Preferred Language
Articles
/
uhcUP48BVTCNdQwCW2US
Survey on distributed denial of service attack detection using deep learning: A review
...Show More Authors

Distributed Denial of Service (DDoS) attacks on Web-based services have grown in both number and sophistication with the rise of advanced wireless technology and modern computing paradigms. Detecting these attacks in the sea of communication packets is very important. There were a lot of DDoS attacks that were directed at the network and transport layers at first. During the past few years, attackers have changed their strategies to try to get into the application layer. The application layer attacks could be more harmful and stealthier because the attack traffic and the normal traffic flows cannot be told apart. Distributed attacks are hard to fight because they can affect real computing resources as well as network bandwidth. DDoS attacks can also be made with smart devices that connect to the Internet, which can be infected and used as botnets. They use Deep Learning (D.L.) techniques like Convolutional Neural Network (C.N.N.) and variants of Recurrent Neural Networks (R.N.N.), such as Long Short-Term Memory (L.S.T.M.), Bidirectional L.S.T.M., Stacked L.S.T.M., and the Gat G.R.U.. These techniques have been used to detect (DDoS) attacks. The Portmap.csv file from the most recent DDoS dataset, CICDDoS2019, has been used to test D.L. approaches. Before giving the data to the D.L. approaches, the data is cleaned up. The pre-processed dataset is used to train and test the D.L. approaches. In the paper, we show how the D.L. approach works with multiple models and how they compare to each other.

View Publication
Publication Date
Sun Jan 01 2017
Journal Name
البحوث التربويةوالنفسية
Preparing a teacher’s guide for computer books for the intermediate stage according to learning styles
...Show More Authors

Preview PDF
Publication Date
Mon Mar 31 2025
Journal Name
The Iraqi Geological Journal
Evaluation of Machine Learning Techniques for Missing Well Log Data in Buzurgan Oil Field: A Case Study
...Show More Authors

The investigation of machine learning techniques for addressing missing well-log data has garnered considerable interest recently, especially as the oil and gas sector pursues novel approaches to improve data interpretation and reservoir characterization. Conversely, for wells that have been in operation for several years, conventional measurement techniques frequently encounter challenges related to availability, including the lack of well-log data, cost considerations, and precision issues. This study's objective is to enhance reservoir characterization by automating well-log creation using machine-learning techniques. Among the methods are multi-resolution graph-based clustering and the similarity threshold method. By using cutti

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Wed Apr 01 2020
Journal Name
Iop Conference Series: Earth And Environmental Science
Study for the Informal Settlement Supposed to Be Distributed by the Iraq Government for Poor People in Baghdad City - Republic of Iraq
...Show More Authors

This paper set forth the spatial suitability of the informal settlement supposed to be distributed by the Iraqis government to poor people. The Iraqi government identified 9 locations of informal settlement in Baghdad city and acceptance it as a reality as a help for them to getting home. In this paper I discovered the suitability of those locations which one will be suitable more than others for living. The analysis process was applied using the GIS environment – spatial analysis. According to the results, It has been identified as the most important measures to identify which one of these areas suitable for development for housing by using some criteria (Distance from the city center, Proximity from transport routes, Proximity of high v

... Show More
View Publication
Scopus (5)
Scopus Crossref
Publication Date
Thu Apr 01 2021
Journal Name
Computer Methods And Programs In Biomedicine
A hybrid approach based on multiple Eigenvalues selection (MES) for the automated grading of a brain tumor using MRI
...Show More Authors

View Publication
Scopus (40)
Crossref (36)
Scopus Clarivate Crossref
Publication Date
Mon Oct 13 2025
Journal Name
Mesopotamian Journal Of Cybersecurity
Improvement of the Face Recognition Systems Security Against Morph Attacks using the Developed Siamese Neural Network
...Show More Authors

Face Recognition Systems (FRS) are increasingly targeted by morphing attacks, where facial features of multiple individuals are blended into a synthetic image to deceive biometric verification. This paper proposes an enhanced Siamese Neural Network (SNN)-based system for robust morph detection. The methodology involves four stages. First, a dataset of real and morphed images is generated using StyleGAN, producing high-quality facial images. Second, facial regions are extracted using Faster Region-based Convolutional Neural Networks (R-CNN) to isolate relevant features and eliminate background noise. Third, a Local Binary Pattern-Convolutional Neural Network (LBP-CNN) is used to build a baseline FRS and assess its susceptibility to d

