Preferred Language
Articles
/
uhcUP48BVTCNdQwCW2US
Survey on distributed denial of service attack detection using deep learning: A review
...Show More Authors

Distributed Denial of Service (DDoS) attacks on Web-based services have grown in both number and sophistication with the rise of advanced wireless technology and modern computing paradigms. Detecting these attacks in the sea of communication packets is very important. There were a lot of DDoS attacks that were directed at the network and transport layers at first. During the past few years, attackers have changed their strategies to try to get into the application layer. The application layer attacks could be more harmful and stealthier because the attack traffic and the normal traffic flows cannot be told apart. Distributed attacks are hard to fight because they can affect real computing resources as well as network bandwidth. DDoS attacks can also be made with smart devices that connect to the Internet, which can be infected and used as botnets. They use Deep Learning (D.L.) techniques like Convolutional Neural Network (C.N.N.) and variants of Recurrent Neural Networks (R.N.N.), such as Long Short-Term Memory (L.S.T.M.), Bidirectional L.S.T.M., Stacked L.S.T.M., and the Gat G.R.U.. These techniques have been used to detect (DDoS) attacks. The Portmap.csv file from the most recent DDoS dataset, CICDDoS2019, has been used to test D.L. approaches. Before giving the data to the D.L. approaches, the data is cleaned up. The pre-processed dataset is used to train and test the D.L. approaches. In the paper, we show how the D.L. approach works with multiple models and how they compare to each other.

View Publication
Publication Date
Thu Nov 30 2023
Journal Name
Iraqi Geological Journal
Multiple and Coherent Noise Removal from X-Profile 2D Seismic Data of Southern Iraq Using Common Depth Point Muting Procedures and Depending on Madagascar Open-Source Package
...Show More Authors

This article describes how to predict different types of multiple reflections in pre-track seismic data. The characteristics of multiple reflections can be expressed as a combination of the characteristics of primary reflections. Multiple velocities always come in lower magnitude than the primaries, this is the base for separating them during Normal Move Out correction. The muting procedure is applied in Time-Velocity analysis domain. Semblance plot is used to diagnose multiples availability and judgment for muting dimensions. This processing procedure is used to eliminate internal multiples from real 2D seismic data from southern Iraq in two stages. The first is conventional Normal Move Out correction and velocity auto picking and

... Show More
View Publication
Scopus (1)
Scopus Crossref
Publication Date
Sat Sep 30 2023
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Cyber security technology and the reflection of its application on the quality of financial reports: An exploratory study of a sample of internal and external auditors
...Show More Authors

Abstract

                 This research aims to define the roles of auditors by clarifying the concept and risks of cyber security in protecting information and financial data in economic units. Najaf, Babylon and Karbala, then the results were analyzed and the results were presented and analyzed to show that adopting cyber security improves the quality of reports Finance through what it achieves in displaying information with credibility and transparency, in a way that suits the needs of users, and cyber security has a role in managing economic resources more effectively to obtain benefits that would have been lost in the event of an

... Show More
View Publication Preview PDF
Publication Date
Fri Jun 01 2007
Journal Name
Journal Of Al-nahrain University Science
ON THE GREEDY RADIAL BASIS FUNCTION NEURAL NETWORKS FOR APPROXIMATION MULTIDIMENSIONAL FUNCTIONS
...Show More Authors

The aim of this paper is to approximate multidimensional functions by using the type of Feedforward neural networks (FFNNs) which is called Greedy radial basis function neural networks (GRBFNNs). Also, we introduce a modification to the greedy algorithm which is used to train the greedy radial basis function neural networks. An error bound are introduced in Sobolev space. Finally, a comparison was made between the three algorithms (modified greedy algorithm, Backpropagation algorithm and the result is published in [16]).

