Preferred Language
Articles
/
OhdOPo8BVTCNdQwCHmXk
Construct an efficient distributed denial of service attack detection system based on data mining techniques
...Show More Authors

<span>Distributed denial-of-service (DDoS) attack is bluster to network security that purpose at exhausted the networks with malicious traffic. Although several techniques have been designed for DDoS attack detection, intrusion detection system (IDS) It has a great role in protecting the network system and has the ability to collect and analyze data from various network sources to discover any unauthorized access. The goal of IDS is to detect malicious traffic and defend the system against any fraudulent activity or illegal traffic. Therefore, IDS monitors outgoing and incoming network traffic. This paper contains a based intrusion detection system for DDoS attack, and has the ability to detect the attack intelligently, dynamically and periodically by evaluating the set of attackers of the current node with its neighbors. We use dataset named CICDDoS2019 that contains on binary classes benign and DDoS. Performance has evaluated by applying data mining algorithms as well as applying the best features to discover potential attack classes.</span>

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Feb 10 2019
Journal Name
Journal Of The College Of Education For Women
The Influence of Teacher and Students Errors Correction Techniques on Students’ Achievement in English at College of Physical Education for Women
...Show More Authors

The research is an attempt to investigate experimentally the influence of teacher’s errors correction and students’ errors correction on teaching English at the College of Physical Education for Women. Errors are seen as a natural way for developing any language but teachers are puzzled the way they can correct these errors. So, this research gives some idea of using two types of errors correction. The sample of the research is female students of the first year stage at the College of Physical Education for Women of the academic year 2009-2010. The whole population of the research is (94) students while the sample is (64). Thus, the sample represents 68% from the population of the research. The sample represents It is hypothesized th

... Show More
View Publication Preview PDF
Publication Date
Mon Nov 05 2018
Journal Name
Iraqi National Journal Of Nursing Specialties
Effect of Mechanical Surface Treatment on the Tensile Bond Strength of Repaired Acrylic Denture Base Resin Cured by Two Different Techniques
...Show More Authors

Objective: To evaluate and compare the effect of mechanical surface treatment (groove, aluminum oxide particles)
with 45 degree bevel type of joint on tensile bond strength of acrylic specimens repaired by two curing methods
(microwave and water both).
Methodology: Eighty specimens (80) were prepared from pink heat cure acrylic resin. They were divided into two
main groups (40 specimen repaired by microwave energy and 40 specimens repaired by water bath method).Each
group can be divided into four subgroups of ten according to the surface treatment. The control group A was left
intact, group B received no surface treatment, group C and D received surface treatment by (groove, 50 m aluminum
oxide particles). Specimens

... Show More
View Publication Preview PDF
Publication Date
Mon Oct 01 2018
Journal Name
International Journal Of Electrical And Computer Engineering
Load balance in data center SDN networks
...Show More Authors

In the last two decades, networks had been changed according to the rapid changing in its requirements. The current Data Center Networks have large number of hosts (tens or thousands) with special needs of bandwidth as the cloud network and the multimedia content computing is increased. The conventional Data Center Networks (DCNs) are highlighted by the increased number of users and bandwidth requirements which in turn have many implementation limitations. The current networking devices with its control and forwarding planes coupling result in network architectures are not suitable for dynamic computing and storage needs. Software Defined networking (SDN) is introduced to change this notion of traditional networks by decoupling control and

... Show More
Publication Date
Mon Oct 14 2019
Journal Name
Applied Sciences
Synthesis of Novel Heteroatom-Doped Porous-Organic Polymers as Environmentally Efficient Media for Carbon Dioxide Storage
...Show More Authors

The high carbon dioxide emission levels due to the increased consumption of fossil fuels has led to various environmental problems. Efficient strategies for the capture and storage of greenhouse gases, such as carbon dioxide are crucial in reducing their concentrations in the environment. Considering this, herein, three novel heteroatom-doped porous-organic polymers (POPs) containing phosphate units were synthesized in high yields from the coupling reactions of phosphate esters and 1,4-diaminobenzene (three mole equivalents) in boiling ethanol using a simple, efficient, and general procedure. The structures and physicochemical properties of the synthesized POPs were established using various techniques. Field emission scanning elect

... Show More
View Publication
Scopus (15)
Crossref (15)
Scopus Clarivate Crossref
Publication Date
Mon Jan 01 2024
Journal Name
The Scientific World Journal
Efficient Removal of Brilliant Green Dye Using Mesoporous Attapulgite Clay: Investigating Adsorption Kinetics, Isotherms, and Mechanisms
...Show More Authors

