Preferred Language
Articles
/
OhdOPo8BVTCNdQwCHmXk
Construct an efficient distributed denial of service attack detection system based on data mining techniques
...Show More Authors

<span>Distributed denial-of-service (DDoS) attack is bluster to network security that purpose at exhausted the networks with malicious traffic. Although several techniques have been designed for DDoS attack detection, intrusion detection system (IDS) It has a great role in protecting the network system and has the ability to collect and analyze data from various network sources to discover any unauthorized access. The goal of IDS is to detect malicious traffic and defend the system against any fraudulent activity or illegal traffic. Therefore, IDS monitors outgoing and incoming network traffic. This paper contains a based intrusion detection system for DDoS attack, and has the ability to detect the attack intelligently, dynamically and periodically by evaluating the set of attackers of the current node with its neighbors. We use dataset named CICDDoS2019 that contains on binary classes benign and DDoS. Performance has evaluated by applying data mining algorithms as well as applying the best features to discover potential attack classes.</span>

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Jan 01 2021
Journal Name
International Journal Of Agricultural And Statistical Sciences
ESTIMATED NON-PARAMETRIC AND SEMI-PARAMETRIC MODEL FOR LONGITUDINAL DATA
...Show More Authors

View Publication
Scopus
Publication Date
Tue Jun 13 2023
Journal Name
Journal Of Survey In Fisheries Sciences
Spectrum Analyzing X-ray Data Image (FITS) Using Ds9 Program
...Show More Authors

n this study, data or X-ray images Fixable Image Transport System (FITS) of objects were analyzed, where energy was collected from the body by several sensors; each sensor receives energy within a specific range, and when energy was collected from all sensors, the image was formed carrying information about that body. The images can be transferred and stored easily. The images were analyzed using the DS9 program to obtain a spectrum for each object,an energy corresponding to the photons collected per second. This study analyzed images for two types of objects (globular and open clusters). The results showed that the five open star clusters contain roughly t

... Show More
View Publication Preview PDF
Publication Date
Tue Jul 01 2025
Journal Name
Mastering The Minds Of Machines
Recurrent Neural Networks and its Applications in Time Series Data
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Fri Apr 01 2016
Journal Name
Gis Research Uk 24th Annual Conference
Comparing Open Source Map Data in Areas Lacking Authoritative Mapping
...Show More Authors

One wide-ranging category of open source data is that referring to geospatial information web sites. Despite the advantages of such open source data, including ease of access and cost free data, there is a potential issue of its quality. This article tests the horizontal positional accuracy and possible integration of four web-derived geospatial datasets: OpenStreetMap (OSM), Google Map, Google Earth and Wikimapia. The evaluation was achieved by combining the tested information with reference field survey data for fifty road intersections in Baghdad, Iraq. The results indicate that the free geospatial data can be used to enhance authoritative maps especially small scale maps.

Publication Date
Thu Nov 01 2012
Journal Name
2012 International Conference On Advanced Computer Science Applications And Technologies (acsat)
Data Missing Solution Using Rough Set theory and Swarm Intelligence
...Show More Authors

This paper presents a hybrid approach for solving null values problem; it hybridizes rough set theory with intelligent swarm algorithm. The proposed approach is a supervised learning model. A large set of complete data called learning data is used to find the decision rule sets that then have been used in solving the incomplete data problem. The intelligent swarm algorithm is used for feature selection which represents bees algorithm as heuristic search algorithm combined with rough set theory as evaluation function. Also another feature selection algorithm called ID3 is presented, it works as statistical algorithm instead of intelligent algorithm. A comparison between those two approaches is made in their performance for null values estima

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Tue Dec 01 2020
Journal Name
Baghdad Science Journal
Combining Several Substitution Cipher Algorithms using Circular Queue Data Structure
...Show More Authors

With the revolutionized expansion of the Internet, worldwide information increases the application of communication technology, and the rapid growth of significant data volume boosts the requirement to accomplish secure, robust, and confident techniques using various effective algorithms. Lots of algorithms and techniques are available for data security.  This paper presents a cryptosystem that combines several Substitution Cipher Algorithms along with the Circular queue data structure. The two different substitution techniques are; Homophonic Substitution Cipher and Polyalphabetic Substitution Cipher in which they merged in a single circular queue with four different keys for each of them, which produces eight different outputs for

... Show More
View Publication Preview PDF
Scopus (13)
Crossref (6)
Scopus Clarivate Crossref
Publication Date
Fri Apr 01 2022
Journal Name
Baghdad Science Journal
Improved Firefly Algorithm with Variable Neighborhood Search for Data Clustering
...Show More Authors

Among the metaheuristic algorithms, population-based algorithms are an explorative search algorithm superior to the local search algorithm in terms of exploring the search space to find globally optimal solutions. However, the primary downside of such algorithms is their low exploitative capability, which prevents the expansion of the search space neighborhood for more optimal solutions. The firefly algorithm (FA) is a population-based algorithm that has been widely used in clustering problems. However, FA is limited in terms of its premature convergence when no neighborhood search strategies are employed to improve the quality of clustering solutions in the neighborhood region and exploring the global regions in the search space. On the

... Show More
View Publication Preview PDF
Scopus (16)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Sun Sep 01 2019
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The effect of accounting disclosure in the efficient performance of the tax authority: Applied research in the General Commission for Taxes
...Show More Authors

               Starting with a problem of the weakness of accounting disclosure in some companies administration when preparing and presenting the financial reports which are submitted to the Tax authority. This problem impacts on Tax authority performance (The effect on the quality of the performance of the tax authority), because of the lack of conviction for the information contained in those reports, and the  failure to achieve accurate results in tax authority performance that leads to a negative impact on determining taxable income and affect tax revenue, as well as negative impact on  determining taxable income and affect tax revenue, as well as negati

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jun 20 2021
Journal Name
Baghdad Science Journal
Conceptual Service Level Agreement Mechanism to Minimize the SLA Violation with SLA Negotiation Process in Cloud Computing Environment
...Show More Authors

Online service is used to be as Pay-Per-Use in Cloud computing. Service user need not be in a long time contract with cloud service providers. Service level agreements (SLAs) are understandings marked between a cloud service providers and others, for example, a service user, intermediary operator, or observing operators. Since cloud computing is an ongoing technology giving numerous services to basic business applications and adaptable systems to manage online agreements are significant. SLA maintains the quality-of-service to the cloud user. If service provider fails to maintain the required service SLA is considered to be SLA violated. The main aim is to minimize the SLA violations for maintain the QoS of their cloud users. In this res

... Show More
View Publication Preview PDF
Scopus (10)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Sun Oct 01 2017
Journal Name
Journal Of Economics And Administrative Sciences
The role of organizational culture in the quality of banking service financial perspective Applied research in a sample of Iraqi private banks
...Show More Authors

The banking sector is a cornerstone of the national economy because of its large role of economic development of a country, which requires the advancement of this vital sector and interest in all the accompanying changes to him in order to survive and grow and continue Accordingly dealt Find reversal (organizational culture, on the quality of banking service ) sought search to achieve a number of cognitive and practical goals by selecting (10), especially among the working banks in Iraq Iraqi banks and the period is the surveyed period (2005-2014) embodied the research problem in the dialectical relationship between the (organizational culture) and its impacts on banking service quality.

Through a set of

... Show More
View Publication Preview PDF
Crossref