework of an adaptively designed networked system. We demonstrate how to fully use available resources without placing undue load on any one cloud server using an intrusion detection system (IDS) based on neural networks. To even more successfully detect new threats, the suggested IDS make use of neural network machine learning (ML).

Scopus Crossref
View Publication
Publication Date
Fri Apr 12 2019
Journal Name
Journal Of Economics And Administrative Sciences
Core competencies and Their Role in Enhancing Organizational flexibility: An Analytical Study of the Views of a Sample of Employees in Presidency University of Mosul
...Show More Authors

Abstract

The study aims to identify the levels of core competencies dimensions and types of organizational flexibility in the investigated organization, as well as to determine the nature of the relationship and the impact of core competencies dimensions with the process of organizational flexibility. Thus, a number of research questions were presented to express the research problem as follows:

  • What is the level of the investigated individuals' awareness to core competencies and organizational flexibility across their dimensions and types in the investigated organization?
  • To what extent are core competencies and organizational flexibility available in the Organiz

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jan 27 2019
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The application of the dimensions of TQM and its impact in enhancing the satisfaction of the taxpayers: Applied Study in the General Commission for Taxes
...Show More Authors

The concept of TQM is based on one of the concepts that combine administrative and innovative methods. The aim of the research is to demonstrate the dimensions of TQM in enhancing the satisfaction of the taxpayers through a survey of a sample of officials in the General Authority for Taxation and 50 officials. In the collection of data and information, and the results were analyzed using the SPSS program to find the most important compounds and factors in he method of analysis.

The research problem was represented by the non-application of the General Authority for Taxation to the entrances and modern practices in the administrative work. The results of some of the complications that accompany the tax accounting process, which af

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Sep 02 2017
Journal Name
Dissertation
Integrating Biophysical and Socio-Economic Approaches to Identify Suitable Policy Incentives for Enhancing Sustainable Water and Land Use (WLI project a case study of Iraq)
...Show More Authors

Preview PDF
Publication Date
Tue Dec 31 2024
Journal Name
Sports Culture
The effect of boot camp-style preventive exercises in enhancing the efficiency of the ankle joint and reducing its injury to young triple jump players
...Show More Authors

The research aims to prepare preventive exercises in the boot camp style to enhance the efficiency of the ankle joint and reduce its injuries for young triple jump players, and to determine the effect of preventive exercises on improving the efficiency of the ankle joint. The researchers assumed statistically significant differences between the pre-and posttests in the research variables. The experimental approach was adopted to suit it, and the research sample was chosen from young triple jump players. The preventive approach prepared by the researchers was applied to the sample, and it included preventive exercises in the boot camp style with and without tools. The researchers concluded that preventive exercises in a boot camp style have

... Show More
Publication Date
Sat Jun 26 2021
Journal Name
2021 Ieee International Conference On Automatic Control & Intelligent Systems (i2cacis)
Vulnerability Assessment on Ethereum Based Smart Contract Applications
...Show More Authors

View Publication
Scopus (10)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Sun Sep 11 2022
Journal Name
Electronics
IoT-Based Motorbike Ambulance: Secure and Efficient Transportation
...Show More Authors

The predilection for 5G telemedicine networks has piqued the interest of industry researchers and academics. The most significant barrier to global telemedicine adoption is to achieve a secure and efficient transport of patients, which has two critical responsibilities. The first is to get the patient to the nearest hospital as quickly as possible, and the second is to keep the connection secure while traveling to the hospital. As a result, a new network scheme has been suggested to expand the medical delivery system, which is an agile network scheme to securely redirect ambulance motorbikes to the nearest hospital in emergency cases. This research provides a secured and efficient telemedicine transport strategy compatible with the

... Show More
View Publication
Scopus (4)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Wed Jun 01 2011
Journal Name
Journal Of Al-nahrain University Science
Breaking Knapsack Cipher Using Population Based Incremental Learning
...Show More Authors

View Publication
Crossref
Publication Date
Sun Sep 01 2013
Journal Name
International Journal Of Computer Applications
Concise Architecture of a Remote Network based Controller
...Show More Authors

The development of microcontroller is used in monitoring and data acquisition recently. This development has born various architectures for spreading and interfacing the microcontroller in network environment. Some of existing architecture suffers from redundant in resources, extra processing, high cost and delay in response. This paper presents flexible concise architecture for building distributed microcontroller networked system. The system consists of only one server, works through the internet, and a set of microcontrollers distributed in different sites. Each microcontroller is connected through the Ethernet to the internet. In this system the client requesting data from certain side is accomplished through just one server that is in

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Sep 23 2022
Journal Name
Specialusis Ugdymas
Text Cryptography based on Arabic Words Characters Number
...Show More Authors

Cryptography is a method used to mask text based on any encryption method, and the authorized user only can decrypt and read this message. An intruder tried to attack in many manners to access the communication channel, like impersonating, non-repudiation, denial of services, modification of data, threatening confidentiality and breaking availability of services. The high electronic communications between people need to ensure that transactions remain confidential. Cryptography methods give the best solution to this problem. This paper proposed a new cryptography method based on Arabic words; this method is done based on two steps. Where the first step is binary encoding generation used t

... Show More
Publication Date
Thu Dec 01 2022
Journal Name
Al-khwarizmi Engineering Journal
BCI-Based Smart Room Control using EEG Signals
...Show More Authors

In this paper, we implement and examine a Simulink model with electroencephalography (EEG) to control many actuators based on brain waves. This will be in great demand since it will be useful for certain individuals who are unable to access some control units that need direct contact with humans. In the beginning, ten volunteers of a wide range of (20-66) participated in this study, and the statistical measurements were first calculated for all eight channels. Then the number of channels was reduced by half according to the activation of brain regions within the utilized protocol and the processing time also decreased. Consequently, four of the participants (three males and one female) were chosen to examine the Simulink model during di

... Show More
View Publication Preview PDF
Scopus (2)
Scopus Crossref