Preferred Language
Articles
/
vRhcJ5gBVTCNdQwCOLns
Enhancing Cloud Security Implementing AI-Based Intrusion Detection Systems
...Show More Authors

The increasing complexity of assaults necessitates the use of innovative intrusion detection systems (IDS) to safeguard critical assets and data. There is a higher risk of cyberattacks like data breaches and unauthorised access since cloud services have been used more frequently. The project's goal is to find out how Artificial Intelligence (AI) could enhance the IDS's ability to identify and classify network traffic and identify anomalous activities. Online dangers could be identified with IDS. An intrusion detection system, or IDS, is required to keep networks secure. We must create efficient IDS for the cloud platform as well, since it is constantly growing and permeating more aspects of our daily life. However, using standard intrusion detection systems in the cloud may provide challenges. The pre-established IDS design may overburden a cloud segment due to the additional detection overhead. Within the framework of an adaptively designed networked system. We demonstrate how to fully use available resources without placing undue load on any one cloud server using an intrusion detection system (IDS) based on neural networks. To even more successfully detect new threats, the suggested IDS make use of neural network machine learning (ML).

Scopus Crossref
View Publication
Publication Date
Wed Apr 05 2023
Journal Name
International Journal Of Interactive Mobile Technologies (ijim)
A Partial Face Encryption in Real World Experiences Based on Features Extraction from Edge Detection
...Show More Authors

User confidentiality protection is concerning a topic in control and monitoring spaces. In image, user's faces security in concerning with compound information, abused situations, participation on global transmission media and real-world experiences are extremely significant. For minifying the counting needs for vast size of image info and for minifying the size of time needful for the image to be address computationally. consequently, partial encryption user-face is picked. This study focuses on a large technique that is designed to encrypt the user's face slightly. Primarily, dlib is utilizing for user-face detection. Susan is one of the top edge detectors with valuable localization characteristics marked edges, is used to extract

... Show More
View Publication
Scopus (5)
Crossref (3)
Scopus Crossref
Publication Date
Fri Dec 01 2023
Journal Name
Iraqi Journal Of Physics
Surface Plasmon Resonance (SPR)-Based Multimode Optical Fiber Sensors for Electrical Transformer Oil Aging Detection
...Show More Authors

I

In this study, optical fibers were designed and implemented as a chemical sensor based on surface plasmon resonance (SPR) to estimate the age of the oil used in electrical transformers. The study depends on the refractive indices of the oil. The sensor was created by embedding the center portion of the optical fiber in a resin block, followed by polishing, and tapering to create the optical fiber sensor. The tapering time was 50 min. The multi-mode optical fiber was coated with 60 nm thickness gold metal. The deposition length was 4 cm. The sensor's resonance wavelength was 415 nm. The primary sensor parameters were calculated, including sensitivity (6.25), signal-to-noise ratio (2.38), figure of merit (4.88), and accuracy (3.2)

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Mar 01 2019
Journal Name
Al-khwarizmi Engineering Journal
Fractally Generated Microstrip Bandpass Filter Designs Based on Dual-Mode Square Ring Resonator for Wireless Communication Systems
...Show More Authors

A novel fractal design scheme has been introduced in this paper to generate microstrip bandpass filter designs with miniaturized sizes for wireless applications. The presented fractal scheme is based on Minkowski-like prefractal geometry. The space-filling property and self-similarity of this fractal geometry has found to produce reduced size symmetrical structures corresponding to the successive iteration levels. The resulting filter designs are with sizes suitable for use in modern wireless communication systems. The performance of each of the generated bandpass filter structures up to the 2nd iteration has been analyzed using a method of moments (MoM) based software IE3D, which is widely adopted in microwave research and in

... Show More
View Publication Preview PDF
Publication Date
Tue Feb 12 2019
Journal Name
Iraqi Journal Of Laser
Generation of True Random TTL Signals for Quantum Key-Distribution Systems Based on True Random Binary Sequences
...Show More Authors

A true random TTL pulse generator was implemented and investigated for quantum key distribution systems. The random TTL signals are generated by low cost components available in the local markets. The TTL signals are obtained by using true random binary sequences based on registering photon arrival time difference registered in coincidence windows between two single – photon detectors. The true random TTL pulse generator performance was tested by using time to digital converters which gives accurate readings for photon arrival time. The proposed true random pulse TTL generator can be used in any quantum -key distribution system for random operation of the transmitters for these systems

