Preferred Language
Articles
/
oRf6Po8BVTCNdQwC6WUP
Evaluation of DDoS attacks Detection in a New Intrusion Dataset Based on Classification Algorithms
...Show More Authors

Intrusion detection system is an imperative role in increasing security and decreasing the harm of the computer security system and information system when using of network. It observes different events in a network or system to decide occurring an intrusion or not and it is used to make strategic decision, security purposes and analyzing directions. This paper describes host based intrusion detection system architecture for DDoS attack, which intelligently detects the intrusion periodically and dynamically by evaluating the intruder group respective to the present node with its neighbors. We analyze a dependable dataset named CICIDS 2017 that contains benign and DDoS attack network flows, which meets certifiable criteria and is openly accessible. It evaluates the performance of a complete arrangement of machine learning algorithms and network traffic features to indicate the best features for detecting the assured attack classes. Our goal is storing the address of destination IP that is utilized to detect an intruder by method of misuse detection.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Feb 25 2024
Journal Name
Baghdad Science Journal
Efficient Task Scheduling Approach in Edge-Cloud Continuum based on Flower Pollination and Improved Shuffled Frog Leaping Algorithm
...Show More Authors

The rise of edge-cloud continuum computing is a result of the growing significance of edge computing, which has become a complementary or substitute option for traditional cloud services. The convergence of networking and computers presents a notable challenge due to their distinct historical development. Task scheduling is a major challenge in the context of edge-cloud continuum computing. The selection of the execution location of tasks, is crucial in meeting the quality-of-service (QoS) requirements of applications. An efficient scheduling strategy for distributing workloads among virtual machines in the edge-cloud continuum data center is mandatory to ensure the fulfilment of QoS requirements for both customer and service provider. E

... Show More
View Publication Preview PDF
Scopus (5)
Crossref (2)
Scopus Crossref
Publication Date
Tue Dec 07 2021
Journal Name
2021 14th International Conference On Developments In Esystems Engineering (dese)
Object Detection and Distance Measurement Using AI
...Show More Authors

View Publication
Scopus (30)
Crossref (24)
Scopus Clarivate Crossref
Publication Date
Mon Feb 01 2021
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Differential evolution detection models for SMS spam
...Show More Authors

With the growth of mobile phones, short message service (SMS) became an essential text communication service. However, the low cost and ease use of SMS led to an increase in SMS Spam. In this paper, the characteristics of SMS spam has studied and a set of features has introduced to get rid of SMS spam. In addition, the problem of SMS spam detection was addressed as a clustering analysis that requires a metaheuristic algorithm to find the clustering structures. Three differential evolution variants viz DE/rand/1, jDE/rand/1, jDE/best/1, are adopted for solving the SMS spam problem. Experimental results illustrate that the jDE/best/1 produces best results over other variants in terms of accuracy, false-positive rate and false-negative

... Show More
View Publication
Scopus (9)
Crossref (2)
Scopus Crossref
Publication Date
Fri Feb 17 2023
Journal Name
Journal Of Al-qadisiyah For Computer Science And Mathematics
Deploying Facial Segmentation Landmarks for Deepfake Detection
...Show More Authors

Deepfake is a type of artificial intelligence used to create convincing images, audio, and video hoaxes and it concerns celebrities and everyone because they are easy to manufacture. Deepfake are hard to recognize by people and current approaches, especially high-quality ones. As a defense against Deepfake techniques, various methods to detect Deepfake in images have been suggested. Most of them had limitations, like only working with one face in an image. The face has to be facing forward, with both eyes and the mouth open, depending on what part of the face they worked on. Other than that, a few focus on the impact of pre-processing steps on the detection accuracy of the models. This paper introduces a framework design focused on this asp

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Sun Jun 03 2012
Journal Name
Baghdad Science Journal
A Biochemical Study for Evaluation and Analysis of Serum Protein of Patients with Different Kidney Tumors
...Show More Authors

