Preferred Language
Articles
/
uhcUP48BVTCNdQwCW2US
Survey on distributed denial of service attack detection using deep learning: A review
...Show More Authors

Distributed Denial of Service (DDoS) attacks on Web-based services have grown in both number and sophistication with the rise of advanced wireless technology and modern computing paradigms. Detecting these attacks in the sea of communication packets is very important. There were a lot of DDoS attacks that were directed at the network and transport layers at first. During the past few years, attackers have changed their strategies to try to get into the application layer. The application layer attacks could be more harmful and stealthier because the attack traffic and the normal traffic flows cannot be told apart. Distributed attacks are hard to fight because they can affect real computing resources as well as network bandwidth. DDoS attacks can also be made with smart devices that connect to the Internet, which can be infected and used as botnets. They use Deep Learning (D.L.) techniques like Convolutional Neural Network (C.N.N.) and variants of Recurrent Neural Networks (R.N.N.), such as Long Short-Term Memory (L.S.T.M.), Bidirectional L.S.T.M., Stacked L.S.T.M., and the Gat G.R.U.. These techniques have been used to detect (DDoS) attacks. The Portmap.csv file from the most recent DDoS dataset, CICDDoS2019, has been used to test D.L. approaches. Before giving the data to the D.L. approaches, the data is cleaned up. The pre-processed dataset is used to train and test the D.L. approaches. In the paper, we show how the D.L. approach works with multiple models and how they compare to each other.

View Publication
Publication Date
Fri Sep 02 2022
Journal Name
Military Medical Science Letters
SOLID LIPID NANOPARTICLES AS A PROMISING APPROACH FOR DELIVERY OF ANTICANCER AGENTS: REVIEW ARTICLE
...Show More Authors

View Publication
Scopus (9)
Crossref (7)
Scopus Crossref
Publication Date
Sun Oct 01 2023
Journal Name
Journal Of Surgical Case Reports
Agenesis of flexor pollicis longus without thenar hypoplasia: a case report and literature review
...Show More Authors
Abstract<p>We present a case of congenital of flexor pollicis longus agenesis without thenar hypoplasia in a 12-year-old girl with no history of trauma. Two-staged corrective surgery was planned. In the first stage, the flexor pulley was reconstructed using silicone followed by the second stage 3 months later when flexor pollicis longus reconstruction was performed using tendon transfer of the flexor digitorum superficialis. The patient completed post-operative physiotherapy and the result of the surgical treatment in both functional and cosmetic aspects was, in the authors’ opinion, excellent.</p>
View Publication
Scopus (1)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Wed Jun 29 2022
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Studying and Analyzing Operating Conditions of Hollow Fiber Membrane Preparation Process: A Review Paper
...Show More Authors

Polymeric hollow fiber membrane is produced by a physical process called wet or dry/wet phase inversion; a technique includes many steps and depends on different factors (starting from selecting materials, end with post-treatment of hollow fiber membrane locally manufactured). This review highlights the most significant factors that affect and control the characterization and structure of ultrafiltration hollow fiber membranes used in different applications.    

   Three different types of polymers (polysulfone PSF, polyethersulfone PES or polyvinyl chloride PVC) were considered to study morphology change and structure of hollow fiber membranes in this review. These hollow fiber membranes were manufactured with different pro

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jul 24 2022
Journal Name
Healthcare
Incidence of Gingival Black Triangles following Treatment with Fixed Orthodontic Appliance: A Systematic Review
...Show More Authors

This systematic review aimed to investigate the relation between orthodontic treatment (OT) and the incidence of the gingival black triangle (GBT) after completing treatment with a fixed orthodontic appliance, as well as the associated risk factors and the level of alveolar bone. Electronic and hand searches were conducted in three electronic databases for relevant articles published up to March 2022. Retrieved articles went through a two-step screening procedure, and the risk of bias (RoB) was assessed by the Joanna Briggs Institute checklists. The incidence of GBT after OT was set as the primary outcome, while the secondary outcomes were the risk factors associated with GBT and alveolar bone loss following OT. Out of 421 papers, 5

... Show More
View Publication
Scopus (15)
Crossref (12)
Scopus Clarivate Crossref
Publication Date
Fri Sep 02 2022
Journal Name
Military Medical Science Letters
SOLID LIPID NANOPARTICLES AS A PROMISING APPROACH FOR DELIVERY OF ANTICANCER AGENTS: REVIEW ARTICLE
...Show More Authors

