Preferred Language
Articles
/
oRf6Po8BVTCNdQwC6WUP
Evaluation of DDoS attacks Detection in a New Intrusion Dataset Based on Classification Algorithms
...Show More Authors

Intrusion detection system is an imperative role in increasing security and decreasing the harm of the computer security system and information system when using of network. It observes different events in a network or system to decide occurring an intrusion or not and it is used to make strategic decision, security purposes and analyzing directions. This paper describes host based intrusion detection system architecture for DDoS attack, which intelligently detects the intrusion periodically and dynamically by evaluating the intruder group respective to the present node with its neighbors. We analyze a dependable dataset named CICIDS 2017 that contains benign and DDoS attack network flows, which meets certifiable criteria and is openly accessible. It evaluates the performance of a complete arrangement of machine learning algorithms and network traffic features to indicate the best features for detecting the assured attack classes. Our goal is storing the address of destination IP that is utilized to detect an intruder by method of misuse detection.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Jun 30 2024
Journal Name
International Journal Of Intelligent Engineering And Systems
Eco-friendly and Secure Data Center to Detection Compromised Devices Utilizing Swarm Approach
...Show More Authors

Modern civilization increasingly relies on sustainable and eco-friendly data centers as the core hubs of intelligent computing. However, these data centers, while vital, also face heightened vulnerability to hacking due to their role as the convergence points of numerous network connection nodes. Recognizing and addressing this vulnerability, particularly within the confines of green data centers, is a pressing concern. This paper proposes a novel approach to mitigate this threat by leveraging swarm intelligence techniques to detect prospective and hidden compromised devices within the data center environment. The core objective is to ensure sustainable intelligent computing through a colony strategy. The research primarily focusses on the

... Show More
View Publication
Scopus (6)
Crossref (3)
Scopus Crossref
Publication Date
Sun Nov 01 2020
Journal Name
2020 2nd Annual International Conference On Information And Sciences (aicis)
An Enhanced Multi-Objective Evolutionary Algorithm with Decomposition for Signed Community Detection Problem
...Show More Authors

View Publication
Scopus (8)
Crossref (2)
Scopus Crossref
Publication Date
Sun Apr 30 2023
Journal Name
Iraqi Journal Of Science
An Evolutionary Algorithm with Gene Ontology-Aware Crossover Operator for Protein Complex Detection
...Show More Authors

     Evolutionary algorithms (EAs), as global search methods, are proved to be more robust than their counterpart local heuristics for detecting protein complexes in protein-protein interaction (PPI) networks. Typically, the source of robustness of these EAs comes from their components and parameters. These components are solution representation, selection, crossover, and mutation. Unfortunately, almost all EA based complex detection methods suggested in the literature were designed with only canonical or traditional components. Further, topological structure of the protein network is the main information that is used in the design of almost all such components. The main contribution of this paper is to formulate a more robust E

... Show More
Scopus (3)
Scopus Crossref
Publication Date
Mon Aug 22 2022
Journal Name
World Bulletin Of Management And Law
THE IMPACT OF OUTSOURCING OF HUMAN RESOURCE ACTIVITIES ON ORGANIZATIONAL WINNING(FIELD RESEARCH IN A SAMPLE OF PREMIUM CLASS HOTELS -IN IRAQ)
...Show More Authors

The aim of the research is to test the effect of outsourcing human resources activities (independent variable) with its dimensions (outsourcing of staffing, outsourcing of training and development, outsourcing of wages and compensation, outsourcing of human resources information systems) on organizational winning (dependent variable) with its dimensions (the culture of winning, successful organizational change, continuous improvement, and adoption of risk). The research problem was the questions posed by the researcher, the most important of which is the extent to which the research sample realizes the importance of applying outsourcing to human resources activities and its role in organizational vi

... Show More
View Publication Preview PDF
Publication Date
Sun May 24 2026
Journal Name
Imam Ja'afar Al-sadiq University Journal Of Legal Studies
The legal framework for the protection of new plant varieties
...Show More Authors