The amount of protein in the serum depends on the balance between the rate of its synthesis, and that of its catabolism or loss. Abnormal metabolism may result from nutritional deficiency, enzyme deficiency, abnormal secretion of hormones, or the actions of drugs and toxins. Renal cancer is the third most common malignancy of the genitourinary system, and accounts for 3% of adult malignancies globally. Total serum proteins were measured in malignant kidney tumor, benign kidney tumors, and non tumoral kidney diseases patient groups, as well as in healthy individuals. A significant decrease (p< 0.001) of total serum protein levels in patients with malignant kidney tumors when compared with those of benign tumors, non tumoral diseases, and hea

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Aug 17 2022
Journal Name
Sustainability
Experimental Evaluation of the Thermoelectrical Performance of Photovoltaic-Thermal Systems with a Water-Cooled Heat Sink
...Show More Authors

A design for a photovoltaic-thermal (PVT) assembly with a water-cooled heat sink was planned, constructed, and experimentally evaluated in the climatic conditions of the southern region of Iraq during the summertime. The water-cooled heat sink was applied to thermally manage the PV cells, in order to boost the electrical output of the PVT system. A set of temperature sensors was installed to monitor the water intake, exit, and cell temperatures. The climatic parameters including the wind velocity, atmospheric pressure, and solar irradiation were also monitored on a daily basis. The effects of solar irradiation on the average PV temperature, electrical power, and overall electrical-thermal efficiency were investigated. The findings i

... Show More
View Publication
Scopus (40)
Crossref (36)
Scopus Clarivate Crossref
Publication Date
Mon Jun 27 2022
Journal Name
Sustainability
Thermal Properties of Hydrated Lime-Modified Asphalt Concrete and Modelling Evaluation for Their Effect on the Constructed Pavements in Service
...Show More Authors

Flexible pavements are subjected to three main distress types: fatigue crack, thermal crack, and permanent deformation. Under severe climate conditions, thermal cracking particularly contributes largely to a considerable scale of premature deterioration of pavement infrastructure worldwide. This challenge is especially relevant for Europe, as weather conditions vary significantly throughout the year. Hydrated lime (HL) has been recognized as an effective additive to improve the mechanical properties of asphalt concrete for pavement applications. Previous research has found that a replacement of conventional limestone dust filler using hydrated lime at 2.5% of the total weight of aggregates generated an optimum improvement in the mec

... Show More
View Publication
Scopus (8)
Crossref (7)
Scopus Clarivate Crossref
Publication Date
Wed Jun 29 2022
Journal Name
College Of Islamic Sciences
Obscene speech in the Qur'anic perspective An objective study based on the verses and interpretation of the Noble Qur’an in diagnosis and treatment
...Show More Authors

t:

The most famous thing a person does is talk. He loves and hates, and continues with it confirming relationships, and with it, too, comes out of disbelief into faith. Marry a word and separate with a word. He reaches the top of the heavens with a kind word, with which he will gain the pleasure of God, and the Lord of a word that the servant speaks to which God writes with our pleasure or throws him on his face in the fire. Emotions are inflamed, the United Nations is intensified with a word, and relations between states and war continue with a word.

What comes out of a person’s mouth is a translator that expresses the repository of his conscience and reveals the place of his bed, for it is evidence of

... Show More
View Publication Preview PDF
Publication Date
Sat Apr 30 2016
Journal Name
Environmental Science And Pollution Research
Risk-based prioritization of pharmaceuticals in the natural environment in Iraq
...Show More Authors

View Publication
Scopus (54)
Crossref (47)
Scopus Clarivate Crossref
Publication Date
Mon Jan 01 2018
Journal Name
Surface And Coatings Technology
Effect of new zirconia surface coatings on the surface properties and bonding strength of veneering zirconia substrate
...Show More Authors

View Publication
Scopus (11)
Crossref (11)
Scopus Clarivate Crossref