Preferred Language
Articles
/
5heU5I8BVTCNdQwCp39D
Cryptanalysis for Brute Force Attack and XOR Ciphering Methods
...Show More Authors

Publication Date
Sun Jun 01 2014
Journal Name
University Of Baghdad
New Analytical Methods for Drugs Analysis A Comparative Study
...Show More Authors

Four different spectrophotometric methods are used in this study for the determination of Sulfamethoxazole and sulfanilamide drugs in pharmaceutical compounds, synthetic samples, and in their pure forms. The work comprises four chapters which are shown in the following: Chapter One: Includes a brief for Ultraviolet-Visible (UV-VIS) Absorption spectroscopy, antibacterial drugs and sulfonamides with some methods for their determination. The chapter lists two methods for optimization; univariate method and multivariate method. The later includes different types, two of these were mentioned; simplex method and design of experiment method. Chapter Two: Includes reaction of the two studied drugs with sodium nitrite and hydrochloric acid for diazo

... Show More
Preview PDF
Publication Date
Mon Jan 20 2020
Journal Name
Kuwait Journal Of Science
Three iterative methods for solving Jeffery-Hamel flow problem
...Show More Authors

In this article, the nonlinear problem of Jeffery-Hamel flow has been solved analytically and numerically by using reliable iterative and numerical methods. The approximate solutions obtained by using the Daftardar-Jafari method namely (DJM), Temimi-Ansari method namely (TAM) and Banach contraction method namely (BCM). The obtained solutions are discussed numerically, in comparison with other numerical solutions obtained from the fourth order Runge-Kutta (RK4), Euler and previous analytic methods available in literature. In addition, the convergence of the proposed methods is given based on the Banach fixed point theorem. The results reveal that the presented methods are reliable, effective and applicable to solve other nonlinear problems.

... Show More
View Publication Preview PDF
Publication Date
Fri Jul 01 2022
Journal Name
International Journal Of Nonlinear Analysis And Applications
Survey on distributed denial of service attack detection using deep learning: A review
...Show More Authors

Distributed Denial of Service (DDoS) attacks on Web-based services have grown in both number and sophistication with the rise of advanced wireless technology and modern computing paradigms. Detecting these attacks in the sea of communication packets is very important. There were a lot of DDoS attacks that were directed at the network and transport layers at first. During the past few years, attackers have changed their strategies to try to get into the application layer. The application layer attacks could be more harmful and stealthier because the attack traffic and the normal traffic flows cannot be told apart. Distributed attacks are hard to fight because they can affect real computing resources as well as network bandwidth. DDoS attacks

... Show More
View Publication
Publication Date
Wed Nov 28 2018
Journal Name
International Journal Of Engineering & Technology
Using Polyurethane Coating of Concrete Pipes with Acid Attack Resistance in Sewer Lines
...Show More Authors

One of the most important challenges facing the designers of the sewerage system is the corrosion of sewers due to the influence of sewerage contaminates which lead to failure of the main lines of sewers. In this study, a reference mix of 1: 1.5: 3 was used and the 4% Flocrete PC200 by weight of cement was added to the same mixing ratio in the second mixture. Twenty-four samples were tested for each mixture, 12 of which were used to compression strength test in ages (7, 14 and 28) day and six samples were submerged after 28 days of wet treatment at (5 and 10) % concentrations of sulfuric acid. The other six samples were painted after 28 days of wet treatment with coating Polyurethane and after 24 hours were flooded with a concentrat

... Show More
View Publication
Crossref
Publication Date
Thu Mar 02 2023
Journal Name
Applied Sciences
Machine Learning Techniques to Detect a DDoS Attack in SDN: A Systematic Review
...Show More Authors

