Preferred Language
Articles
/
uhcUP48BVTCNdQwCW2US
Survey on distributed denial of service attack detection using deep learning: A review
...Show More Authors

Distributed Denial of Service (DDoS) attacks on Web-based services have grown in both number and sophistication with the rise of advanced wireless technology and modern computing paradigms. Detecting these attacks in the sea of communication packets is very important. There were a lot of DDoS attacks that were directed at the network and transport layers at first. During the past few years, attackers have changed their strategies to try to get into the application layer. The application layer attacks could be more harmful and stealthier because the attack traffic and the normal traffic flows cannot be told apart. Distributed attacks are hard to fight because they can affect real computing resources as well as network bandwidth. DDoS attacks can also be made with smart devices that connect to the Internet, which can be infected and used as botnets. They use Deep Learning (D.L.) techniques like Convolutional Neural Network (C.N.N.) and variants of Recurrent Neural Networks (R.N.N.), such as Long Short-Term Memory (L.S.T.M.), Bidirectional L.S.T.M., Stacked L.S.T.M., and the Gat G.R.U.. These techniques have been used to detect (DDoS) attacks. The Portmap.csv file from the most recent DDoS dataset, CICDDoS2019, has been used to test D.L. approaches. Before giving the data to the D.L. approaches, the data is cleaned up. The pre-processed dataset is used to train and test the D.L. approaches. In the paper, we show how the D.L. approach works with multiple models and how they compare to each other.

View Publication
Publication Date
Wed Jun 15 2022
Journal Name
Journal Of Baghdad College Of Dentistry
Molecular Detection of Porphyromonas gingivalis in COVID-19 Patients
...Show More Authors

Background:SARS-CoV-2 infection has caused a global pandemic that continues to negatively impact human health. A large group of microbial domains including bacteria co-evolved and interacted in complex molecular pathogenesis along with SARS-CoV-2. Evidence suggests that periodontal disease bacteria are involved in COVID-19, and are associated with chronic inflammatory systemic diseases. This study was performed to investigate the association between bacterial loads of Porphyromonas gingivalis and pathogenesis of SARS-CoV-2 infection. Fifty patients with confirmed COVID-19 by reverse transcriptase-polymerase chain reaction, their age ranges between 20-76 years, and 35 healthy volunteers (matched accordingly with age and sex to th

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (5)
Scopus Crossref
Publication Date
Sun Mar 26 2017
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Detection of Serum Ferritin in Women with Breast Cancer
...Show More Authors

 

Breast cancer is one of the most common cancers in females. In Iraq there are noticeable elevation in incidence rates and prevalence of advanced stages of breast cancer. Ferritin is intracellular iron storage protein abundant in circulation and its main application in differential diagnosis of anemia.

The level of serum ferritin was found raised in various cancers including breast cancer. The aim of this study was to assess whether the serum ferritin concentration would be altered in Iraqi women with breast cancer and it could be related to progression of disease.

Sixty eight females participated in this study. The mean age of these females was 53.25± 9.52 .The level of serum ferritin was measured in 24

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jun 30 2024
Journal Name
Modern Sport
The effect of an educational curriculum using virtual reality glasses in improving some kinetic abilities and learning freestyle swimming for first-year primary school students
...Show More Authors

هدفت الدراسة الى الاهتمام واستغلال ماهو جديد من تقنيات واجهزة حديثة في تعليم السباحة الحرة عن طريق توجيه الاطفال على تطوير مداركهم واستيعابهم بالتطور التكنولوجي الذي يتناوله العالم ،قامت الباحثتان باعداد منهج تعليمي باستخدام نظارة الواقع الافتراضي وذالك بتوفير بيئة مشابهة للبيئة الحقيقية تحاكي مدارك عقول الاطفال في عالم افتراضي لتتكون صورة كاملة عن مهارات السباحة الحرة ،ومن هنا اتت المشكلة نتيجة تعل

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Oct 01 2022
Journal Name
Colloids And Surfaces A: Physicochemical And Engineering Aspects
Application of natural deep eutectic solvents in bulk liquid membrane system for removal of free glycerol from crude fatty acid methyl ester
...Show More Authors

Fatty Acid Methyl Ester (FAME) produced from biomass offers several advantages such as renewability and sustainability. The typical production process of FAME is accompanied by various impurities such as alcohol, soap, glycerol, and the spent catalyst. Therefore, the most challenging part of the FAME production is the purification process. In this work, a novel application of bulk liquid membrane (BLM) developed from conventional solvent extraction methods was investigated for the removal of glycerol from FAME. The extraction and stripping processes are combined into a single system, allowing for simultaneous solvent recovery whereby low-cost quaternary ammonium salt-glycerol-based deep eutectic solvent (DES) is used as the membrane phase.