The study involved the effectiveness of Iraqi attapulgite (IQATP) clay as an environmentally friendly material that easily adsorbs brilliant green (BG) dye from water systems and is identified by various complementary methods (e.g., FTIR, SEM‐EDS, XRD, ICP‐OES, pHpzc, and BET), where the result reported that the IQATP specific surface area is 29.15 m2/g. A systematic analysis was selected to evaluate the impact of different effective adsorption performance variables on BG dye decontamination. These variables included IQATP dosage (0.02–0.8 g/L), solution pH (3.05–8.15), contact time (ranging from 2 to 25 min), and initial BG dye concentration from 20 to 80 mg/L. The parameter

... Show More
View Publication
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Mon Dec 01 2025
Journal Name
Applied Thermal Engineering
Efficient thermal management of PVT systems via water-PCM hybridization: New design with optimized geometrical configuration
...Show More Authors

View Publication
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Sun Sep 11 2022
Journal Name
Mathematics
Modeling and Analysis of the Influence of Fear on a Harvested Food Web System
...Show More Authors

The food web is a crucial conceptual tool for understanding the dynamics of energy transfer in an ecosystem, as well as the feeding relationships among species within a community. It also reveals species interactions and community structure. As a result, an ecological food web system with two predators competing for prey while experiencing fear was developed and studied. The properties of the solution of the system were determined, and all potential equilibrium points were identified. The dynamic behavior in their immediate surroundings was examined both locally and globally. The system’s persistence demands were calculated, and all conceivable forms of local bifurcations were investigated. With the aid of MATLAB, a numerical simu

... Show More
View Publication
Scopus (12)
Crossref (8)
Scopus Clarivate Crossref
Publication Date
Sun Dec 05 2010
Journal Name
Baghdad Science Journal
Effect of parasites on the of digestive system in Iraqi bulbul Pycnonotus lecuotis mesoptamiae
...Show More Authors

This study included collecting of 150 specimens of the Iraqi Bird Bulbule Pycnonotus lecuotis mesoptamiae (Pycnotidae , Passeriformes), from the 1st of November 2004 to 30th of October 2005 in the city of Baghdad and its suburbs, in concern of identifying the internal parasite of the digestive tract of these birds and studying the diseases resulted from the infection. The study showed that the bird Bulbule is Parasitized by Four types of Cestodes ,two of them are recorded in this kind of bird in Iraq for the first time ,Paradicranotinae anormalis and Haploparaxis sp. , and the other two are Raillietina tetragona and Allohymenolepsis sp. ,and by two types of Pin Worm(Trematode) that are identified for the first time in the Bird Bulb

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sat Jun 30 2012
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Effect of Annealing on the Crystallization of Poly Vinyl Chloride for Drug Delivery System
...Show More Authors

Poly vinyl alcohol has been studied for its ability to form crystallites by using annealing method. Semicrystalline films of poly vinyl alcohol (PVA) were prepared by casting 11.5 wt. % and 13 wt. % PVA aqueous solution onto glass slides at annealing temperature range 90 -120°C and duration time 15- 60 minute. This allowed the macromolecules to form crystallites, small regions of folded and compacted chains separated by amorphous regions where single PVA chain may pass through several of these crystallites. Degree of crystallinity of PVA films (hydrogels) was determined by method of density; on the other hand the swelling behavior was conducted by the determination of water uptake, wet degree of crystallinity, gel fraction and solubilit

... Show More
View Publication Preview PDF
Publication Date
Mon Sep 23 2019
Journal Name
Baghdad Science Journal
A Semi-Supervised Machine Learning Approach Using K-Means Algorithm to Prevent Burst Header Packet Flooding Attack in Optical Burst Switching Network
...Show More Authors

Optical burst switching (OBS) network is a new generation optical communication technology. In an OBS network, an edge node first sends a control packet, called burst header packet (BHP) which reserves the necessary resources for the upcoming data burst (DB). Once the reservation is complete, the DB starts travelling to its destination through the reserved path. A notable attack on OBS network is BHP flooding attack where an edge node sends BHPs to reserve resources, but never actually sends the associated DB. As a result the reserved resources are wasted and when this happen in sufficiently large scale, a denial of service (DoS) may take place. In this study, we propose a semi-supervised machine learning approach using k-means algorithm

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (2)
Scopus Clarivate Crossref