Preferred Language
Articles
/
vRhcJ5gBVTCNdQwCOLns
Enhancing Cloud Security Implementing AI-Based Intrusion Detection Systems
...Show More Authors

The increasing complexity of assaults necessitates the use of innovative intrusion detection systems (IDS) to safeguard critical assets and data. There is a higher risk of cyberattacks like data breaches and unauthorised access since cloud services have been used more frequently. The project's goal is to find out how Artificial Intelligence (AI) could enhance the IDS's ability to identify and classify network traffic and identify anomalous activities. Online dangers could be identified with IDS. An intrusion detection system, or IDS, is required to keep networks secure. We must create efficient IDS for the cloud platform as well, since it is constantly growing and permeating more aspects of our daily life. However, using standard intrusion detection systems in the cloud may provide challenges. The pre-established IDS design may overburden a cloud segment due to the additional detection overhead. Within the framework of an adaptively designed networked system. We demonstrate how to fully use available resources without placing undue load on any one cloud server using an intrusion detection system (IDS) based on neural networks. To even more successfully detect new threats, the suggested IDS make use of neural network machine learning (ML).

Scopus Crossref
View Publication
Publication Date
Sun Mar 31 2024
Journal Name
Iraqi Journal Of Political Science
Terrorist organizations employ technological development to threaten international security and stability
...Show More Authors

Technological development intersects with terrorism to a large extent, beyond the use of the Internet and social media, in order to spread ideas, obtain support and financing, and recruit new elements, to the area of tactics and techniques of terrorist attacks, and everything related to the arsenal of terrorist weapons in the present and future, while technology offers many benefits. In various fields, and contribute to achieving multiple gains for humanity, they provide extremist and terrorist organizations and elements with a set of weapons and means through which they attempt to bypass monitoring and control efforts and the restrictions imposed on the use of weapons. They also help in planning and implementing their terrorist operations,

... Show More
View Publication
Publication Date
Thu Nov 01 2012
Journal Name
Ijcsi International Journal Of Computer Science
Implementing a novel approach an convert audio compression to text coding via hybrid technique
...Show More Authors

Compression is the reduction in size of data in order to save space or transmission time. For data transmission, compression can be performed on just the data content or on the entire transmission unit (including header data) depending on a number of factors. In this study, we considered the application of an audio compression method by using text coding where audio compression represented via convert audio file to text file for reducing the time to data transfer by communication channel. Approach: we proposed two coding methods are applied to optimizing the solution by using CFG. Results: we test our application by using 4-bit coding algorithm the results of this method show not satisfy then we proposed a new approach to compress audio fil

... Show More
View Publication Preview PDF
Publication Date
Mon Apr 01 2019
Journal Name
Journal Of Educational And Psychological Researches
The Intellectual Security and Its Relation to Psychological Resilience of Secondary School Students
...Show More Authors

The current research aims to determine the intellectual security and the psychological resilience of Secondary school students and how these two variables are related to each other. The study also seeks the extent to which psychological resilience contributes to intellectual security

The research sample consisted of (420) students from the Secondary stage in the Directorate of Education of Baghdad / Rusafa III. Two scales were administered to the participants to collect the needed data. As for the analysis of data, Pearson correlation coefficient, T-test, and the Regression analysis were employed, the results revealed:

  1. The members of the sample have an intellectual Security.
  2. The members of the sample have

... Show More
View Publication Preview PDF
Publication Date
Fri Jun 30 2023
Journal Name
International Journal Of Intelligent Engineering And Systems
DeepFake Detection Improvement for Images Based on a Proposed Method for Local Binary Pattern of the Multiple-Channel Color Space
...Show More Authors

DeepFake is a concern for celebrities and everyone because it is simple to create. DeepFake images, especially high-quality ones, are difficult to detect using people, local descriptors, and current approaches. On the other hand, video manipulation detection is more accessible than an image, which many state-of-the-art systems offer. Moreover, the detection of video manipulation depends entirely on its detection through images. Many worked on DeepFake detection in images, but they had complex mathematical calculations in preprocessing steps, and many limitations, including that the face must be in front, the eyes have to be open, and the mouth should be open with the appearance of teeth, etc. Also, the accuracy of their counterfeit detectio

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (9)
Scopus Crossref
Publication Date
Sat Apr 01 2023
Journal Name
Baghdad Science Journal
Spectrophotometric Analysis of Vancomycin Hydrochloride in Pure and Pharmaceutical Injections via Batch and Cloud Point Extraction Techniques
...Show More Authors

Development of a precise and delicate reaction has been acquired for the determination of vancomycin hydrochloride using batch and cloud point extraction (CPE) methods. The first method is based on the formation of azo dye as a result of diazotized dapsone coupled with vancomycin HCl (VAN) in a basic medium. The sensitivity of this reaction was enhanced by utilizing a nonionic surfactant (Triton X-114) and the cloud point extraction technique (second method). The azo dye formed was extracted into the surfactant-rich phase, dissolved in ethanol and detected at λmax 440 nm spectrophotometrically. The reaction was investigated using both batch and CPE methods (with and without extraction), and a simple comparison between the two

... Show More
View Publication Preview PDF
Scopus (6)
Crossref (3)
Scopus Crossref
Publication Date
Sat Oct 01 2016
Journal Name
2016 2nd International Conference On Science In Information Technology (icsitech)
Cloud computing sensitive data protection using multi layered approach
...Show More Authors

View Publication
Scopus (3)
Scopus Crossref
Publication Date
Tue Dec 01 2020
Journal Name
Al-khwarizmi Engineering Journal
Cloud Manufacturing framework for controlling and monitoring of machines
...Show More Authors

Due to the development that occurs in the technologies of information system many techniques was introduced and played important role in the connection between machines and peoples through internet, also it used to control and monitor of machines, these technologies called cloud computing and Internet of Things. With the replacement of computing resources with manufacturing resources cloud computing named converted into cloud manufacturing.

In this research cloud computing was used in the field of manufacturing to automate the process of selecting G-Code that Computer Numerical Control machine work it, this process was applied by the using of this machine with Radio Frequency Identification and a AWS Cloud services and some of py

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Nov 22 2022
Journal Name
College Of Islamic Sciences
The issues of illusion to Ibn hisham AI- Ansari( H 761T) on grammarian
...Show More Authors

This research shows the issues of Ibn Hisham's illusion in its leadership of the grammarians; As Ibn Hisham attributed - during his presentation of grammatical issues - grammatical opinions to a number of grammarians claiming them in them, and after referring to the main concepts that pertain to those grammarians, we found that Ibn Hisham had delusional in those allegations, in addition to that clarifying the terms illusion and claim in the two circles of language And the terminology, and perhaps the most prominent result in this research is that he worked to investigate these issues by referring to their original sources, with an explanation of the illusions of Ibn Hisham in his attribution to these issues.

View Publication Preview PDF
Publication Date
Tue Jul 01 2025
Journal Name
Mastering The Minds Of Machines
Future Computational Power of AI Hardware: A Comparative Analysis of GPUs and TPUs
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Sat Feb 09 2019
Journal Name
Journal Of The College Of Education For Women
Software Security using Aspect-Oriented Software Development
...Show More Authors

Aspect-Oriented Software Development (AOSD) is a technology that helps achieving
better Separation of Concern (SOC) by providing mechanisms to identify all relevant points
in a program at which aspectual adaptations need to take place. This paper introduces a
banking application using of AOSD with security concern in information hiding.

View Publication Preview PDF