Preferred Language
Articles
/
oRf6Po8BVTCNdQwC6WUP
Evaluation of DDoS attacks Detection in a New Intrusion Dataset Based on Classification Algorithms
...Show More Authors

Intrusion detection system is an imperative role in increasing security and decreasing the harm of the computer security system and information system when using of network. It observes different events in a network or system to decide occurring an intrusion or not and it is used to make strategic decision, security purposes and analyzing directions. This paper describes host based intrusion detection system architecture for DDoS attack, which intelligently detects the intrusion periodically and dynamically by evaluating the intruder group respective to the present node with its neighbors. We analyze a dependable dataset named CICIDS 2017 that contains benign and DDoS attack network flows, which meets certifiable criteria and is openly accessible. It evaluates the performance of a complete arrangement of machine learning algorithms and network traffic features to indicate the best features for detecting the assured attack classes. Our goal is storing the address of destination IP that is utilized to detect an intruder by method of misuse detection.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Dec 12 2018
Journal Name
Iraqi National Journal Of Nursing Specialties
Evaluation of Youth's Health Risk Behaviors in Baghdad City
...Show More Authors

Objective(s): To evaluate youth's health risk behaviors in Baghdad City and to determine the relationship between such behaviors and the youth's demographic characteristics of age, gender and grade. Methodology: A descriptive study, using the evaluation approach, is carried out to evaluate youth's health risk behaviors in Baghdad City for the period of January 26th 2016 to May 20th 2016. A non-probability "purposive" sample of (160) University students is selected for the purpose of the study from four groups of colleges (medical, engineering, sciences, and education) and it is equally distributed of

... Show More
View Publication Preview PDF
Publication Date
Wed Jan 01 2020
Journal Name
International Journal Of Pharmaceutical Research
Spectrophotometric Evaluation of Paracetamol in Bulk and Pharmaceutical Preparations
...Show More Authors

View Publication Preview PDF
Scopus Crossref
Publication Date
Thu Jun 25 2020
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Formulation and In-vitro Evaluation of Itraconazole Floating Microparticles
...Show More Authors

Itraconazole (ITZ) is an antifungal drug (BCSII) used for the treatment of local and systemic fungal infections. Furthermore, ITZ used as an antifungal prophylaxis for immunocompromised patients.

The objective of the study is to overcome the two problems of low and pH dependent solubility of ITZ by its preparation as floating microparticles.

Firstly, pH-dependent floating microparticles were prepared using oil in water solvent evaporation method, from which the best one (F7) selected as a best pH-dependent formula with composition of   ITZ (200mg),EC (800mg), HPMC 15cps (200mg) and safflower oil (2ml) .Then, F7 was compared with the selected Relatively pH-independent ITZ floating microparticles formula  wit

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (1)
Scopus Crossref
Publication Date
Mon Jun 30 2014
Journal Name
Al-kindy College Medical Journal
Evaluation of Serum RANKL Level in Acute Coronary Syndrome
...Show More Authors

Background: Acute coronary syndrome (ACS) is a common disease, and a major determinant of morbidity and mortality in all races. The pleiotropic effects of the receptor activator of nuclear factor-kappa B ligand (RANKL) such as modulation of cell survival, mineralization and inflammation, make it an interesting candidate mediator in the progression and destabilization of atherosclerotic lesions.Objectives: This study was performed to investigate the role of RANKL in the pathogenesis of ACS.Methods: The levels of RANKL were measured by ELISA method in sera of 60 ACS patients, 31 patients with unstable angina (UA) and 29 patients with myocardial infarction (MI) in comparison with 20 apparently healthy controls.Results: Current data indicate

... Show More
View Publication Preview PDF
Publication Date
Sun Sep 01 2019
Journal Name
Journal Of Physics: Conference Series
Evaluation of Nuclear safety procedures in some Iraqi universities
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Tue Jun 15 2021
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Nanosuspensions of Selexipag: Formulation, Characterization, and in vitro Evaluation
...Show More Authors