View Publication Preview PDF
Publication Date
Sun Jul 09 2023
Journal Name
Journal Of Engineering
Improving the Performance of Construction Project Information and Communication Management Using Web-Based Project Management Systems (WPMSs)
...Show More Authors

This paper presents a brief study undertaken for improving the performance of information and communication management of construction projects through investing in information and communication technologies (ICT). The work aims at first to investigate and diagnose the problems, challenges, weaknesses, and inefficiencies related to information and communication management in projects in the construction industry of Iraq. Studying the diagnosed matters and the different solutions of ICT to improve project management performance is following the investigation process. The research presents a technological system suggested to process a lot of the diagnosed problems, challenges, weakness, and inefficiencies of the construction projects and t

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Tue Oct 01 2013
Journal Name
Radioelectronics And Communications Systems
BER performance enhancement for secure wireless communication systems based on DCSK-MIMO techniques under Rayleigh fading channel
...Show More Authors

There has been a growing interest in the use of chaotic techniques for enabling secure communication in recent years. This need has been motivated by the emergence of a number of wireless services which require the channel to provide very low bit error rates (BER) along with information security. As more and more information is transacted over wireless media, there has been increasing criminal activity directed against such systems. This paper investigates the feasibility of using chaotic communications over Multiple-Input-Multiple-Output (MIMO) channels. We have studied the performance of differential chaos shift keying (DCSK) with 2×2 Alamouti scheme and 2×1 Alamouti scheme for different chaotic maps over additive white Gaussian noise (

... Show More
View Publication
Scopus Crossref
Publication Date
Wed Jun 01 2022
Journal Name
Political Sciences Journal
The Kurdistan Workers Party (PKK) and its Impact on Iraqi National Security
...Show More Authors

The Turkish Kurdistan Workers Party (PKK) is one of the most influential elements in the Iraqi national security since 2014. It has a new and effective role in the Iraqi political arena, as a result of participating in combat operations against ISIS in Nineveh Governorate, which prompted several minorities within the province to sympathize with its presence and its role in particular in Sinjar  after ISIS committed the most brutal crimes against the Aizidi minority, Turkey took advantage of the security conditions that Iraq went through after the entry of ISIS into the country to expand its influence in the north, using the pretext of the PKK and the previous agreement between the two countries on border protection. Also, the continued

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Jun 01 2021
Journal Name
Baghdad Science Journal
Improved Image Security in Internet of Thing (IOT) Using Multiple Key AES
...Show More Authors

Image is an important digital information that used in many internet of things (IoT) applications such as transport, healthcare, agriculture, military, vehicles and wildlife. etc. Also, any image has very important characteristic such as large size, strong correlation and huge redundancy, therefore, encrypting it by using single key Advanced Encryption Standard (AES) through IoT communication technologies makes it vulnerable to many threats, thus, the pixels that have the same values will be encrypted to another pixels that have same values when they use the same key. The contribution of this work is to increase the security of transferred image. This paper proposed multiple key AES algorithm (MECCAES) to improve the security of the tran

... Show More
View Publication Preview PDF
Scopus (18)
Crossref (8)
Scopus Clarivate Crossref
Publication Date
Fri Dec 23 2022
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Sensitive Cloud Point Extraction Method for the Determination of Isoxsuprine Hydrochloride in Pharmaceutical forms using Spectrophotometry
...Show More Authors

      A simple and highly sensitive cloud point extraction process was suggested for preconcentration of micrograms amount of isoxsuprine hydrochloride (ISX) in pure and pharmaceutical samples. After diazotization coupling of ISX with diazotized sulfadimidine in alkaline medium, the azo-dye product quantitatively extracted into the Triton X-114 rich phase, dissolved in ethanol and determined spectrophotometrically at 490 nm. The suggested reaction was studied with and without extraction and simple comparison between the batch and CPE methods was achieved. Analytical variables including concentrations of reagent, Triton X-114 and base, incubated temperature, and time were carefully studied. Under the selected opti

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Fri Sep 01 2017
Journal Name
2017 9th Computer Science And Electronic Engineering (ceec)
Modelling the power cost and trade-off of live migration the virtual machines in cloud-radio access networks
...Show More Authors

View Publication
Crossref (1)
Scopus Crossref