... Show More
Scopus (11)
Crossref (10)
Scopus Clarivate Crossref
Publication Date
Sun Jun 01 2014
Journal Name
Baghdad Science Journal
Simulation Study on Optically Designed Refractive Beam Expander for Nd: YAG Laser Harmonics for 7 Km Detection Range
...Show More Authors

The simulation study has been conducted for the harmonics of Nd: YAG laser, namely the second harmonic generation SHG, the third harmonic generation THG, and the fourth harmonic generation FHG. Determination of beam expander's expansion ratio for specific wavelength and given detection range is the key in beam expander design for determining minimum laser spot size at the target. Knowing optimum expansion ratio decreases receiving unit dimensions and increases its performance efficiency. Simulation of the above mentioned parameters is conducted for the two types of refractive beam expander, Keplerian and Galilean. Ideal refractive indices for the lenses are chosen adequately for Nd: YAG laser harmonics wavelengths, so that increasing transm

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Apr 16 2021
Journal Name
Turkish Journal Of Computer And Mathematics Education
Effective reading skills and their relationship to deep understanding of chemistry among middle school students in Iraq
...Show More Authors

Preview PDF
Publication Date
Sun Jan 01 2023
Journal Name
Journal Of The Mechanical Behavior Of Materials
Transient response and performance of prestressed concrete deep T-beams with large web openings under impact loading
...Show More Authors
Abstract<p>This study reports testing results of the transient response of T-shape concrete deep beams with large openings due to impact loading. Seven concrete deep beams with openings including two ordinary reinforced, four partially prestressed, and one solid ordinary reinforced as a reference beam were fabricated and tested. The effects of prestressing strand position and the intensity of the impact force were investigated. Two values for the opening’s depth relative to the beam cross-section dimensions were inspected under the effect of an impacting mass repeatedly dropped from different heights. The study revealed that the beam’s transient deflection was increased by about 50% with gre</p> ... Show More
View Publication
Scopus (6)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Lecture Notes In Networks And Systems
Proceedings of Ninth International Congress on Information and Communication Technology
...Show More Authors

The investigation of signature validation is crucial to the field of personal authenticity. The biometrics-based system has been developed to support some information security features.Aperson’s signature, an essential biometric trait of a human being, can be used to verify their identification. In this study, a mechanism for automatically verifying signatures has been suggested. The offline properties of handwritten signatures are highlighted in this study which aims to verify the authenticity of handwritten signatures whether they are real or forged using computer-based machine learning techniques. The main goal of developing such systems is to verify people through the validity of their signatures. In this research, images of a group o

... Show More
View Publication
Crossref
Publication Date
Thu Jun 30 2016
Journal Name
Al-kindy College Medical Journal
Evaluating the Students Perception of Academic Learning Environments in AL-Kindy Collage of Medicine
...Show More Authors

Background: Educational environment is one of the most important determinants of an effective curriculum. Students' perceptions of their educational environment have a significant impact on their behavior and academic progress. Objective: 1. To identify students’ perception to the educational environment.2. To identify any gender or class level differences in the students’ perception.Type of the study: This is a descriptive cross-sectional studyMethodology: The study was carried out on convenient sample of 150 students of 2nd and 5th grade. This study was done in Al Kindy Medical College, Baghdad, Iraq and conducted during the period from the 1st of October 2013 till the end of March 2014, by using DREEM questionnaire a validated uni

... Show More
View Publication Preview PDF
Publication Date
Sun Jul 09 2023
Journal Name
Journal Of Engineering
Deep Desulfurization of Diesel Fuel by Guard Bed Adsorption of Activated Carbon and Locally Prepared Cu-Y Zeolite
...Show More Authors

Desulfurization of a simulated diesel fuel by different adsorbents was studied in a fixed-bed adsorption process operated at ambient temperature and pressure.  Three different adsorption beds were used, commercial activated carbon, Cu-Y zeolite, and layered bed of 15wt% activated carbon followed by Cu-Y zeolite.Initially Y-zeolite was prepared from Iraqi rice husk and then impregnated with copper. In general, the adsorbents tested for total sulfur adsorption capacity at break through followed the order Ac/Cu-Y zeolite>Cu-Y zeolite>Ac. The best adsorbent, Ac/Cu-Y zeolite is capable of producing more than 30 cm3 of simulated diesel fuel per gram of adsorbent with a weighted average content of 5 ppm-S, while Cu-Y zeolite producing of

... Show More
View Publication Preview PDF
Crossref (7)
Crossref