The recent advancements in security approaches have significantly increased the ability to identify and mitigate any type of threat or attack in any network infrastructure, such as a software-defined network (SDN), and protect the internet security architecture against a variety of threats or attacks. Machine learning (ML) and deep learning (DL) are among the most popular techniques for preventing distributed denial-of-service (DDoS) attacks on any kind of network. The objective of this systematic review is to identify, evaluate, and discuss new efforts on ML/DL-based DDoS attack detection strategies in SDN networks. To reach our objective, we conducted a systematic review in which we looked for publications that used ML/DL approach

... Show More
View Publication Preview PDF
Scopus (136)
Crossref (126)
Scopus Clarivate Crossref
Publication Date
Sun Jun 01 2014
Journal Name
Journal Of Economics And Administrative Sciences
Different Methods for Estimating Location Parameter & Scale Parameter for Extreme Value Distribution
...Show More Authors

      In this study, different methods were used for estimating location parameter  and scale parameter for extreme value distribution, such as maximum likelihood estimation (MLE) , method of moment  estimation (ME),and approximation  estimators based on percentiles which is called white method in estimation, as the extreme value distribution is one of exponential distributions. Least squares estimation (OLS) was used, weighted least squares estimation (WLS), ridge regression estimation (Rig), and adjusted ridge regression estimation (ARig) were used. Two parameters for expected value to the percentile  as estimation for distribution f

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Apr 30 2022
Journal Name
Revue D'intelligence Artificielle
Performance Evaluation of SDN DDoS Attack Detection and Mitigation Based Random Forest and K-Nearest Neighbors Machine Learning Algorithms
...Show More Authors

Software-defined networks (SDN) have a centralized control architecture that makes them a tempting target for cyber attackers. One of the major threats is distributed denial of service (DDoS) attacks. It aims to exhaust network resources to make its services unavailable to legitimate users. DDoS attack detection based on machine learning algorithms is considered one of the most used techniques in SDN security. In this paper, four machine learning techniques (Random Forest, K-nearest neighbors, Naive Bayes, and Logistic Regression) have been tested to detect DDoS attacks. Also, a mitigation technique has been used to eliminate the attack effect on SDN. RF and KNN were selected because of their high accuracy results. Three types of ne

... Show More
View Publication
Scopus (19)
Crossref (11)
Scopus Crossref
Publication Date
Wed Feb 18 2026
Journal Name
Journal Of Studies And Researches Of Sport Education
Design and rationing test compound to assess the performance of the attack straight in terms of power characteristic speed And vital capacity for young players duel weapon Blinds
...Show More Authors

View Publication
Publication Date
Wed May 10 2017
Journal Name
College Of Languages-university Of Baghdad
Skills and methods for learning a foreign language( strategies of education and learning foreign language)
...Show More Authors

There is no doubt that teachers are the leaders of positive changing in community where they directed the students and build their brains. In our current generation that characterized by accelerated technological development that communication changes, economic and politics, needs from the teacher an active leadership skills that match with the soul of our generation and contribute in confrontation the current challenges and the future challenges in the form that lead to create a conscious generation where they will be a basic brick for the future community where the listeners looking forward the education where they support the continuity communication of develop process, economy, scientifically and in all life fields. In our study we take

... Show More
View Publication
Publication Date
Fri Jun 29 2018
Journal Name
Journal Of Engineering
Experimental Investigation of Short Square Normal and Hybrid Fiber Reactive Powder Concrete Columns Subjected to Chloride Solution Attack
...Show More Authors

In this research, the structural behavior of reinforced concrete columns made of normal and hybrid reactive powder concrete (hybrid by steel and polypropylene fibers) subjected to chloride salts with concentration was 8341.6 mg/l. The study consists of two parts, the first one is experimental study and the second one is theoretical analysis.  Three main variables were adopted in the experimental program; concrete type, curing type and loading arrangement. Twenty (120x120x1200) mm columns were cast and tested depending on these variables. The samples were reinforced using two different bars; Ø8 for ties and Ø12 with minimum longitudinal reinforcement (0.01Ag). The specimens were divided into two main groups based o

... Show More
View Publication Preview PDF
Crossref