Cancer disease has a complicated pathophysiology and is one of the major causes of death and morbidity. Classical cancer therapies include chemotherapy, radiation therapy, and immunotherapy. A typical treatment is chemotherapy, which delivers cytotoxic medications to patients to suppress the uncontrolled growth of cancerous cells. Conventional oral medication has a number of drawbacks, including a lack of selectivity, cytotoxicity, and multi-drug resistance, all of which offer significant obstacles to effective cancer treatment. Multidrug resistance (MDR) remains a major challenge for effective cancer chemotherapeutic interventions. The advent of nanotechnology approach has developed the field of tumor diagnosis and treatment. Cancer nanote

... Show More
View Publication
Scopus (9)
Crossref (7)
Scopus Crossref
Publication Date
Thu Aug 21 2025
Journal Name
Computers
A Comprehensive Review of Sensor Technologies in IoT: Technical Aspects, Challenges, and Future Directions
...Show More Authors

The rapid advancements in wireless technology and digital electronics have led to the widespread adoption of compact, intelligent devices in various aspects of daily life. These advanced systems possess the capability to sense environmental changes, process data, and communicate seamlessly within interconnected networks. Typically, such devices integrate low-power radio transmitters and multiple smart sensors, hence enabling efficient functionality across wide ranges of applications. Alongside these technological developments, the concept of the IoT has emerged as a transformative paradigm, facilitating the interconnection of uniquely identifiable devices through internet-based networks. This paper aims to provide a comprehensive ex

... Show More
View Publication
Crossref (11)
Crossref
Publication Date
Sun Dec 28 2025
Journal Name
مجلة جامعة صنعاء للعلوم التطبيقية والتكنولوجيا
From Algorithms to Applications: A Review of AI-Based Face Recognition and Identity Verification
...Show More Authors

Face recognition and identity verification are now critical components of current security and verification technology. The main objective of this review is to identify the most important deep learning techniques that have contributed to the improvement in the accuracy and reliability of facial recognition systems, as well as highlighting existing problems and potential future research areas. An extensive literature review was conducted with the assistance of leading scientific databases such as IEEE Xplore, ScienceDirect, and SpringerLink and covered studies from the period 2015 to 2024. The studies of interest were related to the application of deep neural networks, i.e., CNN, Siamese, and Transformer-based models, in face recogni

... Show More
View Publication
Crossref
Publication Date
Fri Apr 01 2016
Journal Name
Journal Of Economics And Administrative Sciences
Empowerment administrative Factors and its impact on Performance of the service organization An analytic Research at the Ministry of Interior – General Directorate of Traffic
...Show More Authors

Abstract

The research study about the empowerment as an independent variable, in which details include (training and improvement, incentives, information sharing, trust, and delegation), has also focused on the performance of the service organization as a dependent variable in all dimensions which include (improve work efficiency, building the core competencies, focus on the beneficiary of the service, increasing the feeling of satisfaction of the employees, and the organizational support commitment). The research has been based on the opinions of a chosen sample of 75 service officers of the Ministry of Interior who work at the General Directorate of Traffic. The research problem has been identified by t

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Aug 06 2021
Journal Name
Research Journal Of Pharmacy And Technology
Molecular Detection and Genotyping of Human Herpes Virus 8 in a sample of Iraqi Blood Donors
...Show More Authors

Human herpes virus-8 (HHV-8) infection has increased recently in Arabic countries. HHV-8 in healthy persons does not necessarily cause life-threatening infection, and however, it causes a more severe infection among immunocompromised patients. The distribution of HHV-8 genotypes varies according to ethnicity and depends on the geographic region prior rapid development of global travel. A cross sectional prospective study included a hundred healthy blood donor samples with a mean age of (36.60±10.381), 81% were positive for molecular detection of HHV-8 DNA. PCR results for HHV-8 were strongly related with risk factors such as the number of sexual relations, previous surgeries, blood transfusion, dental operation, and the number of b

... Show More
View Publication
Scopus (2)
Scopus Crossref
Publication Date
Fri Oct 01 2021
Journal Name
Baghdad College Of Economic Sciences University Journal (bcesuj)
The effect of international auditing standards in limiting financial violations in government service
...Show More Authors

The aim of the research is to show the importance of international auditing standards and the effect of this in reducing the incidence of financial irregularities in government service units and how to address them. The research adopted the descriptive, analytical and inductive approaches. In the analytical approach, a questionnaire model was designed and distributed to internal auditors in some of the subordinate government units. For the Ministry of Health, appropriate statistical methods were used that showed the extent of the general understanding of the internal auditor’s relationship with international standards and the impact of this on preserving public money and the role of the internal auditor in detecting financial irregulariti

... Show More