TRIPS agreement was The first to apply protection by patents. However, this type of protection, which grants exclusive and monopoly rights to patent owners, came at the expense of developing countries which are considered rich in biodiversity and also at the expense of traditional and poor knowledge of modern technologies. The release of new plant varieties has led to the emergence of biopiracy and looting of the rights of developing countries without a license

View Publication
Publication Date
Sun Sep 07 2014
Journal Name
Baghdad Science Journal
New records of Turbellarian Platyhelminthes from Al-Dalmage lake / Iraq
...Show More Authors

A total of 437 individuals of Turbellarin Platyhelminthes were sorted from benthic samples collected monthly for a period of seven months( April to November 2013 ) from AL-Dalmage lake, a part of middle section for main outfall drain south of Baghdad. They were identified as Gyratrix hermaphroditus, Stenostomum leucops ,Stenostomum unicolar and Stenostomum bryophilum ,The relative abundance of worms decreased during hot season which (May to September) ,where they start rising again. The species were studied alive , the identification criteria were illustrated by photos. G. hermaphroditus was the most abundant species among the four species.

View Publication Preview PDF
Crossref
Publication Date
Mon Mar 08 2021
Journal Name
Baghdad Science Journal
Solar ray tracing programs to find new types of solar
...Show More Authors

Anew Solar concentrator have been designed in this paper, this concentrators Were based on the total internal reflection in a prism, the prism angles has been calculated by depending on the solar incident ray angle in baghdad for a year. The optical design consist ofa triangular presume, Where the solar cells on one side of the prism Wh?le the prism head towered the south. The results show that there is an increasing in the solar ray concentrators and the cell area is reduced.

View Publication Preview PDF
Publication Date
Thu Apr 20 2023
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Design of New V Shaped Thermotropic Liquid Crystals containing Heterocyclic
...Show More Authors

    The characterization and design of this study of new liquid crystals with a V shape compounds containing thiazolidine-2,4-dione and 1,3-phenylene as a core unite with mesophase properties were reported. Preparation  and characterization of chloroacetic acid, water, and thiourea to produce thiazolidine-2,4-dione [I] in the presence of strong hydrochloric acid. The 4-hydreoxybenzaldehyde and n-alkyl bromide were reacted with potassium hydroxide to create the n-alkoxy benzaldehyde., then the compound [I] reacted with [II]n in presence of piperidine to produce compounds [III]n. Also, converted resorcinol to a corresponding  compound [IV] by refl

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sun Mar 01 2009
Journal Name
Baghdad Science Journal
Synthesis of Some New 1,2,4-Triazoles Derived from 2-Mercaptobenzimidazole
...Show More Authors

New 1,2,4-triazole derivatives of 2-mercaptobenzimidazole (MB) are reported. Ethyl (benzimidazole-2-yl thio) acetate (1) has been prepared by condensing 2-mercaptobenzimidazole with ethylchloroacetate. The ester (1) on reacting with hydrazine hydrate gave the corresponding acetohydrazide(2)which was reacted separately with phenylisocyanate and phenylisothiocyanate, followed by ring closure in an alkaline medium giving 3-[(benzimidazole-2-yl thio) methyl]-4-phenyl-1,2,4-triazole-5-ol and 3-[(benzimidazole-2-yl thio) methyl]-4-phenyl-1,2,4-triazole-5-thiol respectively (6,7). Reaction of acetohydrazide (2) with CS2 and ethanol/KOH, gave dithiocarbazate salt (8). Cyclization of (8) with hydrazine hydrate gave 3-[(benzimi

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Feb 28 2020
Journal Name
Neuroquantology
Synthesis, Characterization and Pharmacological Studies of Some New Furosemide Derivatives
...Show More Authors

View Publication
Scopus (2)
Crossref (2)
Scopus Crossref