Preferred Language
Articles
/
Nxazs4sBVTCNdQwCZdeM
Performance Evaluation of SDN DDoS Attack Detection and Mitigation Based Random Forest and K-Nearest Neighbors Machine Learning Algorithms
...Show More Authors

Software-defined networks (SDN) have a centralized control architecture that makes them a tempting target for cyber attackers. One of the major threats is distributed denial of service (DDoS) attacks. It aims to exhaust network resources to make its services unavailable to legitimate users. DDoS attack detection based on machine learning algorithms is considered one of the most used techniques in SDN security. In this paper, four machine learning techniques (Random Forest, K-nearest neighbors, Naive Bayes, and Logistic Regression) have been tested to detect DDoS attacks. Also, a mitigation technique has been used to eliminate the attack effect on SDN. RF and KNN were selected because of their high accuracy results. Three types of network topology have been generated to observe the effectiveness of proposed algorithms on different network architectures. The results reveal that RF performs better than KNN in a single topology, and both have close performance in other topologies.

Scopus Crossref
View Publication
Publication Date
Fri Mar 01 2024
Journal Name
Baghdad Science Journal
Exploring the Challenges of Diagnosing Thyroid Disease with Imbalanced Data and Machine Learning: A Systematic Literature Review
...Show More Authors

Thyroid disease is a common disease affecting millions worldwide. Early diagnosis and treatment of thyroid disease can help prevent more serious complications and improve long-term health outcomes. However, thyroid disease diagnosis can be challenging due to its variable symptoms and limited diagnostic tests. By processing enormous amounts of data and seeing trends that may not be immediately evident to human doctors, Machine Learning (ML) algorithms may be capable of increasing the accuracy with which thyroid disease is diagnosed. This study seeks to discover the most recent ML-based and data-driven developments and strategies for diagnosing thyroid disease while considering the challenges associated with imbalanced data in thyroid dise

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (6)
Scopus Crossref
Publication Date
Tue Aug 01 2023
Journal Name
Baghdad Science Journal
Digital Data Encryption Using a Proposed W-Method Based on AES and DES Algorithms
...Show More Authors

This paper proposes a new encryption method. It combines two cipher algorithms, i.e., DES and AES, to generate hybrid keys. This combination strengthens the proposed W-method by generating high randomized keys. Two points can represent the reliability of any encryption technique. Firstly, is the key generation; therefore, our approach merges 64 bits of DES with 64 bits of AES to produce 128 bits as a root key for all remaining keys that are 15. This complexity increases the level of the ciphering process. Moreover, it shifts the operation one bit only to the right. Secondly is the nature of the encryption process. It includes two keys and mixes one round of DES with one round of AES to reduce the performance time. The W-method deals with

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (4)
Scopus Crossref
Publication Date
Mon Feb 28 2022
Journal Name
International Journal Of Interactive Mobile Technologies (ijim)
Flying Ad hoc Networks (FANET): Performance Evaluation of Topology Based Routing Protocols
...Show More Authors

Flying Ad hoc Networks (FANETs) has developed as an innovative technology for access places without permanent infrastructure. This emerging form of networking is construct of flying nodes known as unmanned aerial vehicles (UAVs) that fly at a fast rate of speed, causing frequent changes in the network topology and connection failures. As a result, there is no dedicated FANET routing protocol that enables effective communication between these devices. The purpose of this paper is to evaluate the performance of the category of topology-based routing protocols in the FANET. In a surveillance system involving video traffic, four routing protocols with varying routing mechanisms were examined. Additionally, simulation experiments conduct

... Show More
View Publication Preview PDF
Crossref (29)
Crossref
Publication Date
Tue Feb 01 2022
Journal Name
Baghdad Science Journal
Retina Based Glowworm Swarm Optimization for Random Cryptographic Key Generation
...Show More Authors

The biometric-based keys generation represents the utilization of the extracted features from the human anatomical (physiological) traits like a fingerprint, retina, etc. or behavioral traits like a signature. The retina biometric has inherent robustness, therefore, it is capable of generating random keys with a higher security level compared to the other biometric traits. In this paper, an effective system to generate secure, robust and unique random keys based on retina features has been proposed for cryptographic applications. The retina features are extracted by using the algorithm of glowworm swarm optimization (GSO) that provides promising results through the experiments using the standard retina databases. Additionally, in order t

