Preferred Language
Articles
/
Nxazs4sBVTCNdQwCZdeM
Performance Evaluation of SDN DDoS Attack Detection and Mitigation Based Random Forest and K-Nearest Neighbors Machine Learning Algorithms
...Show More Authors

Software-defined networks (SDN) have a centralized control architecture that makes them a tempting target for cyber attackers. One of the major threats is distributed denial of service (DDoS) attacks. It aims to exhaust network resources to make its services unavailable to legitimate users. DDoS attack detection based on machine learning algorithms is considered one of the most used techniques in SDN security. In this paper, four machine learning techniques (Random Forest, K-nearest neighbors, Naive Bayes, and Logistic Regression) have been tested to detect DDoS attacks. Also, a mitigation technique has been used to eliminate the attack effect on SDN. RF and KNN were selected because of their high accuracy results. Three types of network topology have been generated to observe the effectiveness of proposed algorithms on different network architectures. The results reveal that RF performs better than KNN in a single topology, and both have close performance in other topologies.

Scopus Crossref
View Publication
Publication Date
Wed Jun 01 2011
Journal Name
Journal Of Al-nahrain University Science
Breaking Knapsack Cipher Using Population Based Incremental Learning
...Show More Authors

View Publication
Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Journal Of Engineering
Face-based Gender Classification Using Deep Learning Model
...Show More Authors

Gender classification is a critical task in computer vision. This task holds substantial importance in various domains, including surveillance, marketing, and human-computer interaction. In this work, the face gender classification model proposed consists of three main phases: the first phase involves applying the Viola-Jones algorithm to detect facial images, which includes four steps: 1) Haar-like features, 2) Integral Image, 3) Adaboost Learning, and 4) Cascade Classifier. In the second phase, four pre-processing operations are employed, namely cropping, resizing, converting the image from(RGB) Color Space to (LAB) color space, and enhancing the images using (HE, CLAHE). The final phase involves utilizing Transfer lea

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Wed Nov 01 2017
Journal Name
Journal Of Computational And Theoretical Nanoscience
Solution for Multi-Objective Optimisation Master Production Scheduling Problems Based on Swarm Intelligence Algorithms
...Show More Authors

The emphasis of Master Production Scheduling (MPS) or tactic planning is on time and spatial disintegration of the cumulative planning targets and forecasts, along with the provision and forecast of the required resources. This procedure eventually becomes considerably difficult and slow as the number of resources, products and periods considered increases. A number of studies have been carried out to understand these impediments and formulate algorithms to optimise the production planning problem, or more specifically the master production scheduling (MPS) problem. These algorithms include an Evolutionary Algorithm called Genetic Algorithm, a Swarm Intelligence methodology called Gravitational Search Algorithm (GSA), Bat Algorithm (BAT), T

... Show More
View Publication Preview PDF
Scopus (15)
Crossref (13)
Scopus Crossref
Publication Date
Fri May 01 2020
Journal Name
Practice Periodical On Structural Design And Construction
Utilizing Emerging Technologies for Construction Safety Risk Mitigation
...Show More Authors

View Publication
Scopus (114)
Crossref (96)
Scopus Clarivate Crossref
Publication Date
Tue Jan 31 2023
Journal Name
International Journal Of Nonlinear Analysis And Applications
Survey on intrusion detection system based on analysis concept drift: Status and future directions
...Show More Authors

Nowadays, internet security is a critical concern; the One of the most difficult study issues in network security is "intrusion detection". Fight against external threats. Intrusion detection is a novel method of securing computers and data networks that are already in use. To boost the efficacy of intrusion detection systems, machine learning and deep learning are widely deployed. While work on intrusion detection systems is already underway, based on data mining and machine learning is effective, it requires to detect intrusions by training static batch classifiers regardless considering the time-varying features of a regular data stream. Real-world problems, on the other hand, rarely fit into models that have such constraints. Furthermor

... Show More
View Publication
Publication Date
Thu Feb 09 2023
Journal Name
Artificial Intelligence Review
Community detection model for dynamic networks based on hidden Markov model and evolutionary algorithm
...Show More Authors

Finding communities of connected individuals in complex networks is challenging, yet crucial for understanding different real-world societies and their interactions. Recently attention has turned to discover the dynamics of such communities. However, detecting accurate community structures that evolve over time adds additional challenges. Almost all the state-of-the-art algorithms are designed based on seemingly the same principle while treating the problem as a coupled optimization model to simultaneously identify community structures and their evolution over time. Unlike all these studies, the current work aims to individually consider this three measures, i.e. intra-community score, inter-community score, and evolution of community over

... Show More
View Publication
Scopus (10)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Sat Jul 01 2023
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Auditing the performance of the structural capital according to standards of e-learning and its reflection on the performance of universities: applied research
...Show More Authors

The developments and transformations taking place in the era and the growth of knowledge economies and communication technology led this development to compel higher education institutions in Iraq to reconsider their objectives to keep pace with development. And one of the most important tools of development was the application of e-learning standards and its long-term impact on the performance of the educational institution. Performance auditing plays an important role in verifying the extent to which these institutions have implemented their activities and programs that auditing performance by adopting e-learning standards helps the institutions’ management by providing appropriate information on the extent to which they achieve thei

... Show More
View Publication Preview PDF
Publication Date
Wed Feb 01 2017
Journal Name
Journal Of Economics And Administrative Sciences
Performance Evaluation Strategy and its Impact on the Achievement of Organizational Effectiveness
...Show More Authors

Abstract

The research aims to determine the impact of the strategy performance evaluation and of the Standards (leadership, people, knowledge, processes, financial) in the achievement of organizational effectiveness in accordance with the dimensions (planning and setting goals, Exploitation of the Environment, achieve the goals, the ability to adapt, information management and communications) and the relationship between them, the problem of the research in the growing interest in the process of performance evaluation for organizations, the erroneous belief that the performance evaluation activity is useful, and the fact that performance evaluation process is one of the main tasks of the work of the Office of the Inspecto

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Aug 13 2025
Journal Name
Mechanics Of Time-dependent Materials
Performance evaluation of highly modified asphalt binders using elastomeric and plastomeric polymers
...Show More Authors

Highly Modified Asphalt (HiMA) binders have garnered significant attention due to their superior resistance to rutting, fatigue cracking, and thermal distress under heavy traffic loads and extreme environmental conditions. While elastomeric polymers such as Styrene- Butadiene-Styrene (SBS) have been extensively used in HiMA applications, the potential of plastomeric polymers, including Polyethylene (PE) and Ethylene Vinyl Acetate (EVA), remains largely unexplored. This study aims to evaluate the performance of reference binder (RB) modified with plastomeric HiMA asphalt in comparison to SBS-modified binders and determine the optimal polymer dosage for achieving an optimal balance between rutting resistance and fatigue durability. The experi

... Show More
View Publication
Scopus Clarivate Crossref
Publication Date
Sat Oct 01 2022
Journal Name
Journal Of Applied Geophysics
Predicting dynamic shear wave slowness from well logs using machine learning methods in the Mishrif Reservoir, Iraq
...Show More Authors

Crossref (9)
Crossref