Preferred Language
Articles
/
uhcUP48BVTCNdQwCW2US
Survey on distributed denial of service attack detection using deep learning: A review
...Show More Authors

Distributed Denial of Service (DDoS) attacks on Web-based services have grown in both number and sophistication with the rise of advanced wireless technology and modern computing paradigms. Detecting these attacks in the sea of communication packets is very important. There were a lot of DDoS attacks that were directed at the network and transport layers at first. During the past few years, attackers have changed their strategies to try to get into the application layer. The application layer attacks could be more harmful and stealthier because the attack traffic and the normal traffic flows cannot be told apart. Distributed attacks are hard to fight because they can affect real computing resources as well as network bandwidth. DDoS attacks can also be made with smart devices that connect to the Internet, which can be infected and used as botnets. They use Deep Learning (D.L.) techniques like Convolutional Neural Network (C.N.N.) and variants of Recurrent Neural Networks (R.N.N.), such as Long Short-Term Memory (L.S.T.M.), Bidirectional L.S.T.M., Stacked L.S.T.M., and the Gat G.R.U.. These techniques have been used to detect (DDoS) attacks. The Portmap.csv file from the most recent DDoS dataset, CICDDoS2019, has been used to test D.L. approaches. Before giving the data to the D.L. approaches, the data is cleaned up. The pre-processed dataset is used to train and test the D.L. approaches. In the paper, we show how the D.L. approach works with multiple models and how they compare to each other.

View Publication
Publication Date
Thu Aug 31 2023
Journal Name
Journal Européen Des Systèmes Automatisés​
An IoT and Machine Learning-Based Predictive Maintenance System for Electrical Motors
...Show More Authors

The rise of Industry 4.0 and smart manufacturing has highlighted the importance of utilizing intelligent manufacturing techniques, tools, and methods, including predictive maintenance. This feature allows for the early identification of potential issues with machinery, preventing them from reaching critical stages. This paper proposes an intelligent predictive maintenance system for industrial equipment monitoring. The system integrates Industrial IoT, MQTT messaging and machine learning algorithms. Vibration, current and temperature sensors collect real-time data from electrical motors which is analyzed using five ML models to detect anomalies and predict failures, enabling proactive maintenance. The MQTT protocol is used for efficient com

... Show More
View Publication
Scopus (39)
Crossref (29)
Scopus Crossref
Publication Date
Tue Dec 31 2019
Journal Name
Journal Of Economics And Administrative Sciences
The investment Decision Making According to the Preliminary Feasibility Study for the 100-Bed Teaching Hospital - Service Sector in Diwaniya Governorate (Case Study)
...Show More Authors

     The research aims to prepare a preliminary feasibility study that shows the importance of preliminary feasibility study in investment decision making, carrying out of the local demand of service provided in accordance with international standards and statement of investment opportunities available to the private sector in several investment methods. In order to reach the objectives of the study was adopted as a method of partial analysis at the level of economic unity through the study demand, supply, costs, economic and social profitability.

      The health sector in Iraq is one of the service sectors facing today a continuous deficiency

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Sep 01 2023
Journal Name
Migration Letters
Organizational Machiavellianism and Its Impact on Employees’ Passion: A Field Study on a Sample of Electronic Payment Companies in Iraq
...Show More Authors

View Publication
Publication Date
Thu Aug 02 2012
Journal Name
International Journal Of Advanced Research In Computer Science
User Authentication based on Keystroke Dynamics Using Backpropagation Network
...Show More Authors

Computer systems and networks are being used in almost every aspect of our daily life; as a result the security threats to computers and networks have also increased significantly. Traditionally, password-based user authentication is widely used to authenticate legitimate user in the current system0T but0T this method has many loop holes such as password sharing, shoulder surfing, brute force attack, dictionary attack, guessing, phishing and many more. The aim of this paper is to enhance the password authentication method by presenting a keystroke dynamics with back propagation neural network as a transparent layer of user authentication. Keystroke Dynamics is one of the famous and inexpensive behavioral biometric technologies, which identi

... Show More
Publication Date
Wed Mar 10 2021
Journal Name
Baghdad Science Journal
Merge Operation Effect On Image Compression Using Fractal Technique
...Show More Authors

Fractal image compression gives some desirable properties like fast decoding image, and very good rate-distortion curves, but suffers from a high encoding time. In fractal image compression a partitioning of the image into ranges is required. In this work, we introduced good partitioning process by means of merge approach, since some ranges are connected to the others. This paper presents a method to reduce the encoding time of this technique by reducing the number of range blocks based on the computing the statistical measures between them . Experimental results on standard images show that the proposed method yields minimize (decrease) the encoding time and remain the quality results passable visually.

View Publication Preview PDF
Publication Date
Fri Apr 30 2010
Journal Name
Journal Of Applied Computer Science & Mathematics
Image Hiding Using Magnitude Modulation on the DCT Coefficients
...Show More Authors

In this paper, we introduce a DCT based steganographic method for gray scale images. The embedding approach is designed to reach efficient tradeoff among the three conflicting goals; maximizing the amount of hidden message, minimizing distortion between the cover image and stego-image,and maximizing the robustness of embedding. The main idea of the method is to create a safe embedding area in the middle and high frequency region of the DCT domain using a magnitude modulation technique. The magnitude modulation is applied using uniform quantization with magnitude Adder/Subtractor modules. The conducted test results indicated that the proposed method satisfy high capacity, high preservation of perceptual and statistical properties of the steg

... Show More
View Publication Preview PDF
Publication Date
Wed Jan 01 2025
Journal Name
American Journal Of Biodiversity
Importance of Conventional Pap Smear Application for Iraqi women health: scientific review
...Show More Authors

A Pap test can identify the pre-cancerous and cancerous problem in the vagina and uterine cervix. Cervical tumour is the easiest gynecologic disease to be diagnosed, treated and prevented using regular screening tests and follow-up. This review aimed to explore the opinion of specialists about cytological changes and the precancerous lesions with Pap smear test and visual inspection of the cervices, also to determine the relationship of this malignancy with demographic characteristics of patients. Results showed that few cervical cancer and pre-cancer were with women in postmenopausal period, but more were with women in the premenopausal period. Visual inspection of the cervix can show erosion lesions by gross inspection. Upon cytology exam

... Show More
View Publication
Publication Date
Sun Jan 01 2023
Journal Name
3rd International Conference On Smart Cities And Sustainable Planning
Theoretical structure of apparent and latent in the urban townscape: Subject review
...Show More Authors

View Publication Preview PDF
Scopus (2)
Scopus Crossref
Publication Date
Sat Jan 01 2022
Journal Name
Journal Of Pharmaceutical Negative Results
Morphological and Anatomical Review of Some Veronica Species from the Plantaginaceae Family
...Show More Authors

Scopus (1)
Scopus
Publication Date
Tue Apr 26 2022
Journal Name
International Journal Of Health Sciences
narrative review of nutritional status among iraqi adults with type 2 diabetes
...Show More Authors

Type 2 diabetes is a global public health problem especially in middle east countries and Iraq has not spared from this pandemic. The prevalence in Iraq. and rank in Middle East. Beside increasing in prevalence- also poor glucose control. Nutrition plays a critical role. This paper narratively review variables that affect  reduce the incidence of T2DM in Iraq and affect nutritional status among Iraqi withT2DM. The factors contribute  to T2DM were high rates of obesity and overweight, as well as levels of body fat indicate a high prevalence of poor glycemic control. Likewise, levels of physical activity are low among older Iraqis.

View Publication
Crossref