Preferred Language
Articles
/
OhdOPo8BVTCNdQwCHmXk
Construct an efficient distributed denial of service attack detection system based on data mining techniques
...Show More Authors

<span>Distributed denial-of-service (DDoS) attack is bluster to network security that purpose at exhausted the networks with malicious traffic. Although several techniques have been designed for DDoS attack detection, intrusion detection system (IDS) It has a great role in protecting the network system and has the ability to collect and analyze data from various network sources to discover any unauthorized access. The goal of IDS is to detect malicious traffic and defend the system against any fraudulent activity or illegal traffic. Therefore, IDS monitors outgoing and incoming network traffic. This paper contains a based intrusion detection system for DDoS attack, and has the ability to detect the attack intelligently, dynamically and periodically by evaluating the set of attackers of the current node with its neighbors. We use dataset named CICDDoS2019 that contains on binary classes benign and DDoS. Performance has evaluated by applying data mining algorithms as well as applying the best features to discover potential attack classes.</span>

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Dec 30 2009
Journal Name
Iraqi Journal Of Physics
Preparation and characterization of nanostructure high efficient CdS/Si hetrojunction by CBD
...Show More Authors

In this paper, CdS/Si hetrojunction solar cell has been made by
Chemical Bath Deposition (CBD) of CdS thin film on to
monocrystalline silicon substrate. XRD measurements approved that
CdS film is changing the structure of CdS films from mixed
hexagonal and cubic phase to the hexagonal phase with [101]
predominant orientation. I-V characterization of the hetrojunction
shows good rectification, with high spectral responsivity of 0.41
A/W, quantum efficiency 90%,and specific detectivity 2.9*1014
cmHz1/2W -1 .

View Publication Preview PDF
Publication Date
Thu Mar 06 2025
Journal Name
Aip Conference Proceedings
Solving 5th order nonlinear 4D-PDEs using efficient design of neural network
...Show More Authors

View Publication
Crossref (1)
Scopus Crossref
Publication Date
Sun Dec 03 2017
Journal Name
Baghdad Science Journal
On the Connection between the Dynamical System and the Ellis Compactification with Transitive Pointed System
...Show More Authors

In this paper, some relations between the flows and the Enveloping Semi-group were studied. It allows to associate some properties on the topological compactification to any pointed flows. These relations enable us to study a number of the properties of the principles of flows corresponding with using algebric properties. Also in this paper proofs to some theorems of these relations are given.

View Publication Preview PDF
Scopus (3)
Scopus Crossref
Publication Date
Fri Jan 01 2016
Journal Name
Machine Learning And Data Mining In Pattern Recognition
A New Strategy for Case-Based Reasoning Retrieval Using Classification Based on Association
...Show More Authors

View Publication Preview PDF
Scopus (7)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Fri Sep 30 2016
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Applied Spatial Data Analysis Technique on Petrophysical Properties of MA Unit of Mishrif Formation / Noor Field
...Show More Authors

Noor oil field is one of smallest fields in Missan province. Twelve well penetrates the Mishrif Formation in Noor field and eight of them were selected for this study. Mishrif formation is one of the most important reservoirs in Noor field and it consists of one anticline dome and bounded by the Khasib formation at the top and the Rumaila formation at the bottom. The reservoir was divided into eight units separated by isolated units according to partition taken by a rounding fields.

In this paper histograms frequency distribution of the porosity, permeability, and water saturation were plotted for MA unit of Mishrif formation in Noor field, and then transformed to the normal distribution by applying the Box-Cox transformation alg

... Show More
View Publication Preview PDF
Publication Date
Sat Jan 01 2022
Journal Name
Iop Conference Series: Earth And Environmental Science
Natural Convection in Annulus Between Two Concentric Cylinders Partially Filled with Metal Foam Distributed with New Suggested Design
...Show More Authors
Abstract<p>The investigation of natural convection in an annular space between two concentric cylinders partially filled with metal foam is introduced numerically. The metal foam is inserted with a new suggested design that includes the distribution of metal foam in the annular space, not only in the redial direction, but also with the angular direction. Temperatures of inner and outer cylinders are maintained at constant value in which inner cylinder temperature is higher than the outer one. Naiver Stokes equation with Boussinesq approximation is used for fluid regime while Brinkman-Forchheimer Darcy model used for metal foam. In addition, the local thermal equilibrium condition in the energy e</p> ... Show More
View Publication
Scopus (6)
Crossref (6)
Scopus Crossref
Publication Date
Mon Sep 01 2025
Journal Name
International Communications In Heat And Mass Transfer
Boosting energy storage and recovery in shell-and-multitube latent heat storage systems through sunburst-distributed radial fins
...Show More Authors

View Publication
Scopus (2)
Crossref (1)
Scopus Crossref
Publication Date
Mon Apr 03 2023
Journal Name
Journal Of Educational And Psychological Researches
The Effectiveness of a Training Program for Children with Autism and their Mothers Based on the Picture Exchange Commination System to Confront Some of Basic Disorders for these Children
...Show More Authors

Abstract

The current research aims to examine the effectiveness of a training program for children with autism and their mothers based on the Picture Exchange Communication System to confront some basic disorders in a sample of children with autism. The study sample was (16) children with autism and their mothers in the different centers in Taif city and Tabuk city. The researcher used the quasi-experimental approach, in which two groups were employed: an experimental group and a control group. Children aged ranged from (6-9) years old. In addition, it was used the following tools: a list of estimation of basic disorders for a child with autism between (6-9) years, and a training program for children with autism

... Show More
View Publication Preview PDF
Publication Date
Fri Oct 19 2018
Journal Name
Journal Of Economics And Administrative Sciences
Big Data Approch to Enhance Organizational Ambidexterity An Exploratory Study of a Sample of Managers at ASIA Cell For Mobile Telecommunication Company in Iraq
...Show More Authors

               The research aimed at measuring the compatibility of Big date with the organizational Ambidexterity dimensions of the Asia cell  Mobile telecommunications company in Iraq in order to determine the possibility of adoption of Big data Triple as a approach to achieve organizational Ambidexterity.

The study adopted the descriptive analytical approach to collect and analyze the data collected by the questionnaire tool developed on the Likert scale After  a comprehensive review of the literature related to the two basic study dimensions, the data has been subjected to many statistical treatments in accordance with res

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Sun Dec 01 2013
Journal Name
2013 Sixth International Conference On Developments In Esystems Engineering
Ensure Security of Compressed Data Transmission
...Show More Authors

Data compression offers an attractive approach to reducing communication costs using available bandwidth effectively. It makes sense to pursue research on developing algorithms that can most effectively use available network. It is also important to consider the security aspect of the data being transmitted is vulnerable to attacks. The basic aim of this work is to develop a module for combining the operation of compression and encryption on the same set of data to perform these two operations simultaneously. This is achieved through embedding encryption into compression algorithms since both cryptographic ciphers and entropy coders bear certain resemblance in the sense of secrecy. First in the secure compression module, the given text is p

... Show More
View Publication
Scopus (4)
Crossref (5)
Scopus Clarivate Crossref