Preferred Language
Articles
/
uhcUP48BVTCNdQwCW2US
Survey on distributed denial of service attack detection using deep learning: A review
...Show More Authors

Distributed Denial of Service (DDoS) attacks on Web-based services have grown in both number and sophistication with the rise of advanced wireless technology and modern computing paradigms. Detecting these attacks in the sea of communication packets is very important. There were a lot of DDoS attacks that were directed at the network and transport layers at first. During the past few years, attackers have changed their strategies to try to get into the application layer. The application layer attacks could be more harmful and stealthier because the attack traffic and the normal traffic flows cannot be told apart. Distributed attacks are hard to fight because they can affect real computing resources as well as network bandwidth. DDoS attacks can also be made with smart devices that connect to the Internet, which can be infected and used as botnets. They use Deep Learning (D.L.) techniques like Convolutional Neural Network (C.N.N.) and variants of Recurrent Neural Networks (R.N.N.), such as Long Short-Term Memory (L.S.T.M.), Bidirectional L.S.T.M., Stacked L.S.T.M., and the Gat G.R.U.. These techniques have been used to detect (DDoS) attacks. The Portmap.csv file from the most recent DDoS dataset, CICDDoS2019, has been used to test D.L. approaches. Before giving the data to the D.L. approaches, the data is cleaned up. The pre-processed dataset is used to train and test the D.L. approaches. In the paper, we show how the D.L. approach works with multiple models and how they compare to each other.

View Publication
Publication Date
Tue Jan 01 2013
Journal Name
Thesis
User Authentication Based on Keystroke Dynamics Using Artificial Neural Networks
...Show More Authors

Computer systems and networks are being used in almost every aspect of our daily life, the security threats to computers and networks have increased significantly. Usually, password-based user authentication is used to authenticate the legitimate user. However, this method has many gaps such as password sharing, brute force attack, dictionary attack and guessing. Keystroke dynamics is one of the famous and inexpensive behavioral biometric technologies, which authenticate a user based on the analysis of his/her typing rhythm. In this way, intrusion becomes more difficult because the password as well as the typing speed must match with the correct keystroke patterns. This thesis considers static keystroke dynamics as a transparent layer of t

... Show More
Publication Date
Sun Mar 02 2014
Journal Name
Baghdad Science Journal
On Solving Hyperbolic Trajectory Using New Predictor-Corrector Quadrature Algorithms
...Show More Authors

In this Paper, we proposed two new predictor corrector methods for solving Kepler's equation in hyperbolic case using quadrature formula which plays an important and significant rule in the evaluation of the integrals. The two procedures are developed that, in two or three iterations, solve the hyperbolic orbit equation in a very efficient manner, and to an accuracy that proves to be always better than 10-15. The solution is examined with and with grid size , using the first guesses hyperbolic eccentric anomaly is and , where is the eccentricity and is the hyperbolic mean anomaly.

View Publication Preview PDF
Crossref
Publication Date
Sat Oct 01 2016
Journal Name
2016 6th International Conference On Information Communication And Management (icicm)
Enhancing case-based reasoning retrieval using classification based on associations
...Show More Authors

View Publication
Scopus (4)
Crossref (2)
Scopus Crossref
Publication Date
Sun Apr 01 2018
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Information Hiding using LSB Technique based on Developed PSO Algorithm
...Show More Authors

<p>Generally, The sending process of secret information via the transmission channel or any carrier medium is not secured. For this reason, the techniques of information hiding are needed. Therefore, steganography must take place before transmission. To embed a secret message at optimal positions of the cover image under spatial domain, using the developed particle swarm optimization algorithm (Dev.-PSO) to do that purpose in this paper based on Least Significant Bits (LSB) using LSB substitution. The main aim of (Dev. -PSO) algorithm is determining an optimal paths to reach a required goals in the specified search space based on disposal of them, using (Dev.-PSO) algorithm produces the paths of a required goals with most effi

... Show More
View Publication
Scopus (18)
Crossref (5)
Scopus Crossref
Publication Date
Fri Jul 01 2016
Journal Name
Journal Of Economics And Administrative Sciences
The strengthening of strategic intelligence through an applied effective reality survey of strategic information systems An applied research in mobile companies in the Kurdistan Region
...Show More Authors

Abstract

Purpose: The research attempts to Stand on the reality of the effective application of of strategic information systems in telecommunications companies in the Kurdistan Region, and what is the amount of the impact of such systems on promoting of Strategic Intelligence.