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Fri Feb 01 2019
Journal Name
Journal Of Economics And Administrative Sciences
The impact of organizational learning capabilities on the promotion of knowledge capital Applied research at Wasit University
...Show More Authors

Abstract

      The current research aims at identifying any of the dimensions of organizational learning abilities that are more influential in the knowledge capital of the university and the extent to which they can be applied effectively at Wasit University. The current research dealt with organizational learning abilities as an explanatory variable in four dimensions (Experimentation and openness, sharing and transfer of knowledge, dialogue, interaction with the external environment ), and knowledge capital as a transient variable, with four dimensions (human capital, structural capital, client capital, operational capital). The problem of research is the following questio

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Apr 01 2014
Journal Name
Journal Of Economics And Administrative Sciences
Developing a Learning Organization According to Analysis of the Relationship between Knowledge Gap and Strategic Performance Gaps: Field Study in a Sample of Private Banks in Baghdad.
...Show More Authors

The purpose of this research shed light on the analysis of the relationship between the knowledge gap and the strategic performance  gap and diagnose the level of impact this relationship in building a learning organization, and sought search to achieve a number of goals, cognitive and Applied been tested nature of the relationship and effect between variables in a sample size (62) of the managers of banks civil in Baghdad (Baghdad, Gulf, Assyria, Union, Elaf) and focused research problem in question is bold is whether the analysis of the relationship between the knowledge gap and the performance gap strategic leads to recognize organizations need to shift to organizations educated, either in the side of the field was the pr

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Oct 01 2020
Journal Name
Defence Technology
A novel facial emotion recognition scheme based on graph mining
...Show More Authors

Recent years have seen an explosion in graph data from a variety of scientific, social and technological fields. From these fields, emotion recognition is an interesting research area because it finds many applications in real life such as in effective social robotics to increase the interactivity of the robot with human, driver safety during driving, pain monitoring during surgery etc. A novel facial emotion recognition based on graph mining has been proposed in this paper to make a paradigm shift in the way of representing the face region, where the face region is represented as a graph of nodes and edges and the gSpan frequent sub-graphs mining algorithm is used to find the frequent sub-structures in the graph database of each emotion. T

... Show More
View Publication Preview PDF
Scopus (47)
Crossref (40)
Scopus Clarivate Crossref
Publication Date
Mon Dec 01 2025
Journal Name
Al-khwarizmi Engineering Journal
Object Dimension and Location Determination in Gantry Robots and Conveyor Systems: A Review
...Show More Authors

A​‍​‌‍​‍‌ gantry robot is one of the most common types of industrial robots with linear movement. This type of robot is also known as a Cartesian or linear robot. It is an automated industrial system that moves along linear paths, enabling it to create a 3D envelope of the space in which it operates. A robot of this type has a standardised configuration process because it can have several sets of axes, such as X, Y and Z. The gantry robot picks up products from several places, so it can search through various locations. Afterwards, it carefully deposits the products on a conveyor belt for the next stage of the procedure or final ​‍​‌‍​‍‌shipment. This integration enables continuous and automated material flow

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed May 01 2013
Journal Name
Journal Of Computer Science
PROTOCOLS FOR SECURE ROUTING AND TRANSMISSION IN MOBILE AD HOC NETWORK: A REVIEW
...Show More Authors

Mobile ad hoc network security is a new area for research that it has been faced many difficulties to implement. These difficulties are due to the absence of central authentication server, the dynamically movement of the nodes (mobility), limited capacity of the wireless medium and the various types of vulnerability attacks. All these factor combine to make mobile ad hoc a great challenge to the researcher. Mobile ad hoc has been used in different applications networks range from military operations and emergency disaster relief to community networking and interaction among meeting attendees or students during a lecture. In these and other ad hoc networking applications, security in the routing protocol is necessary to protect against malic

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (5)
Scopus Crossref