Selexipag is an orally selective long-acting prostacyclin receptor agonist, which indicated for the treatment of pulmonary arterial hypertension. It is practically insoluble in water ( class II, according to BCS). This work aims to prepare and optimized Selexipag nanosuspensions to achieve an enhancement in the in vitro dissolution rate. The solvent antisolvent precipitation method was used for the production of nanosuspension, and the effect of formulation parameters (stabilizer type, drug: stabilizer ratio, and use of co-stabilizer) and process parameter (stirring speed) on the particle size and polydispersity index were studied. SLPNS prepared with Soluplus® as amain stabilizer (F15) showed the smallest particle size 47nm wi

... Show More
View Publication Preview PDF
Scopus (27)
Crossref (8)
Scopus Crossref
Publication Date
Tue Nov 01 2016
Journal Name
Iosr Journal Of Computer Engineering
Implementation of new Secure Mechanism for Data Deduplication in Hybrid Cloud
...Show More Authors

Cloud computing provides huge amount of area for storage of the data, but with an increase of number of users and size of their data, cloud storage environment faces earnest problem such as saving storage space, managing this large data, security and privacy of data. To save space in cloud storage one of the important methods is data deduplication, it is one of the compression technique that allows only one copy of the data to be saved and eliminate the extra copies. To offer security and privacy of the sensitive data while supporting the deduplication, In this work attacks that exploit the hybrid cloud deduplication have been identified, allowing an attacker to gain access to the files of other users based on very small hash signatures of

... Show More
View Publication Preview PDF
Publication Date
Wed Sep 21 2022
Journal Name
Journal Of Planner And Development
"An analytical study of The New Urbanism in the urban suburbs
...Show More Authors

                 The research deals with the concept of a New Urbanism as an urban development strategy in the suburbs of cities or in its centers that are affected by pedestrian-oriented design and the possibility of walking, as well as integrating economic classes through the diversity of housing and its costs, and this works to facilitate access to jobs and services while providing more diverse neighborhoods and reducing the use of cars , As designing separate houses in the suburbs and increasing car trips poses a threat to the environment and the quality of urban life, and thus the new urban provides a good strategy for developing

... Show More
View Publication Preview PDF
Publication Date
Fri Jan 01 2016
Journal Name
Lap Lambert Academic Publishing
New Technique to Estimate the concentration of Heavy Metals in soil
...Show More Authors

There are many aims of this book: The first aim is to develop a model equation that describes the spread of contamination through soils which can be used to determine the rate of environmental contamination by estimate the concentration of heavy metals (HMs) in soil. The developed model equation can be considered as a good representation for a problem of environmental contamination. The second aim of this work is to design two feed forward neural networks (FFNN) as an alternative accurate technique to determine the rate of environmental contamination which can be used to solve the model equation. The first network is to simulate the soil parameters which can be used as input data in the second suggested network, while the second network sim

... Show More
View Publication Preview PDF
Publication Date
Wed Nov 01 2023
Journal Name
Iop Conference Series: Earth And Environmental Science
New Record with Revision of Nomiinae Bees (Hymenoptera: Halictidae) in Iraq
...Show More Authors
Abstract<p>In this study the Sub family of Nomiinae Robertson,1904 (Hyminoptera: Halictidae) was revised There were five species registered in our investigation: <italic>Pseudapis edentata</italic>(Morawitz,1876), <italic>P. nilotica</italic> (Smith,1976), <italic>Nomiapes bispinosa</italic> (Bulle,1832), <italic>N. diversipes</italic> (Latreille,1806), <italic>N. fugax</italic> (Morawitz1877); the last species is newly recorded in Iraq. A Key to identify the genera and species was designed according to the important morphological characters; as well, a brief description of the new record species is provided.</p>
View Publication
Scopus Crossref