Design/Methodology/Approach: The Applied method has been used, In order to achieve the objectives of the research has been the development of a questionnaire prepared for this purpose and then distributed to (11) Company of Iraqi communications operating in Kurdistan Region companies, it has been used questionnaire to collect data in order to develop

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Aug 31 2025
Journal Name
Stallion Journal For Multidisciplinary Associated Research Studies
Article Review: Evaluation of the Biological Role and Gene Expression of CD144 in Colorectal Cancer
...Show More Authors

Colorectal cancer (CRC) remains a leading cause of cancer-related deaths worldwide, with tumor angiogenesis playing a pivotal role in its progression and metastasis. CD144 (VE-cadherin), a calcium-dependent adhesion molecule, is critical for endothelial cell integrity and has been linked to tumor angiogenesis and cancer stem cell phenotypes. This study aimed to evaluate the immunohistochemical expression of CD144 in benign colorectal lesions, normal adjacent tumor tissue (NRAT), and tumor tissues to elucidate its role in colorectal cancer progression. Multiple techniques, including immunohistochemistry, flow cytometry, Western blot, and qPCR, were used to assess CD144 expression and its association with the VEGF/VEGFR2 signaling pat

... Show More
View Publication
Crossref
Publication Date
Sat Sep 30 2023
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Review of the Mechanisms for Preventing, Diagnosing, and Treatment of Pipe Sticking in Drilling Operations
...Show More Authors

Stuck pipe is a prevalent and costly issue in drilling operations, with the potential to cost the petroleum industry billions of dollars annually. To reduce the likelihood of this issue, efforts have been made to identify the causes of stuck pipes. The main mechanisms that cause stuck pipes include drill cutting of the formation, inappropriate hole-cleaning, wellbore instability, and differential sticking forces, particularly in highly deviated wellbores. The significant consequences of a stuck pipe include an increase in well costs and Non-Productive Time (NPT), and in the worst-case scenario, the loss of a wellbore section and down-hole equipment, or the need to sidetrack, plug, or abandon the well. This paper provides a comprehensive

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Sun Jun 12 2022
Journal Name
Sensors
Recent Advances in Bipedal Walking Robots: Review of Gait, Drive, Sensors and Control Systems
...Show More Authors

Currently, there is an intensive development of bipedal walking robots. The most known solutions are based on the use of the principles of human gait created in nature during evolution. Modernbipedal robots are also based on the locomotion manners of birds. This review presents the current state of the art of bipedal walking robots based on natural bipedal movements (human and bird) as well as on innovative synthetic solutions. Firstly, an overview of the scientific analysis of human gait is provided as a basis for the design of bipedal robots. The full human gait cycle that consists of two main phases is analysed and the attention is paid to the problem of balance and stability, especially in the single support phase when the biped

... Show More
View Publication Preview PDF
Scopus (76)
Crossref (67)
Scopus Clarivate Crossref
Publication Date
Sun May 01 2016
Journal Name
2016 Al-sadeq International Conference On Multidisciplinary In It And Communication Science And Applications (aic-mitcsa)
Review and performance comparison of VANET protocols: AODV, DSR, OLSR, DYMO, DSDV &amp; ZRP
...Show More Authors

View Publication
Scopus (25)
Crossref (14)
Scopus Crossref
Publication Date
Mon Mar 17 2025
Journal Name
Medicine Advances
Alone in the Mind: Review of Research Examining the Link Between Loneliness and Dementia
...Show More Authors

This narrative review focused on research investigating the impact of loneliness on the prevalence of dementia and its relationship with other risk factors. A comprehensive and rigorous search was conducted using a variety of scientific databases with specific keywords to identify all prior studies that examined the correlation between dementia and loneliness. The inquiry was confined to articles published in English from January 2017 to March 2024. The narrative review identified a consensus regarding the role of loneliness in enhancing the risk of all‐cause dementia, with a particular emphasis on the subjective perception of loneliness. This phenomenon may be caused by the sensations of exclusion, discrimination, and alienation that are

... Show More
View Publication Preview PDF