... Show More
View Publication Preview PDF
Scopus (11)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Wed Aug 31 2022
Journal Name
International Journal Of Intelligent Engineering And Systems
Performance Evaluation Based on Multi-UAV in Airborne Computer Network System
...Show More Authors

View Publication
Scopus (4)
Crossref (1)
Scopus Crossref
Publication Date
Sun Dec 01 2024
Journal Name
Al-qadisiyah Journal For Agriculture Sciences
Effect of Holes Diameter and Speed of Die on the Performance of Machine and Feed Pellet Quality
...Show More Authors

The aim of this study to evaluate the effects of die holes diameter and speed of die on the performance of machine and feed pellet quality. Machine productivity (Kg.h-1), consumed power (kW), pellet durability (%) and pellet bulk density (g.cm-3) was studied. The study factors consisted of three diameter of die holes (3, 4, and 5 mm), and three speeds die (280, 300, and 320 rpm). Results showed with increasing of die holes diameter from 3 to 4 and to 5 mm give a significant increase in machine productivity, while consumed power, pellet durability and pellet bulk density a significant decreased. By increasing the die speed, from 280 to 300 then to 320 rpm, the machine productivity increased significantly, while consumed power, pellet durabil

... Show More
View Publication
Crossref
Publication Date
Sun Sep 06 2020
Journal Name
European Journal Of Dental Education
Evaluation of technology‐based learning by dental students during the pandemic outbreak of coronavirus disease 2019
...Show More Authors

View Publication
Crossref (53)
Crossref
Publication Date
Wed Feb 01 2023
Journal Name
Journal Of Engineering
An Empirical Investigation on Snort NIDS versus Supervised Machine Learning Classifiers
...Show More Authors

With the vast usage of network services, Security became an important issue for all network types. Various techniques emerged to grant network security; among them is Network Intrusion Detection System (NIDS). Many extant NIDSs actively work against various intrusions, but there are still a number of performance issues including high false alarm rates, and numerous undetected attacks. To keep up with these attacks, some of the academic researchers turned towards machine learning (ML) techniques to create software that automatically predict intrusive and abnormal traffic, another approach is to utilize ML algorithms in enhancing Traditional NIDSs which is a more feasible solution since they are widely spread. To upgrade t

... Show More
View Publication Preview PDF
Crossref (5)
Crossref
Publication Date
Fri Feb 28 2025
Journal Name
Energies
Synergizing Machine Learning and Physical Models for Enhanced Gas Production Forecasting: A Comparative Study of Short- and Long-Term Feasibility
...Show More Authors

Advanced strategies for production forecasting, operational optimization, and decision-making enhancement have been employed through reservoir management and machine learning (ML) techniques. A hybrid model is established to predict future gas output in a gas reservoir through historical production data, including reservoir pressure, cumulative gas production, and cumulative water production for 67 months. The procedure starts with data preprocessing and applies seasonal exponential smoothing (SES) to capture seasonality and trends in production data, while an Artificial Neural Network (ANN) captures complicated spatiotemporal connections. The history replication in the models is quantified for accuracy through metric keys such as m

... Show More
View Publication Preview PDF
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Sun Mar 31 2024
Journal Name
Iraqi Geological Journal
Permeability Prediction and Facies Distribution for Yamama Reservoir in Faihaa Oil Field: Role of Machine Learning and Cluster Analysis Approach
...Show More Authors

Empirical and statistical methodologies have been established to acquire accurate permeability identification and reservoir characterization, based on the rock type and reservoir performance. The identification of rock facies is usually done by either using core analysis to visually interpret lithofacies or indirectly based on well-log data. The use of well-log data for traditional facies prediction is characterized by uncertainties and can be time-consuming, particularly when working with large datasets. Thus, Machine Learning can be used to predict patterns more efficiently when applied to large data. Taking into account the electrofacies distribution, this work was conducted to predict permeability for the four wells, FH1, FH2, F

... Show More
View Publication
Scopus (6)
Crossref (2)
Scopus Crossref