Distributed Denial of Service (DDoS) attacks on Web-based services have grown in both number and sophistication with the rise of advanced wireless technology and modern computing paradigms. Detecting these attacks in the sea of communication packets is very important. There were a lot of DDoS attacks that were directed at the network and transport layers at first. During the past few years, attackers have changed their strategies to try to get into the application layer. The application layer attacks could be more harmful and stealthier because the attack traffic and the normal traffic flows cannot be told apart. Distributed attacks are hard to fight because they can affect real computing resources as well as network bandwidth. DDoS attacks can also be made with smart devices that connect to the Internet, which can be infected and used as botnets. They use Deep Learning (D.L.) techniques like Convolutional Neural Network (C.N.N.) and variants of Recurrent Neural Networks (R.N.N.), such as Long Short-Term Memory (L.S.T.M.), Bidirectional L.S.T.M., Stacked L.S.T.M., and the Gat G.R.U.. These techniques have been used to detect (DDoS) attacks. The Portmap.csv file from the most recent DDoS dataset, CICDDoS2019, has been used to test D.L. approaches. Before giving the data to the D.L. approaches, the data is cleaned up. The pre-processed dataset is used to train and test the D.L. approaches. In the paper, we show how the D.L. approach works with multiple models and how they compare to each other.
The rise of Industry 4.0 and smart manufacturing has highlighted the importance of utilizing intelligent manufacturing techniques, tools, and methods, including predictive maintenance. This feature allows for the early identification of potential issues with machinery, preventing them from reaching critical stages. This paper proposes an intelligent predictive maintenance system for industrial equipment monitoring. The system integrates Industrial IoT, MQTT messaging and machine learning algorithms. Vibration, current and temperature sensors collect real-time data from electrical motors which is analyzed using five ML models to detect anomalies and predict failures, enabling proactive maintenance. The MQTT protocol is used for efficient com
... Show MoreThe research aims to prepare a preliminary feasibility study that shows the importance of preliminary feasibility study in investment decision making, carrying out of the local demand of service provided in accordance with international standards and statement of investment opportunities available to the private sector in several investment methods. In order to reach the objectives of the study was adopted as a method of partial analysis at the level of economic unity through the study demand, supply, costs, economic and social profitability.
The health sector in Iraq is one of the service sectors facing today a continuous deficiency
... Show MoreComputer systems and networks are being used in almost every aspect of our daily life; as a result the security threats to computers and networks have also increased significantly. Traditionally, password-based user authentication is widely used to authenticate legitimate user in the current system0T but0T this method has many loop holes such as password sharing, shoulder surfing, brute force attack, dictionary attack, guessing, phishing and many more. The aim of this paper is to enhance the password authentication method by presenting a keystroke dynamics with back propagation neural network as a transparent layer of user authentication. Keystroke Dynamics is one of the famous and inexpensive behavioral biometric technologies, which identi
... Show MoreFractal image compression gives some desirable properties like fast decoding image, and very good rate-distortion curves, but suffers from a high encoding time. In fractal image compression a partitioning of the image into ranges is required. In this work, we introduced good partitioning process by means of merge approach, since some ranges are connected to the others. This paper presents a method to reduce the encoding time of this technique by reducing the number of range blocks based on the computing the statistical measures between them . Experimental results on standard images show that the proposed method yields minimize (decrease) the encoding time and remain the quality results passable visually.
In this paper, we introduce a DCT based steganographic method for gray scale images. The embedding approach is designed to reach efficient tradeoff among the three conflicting goals; maximizing the amount of hidden message, minimizing distortion between the cover image and stego-image,and maximizing the robustness of embedding. The main idea of the method is to create a safe embedding area in the middle and high frequency region of the DCT domain using a magnitude modulation technique. The magnitude modulation is applied using uniform quantization with magnitude Adder/Subtractor modules. The conducted test results indicated that the proposed method satisfy high capacity, high preservation of perceptual and statistical properties of the steg
... Show MoreA Pap test can identify the pre-cancerous and cancerous problem in the vagina and uterine cervix. Cervical tumour is the easiest gynecologic disease to be diagnosed, treated and prevented using regular screening tests and follow-up. This review aimed to explore the opinion of specialists about cytological changes and the precancerous lesions with Pap smear test and visual inspection of the cervices, also to determine the relationship of this malignancy with demographic characteristics of patients. Results showed that few cervical cancer and pre-cancer were with women in postmenopausal period, but more were with women in the premenopausal period. Visual inspection of the cervix can show erosion lesions by gross inspection. Upon cytology exam
... Show MoreType 2 diabetes is a global public health problem especially in middle east countries and Iraq has not spared from this pandemic. The prevalence in Iraq. and rank in Middle East. Beside increasing in prevalence- also poor glucose control. Nutrition plays a critical role. This paper narratively review variables that affect reduce the incidence of T2DM in Iraq and affect nutritional status among Iraqi withT2DM. The factors contribute to T2DM were high rates of obesity and overweight, as well as levels of body fat indicate a high prevalence of poor glycemic control. Likewise, levels of physical activity are low among older Iraqis.