View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Thu Mar 01 2018
Journal Name
Journal Of Engineering
Permeability Estimation by Using the Modified and Conventional FZI Methods
...Show More Authors

There many methods for estimation of permeability. In this Paper, permeability has been estimated by two methods. The conventional and modified methods are used to calculate flow zone indicator (FZI). The hydraulic flow unit (HU) was identified by FZI technique. This technique is effective in predicting the permeability in un-cored intervals/wells. HU is related with FZI and rock quality index (RQI). All available cores from 7 wells (Su -4, Su -5, Su -7, Su -8, Su -9, Su -12, and Su -14) were used to be database for HU classification. The plot of probability cumulative of FZI is used. The plot of core-derived probability FZI for both modified and conventional method which indicates 4 Hu (A, B, C and D) for Nahr Umr forma

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Oct 01 2023
Journal Name
Indonesian Journal Of Electrical Engineering And Computer Science
Intelligence framework dust forecasting using regression algorithms models
...Show More Authors

<span>Dust is a common cause of health risks and also a cause of climate change, one of the most threatening problems to humans. In the recent decade, climate change in Iraq, typified by increased droughts and deserts, has generated numerous environmental issues. This study forecasts dust in five central Iraqi districts using machine learning and five regression algorithm supervised learning system framework. It was assessed using an Iraqi meteorological organization and seismology (IMOS) dataset. Simulation results show that the gradient boosting regressor (GBR) has a mean square error of 8.345 and a total accuracy ratio of 91.65%. Moreover, the results show that the decision tree (DT), where the mean square error is 8.965, c

... Show More
View Publication
Scopus (3)
Scopus Crossref
Publication Date
Tue Jun 30 2015
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Using the Artificial Gas Lift to Increase the Productivity of Noor Oil Field / Mishrif Formation
...Show More Authors

Noor Oil Field is one of Iraqi oil fields located in Missan province / Amarah city. This field is not subjected to licensing rounds, but depends on the national effort of  Missan Oil Company. The first two wells in the field were drilled in seventies and were  not opened to production until 2009. The aim of this study is to study the possibility of using the method of gas lift to increase the productivity of this field . PROSPER software was used to design the continuous  gas lift by using maximum production rate in the design.

   The design was made after comparing  the measured pressure with the calculated pressure, this comparison  show  that the method of Beggs-Brill and Petroleum Exper

... Show More
View Publication Preview PDF
Publication Date
Tue Jan 21 2025
Journal Name
Periodicals Of Engineering And Natural Sciences (pen)
A comparison between the hierarchical clustering methods for postgraduate students in Iraqi universities for the year 2019-2020 using the cophenetic and delta correlation coefficients
...Show More Authors

The educational sector is one of the important sectors in the world, and it is considered one of the means of community development. In addition, it is one of the means of making the country’s renaissance and devel-opment because it represents the factory of thinking minds that make change. There is no doubt that this sector is the same as any other sector. The deficit in the studied scientific planning has been prolonged, which led to its deterioration, and the problems of education remain diverse and inherited from previous time periods, where the hierarchical cluster analysis was used on postgraduate students in universities in Iraq, except for Kurdistan region, and the number of universities that were included in the study was

... Show More
View Publication
Crossref
Publication Date
Fri Aug 01 2014
Journal Name
Journal Of Economics And Administrative Sciences
Using Bayesian method to estimate the parameters of Exponential Growth Model with Autocorrelation problem and different values of parameter of correlation-using simulation
...Show More Authors

We have studied Bayesian method in this paper by using the modified exponential growth model, where this model is more using to represent the growth phenomena. We focus on three of prior functions (Informative, Natural Conjugate, and the function that depends on previous experiments) to use it in the Bayesian method. Where almost of observations for the growth phenomena are depended on one another, which in turn leads to a correlation between those observations, which calls to treat such this problem, called Autocorrelation, and to verified this has been used Bayesian method.

The goal of this study is to knowledge the effect of Autocorrelation on the estimation by using Bayesian method. F

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Oct 01 2022
Journal Name
Al–bahith Al–a'alami
IRAQ BETWEEN A CULTURE OF CIVIL SOCIETY AND A CULTURE OF VIOLENCE
...Show More Authors

The title takes its realistic connotations with its symbols, slogans and historical extensions in Iraq, also, the repercussions of the organic crisis that afflicted it for almost half a century, especially after the abortion of the July 14 Revolution and the spread of the culture of weapons, violence and death that we are living in Iraq nowadays.

The topic is suitable for critical analytical studies carried out by specialists in scientific and academic research centers and cultural institutions because they have an important feasibility at the strategic cultural level in Iraq, the Middle East and the world.

Research in Iraq has fallen to the extreme and is no longer effective, to the extent that it represents a severe cri

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri May 30 2025
Journal Name
Journal Of Internet Services And Information Security
Enhancing Lung Cancer Classification using CT Images using Processing Techniques Employing U-Net Architecture
...Show More Authors

View Publication
Scopus Crossref