Preferred Language
Articles
/
uhcUP48BVTCNdQwCW2US
Survey on distributed denial of service attack detection using deep learning: A review
...Show More Authors

Distributed Denial of Service (DDoS) attacks on Web-based services have grown in both number and sophistication with the rise of advanced wireless technology and modern computing paradigms. Detecting these attacks in the sea of communication packets is very important. There were a lot of DDoS attacks that were directed at the network and transport layers at first. During the past few years, attackers have changed their strategies to try to get into the application layer. The application layer attacks could be more harmful and stealthier because the attack traffic and the normal traffic flows cannot be told apart. Distributed attacks are hard to fight because they can affect real computing resources as well as network bandwidth. DDoS attacks can also be made with smart devices that connect to the Internet, which can be infected and used as botnets. They use Deep Learning (D.L.) techniques like Convolutional Neural Network (C.N.N.) and variants of Recurrent Neural Networks (R.N.N.), such as Long Short-Term Memory (L.S.T.M.), Bidirectional L.S.T.M., Stacked L.S.T.M., and the Gat G.R.U.. These techniques have been used to detect (DDoS) attacks. The Portmap.csv file from the most recent DDoS dataset, CICDDoS2019, has been used to test D.L. approaches. Before giving the data to the D.L. approaches, the data is cleaned up. The pre-processed dataset is used to train and test the D.L. approaches. In the paper, we show how the D.L. approach works with multiple models and how they compare to each other.

View Publication
Publication Date
Tue Jan 01 2019
Journal Name
Journal Of The College Of Languages (jcl)
A Critical Discourse Analysis of Hate Speech
...Show More Authors

Online communication on social networks has become a never-given-up way of expressing and sharing views and opinions within the realm of all topics on earth, and that is that! A basis essential in this is the limits at which "freedom of expression" should not be trespassed so as not to fall into the expression of "hate speech". These two ends make a base in the UN regulations pertaining to human rights: One is free to express, but not to hate by expression. Hereunder, a Critical Discourse Analysis in terms of Fairclough's dialectical-relational approach (2001) is made of Facebook posts (being made by common people, and not of official nature)  targeting Islam and Muslims. This is made so as to recognize these instances of "speech" a

... Show More
View Publication Preview PDF
Crossref (4)
Crossref
Publication Date
Mon Jul 01 2019
Journal Name
Iop Conference Series: Materials Science And Engineering
Fuzzy Topological Spectrum of a KU-Algebra
...Show More Authors
Abstract<p>In the present paper, discuss the concept of fuzzy topological spectrum of a bounded commutative KU-algebra and study some of the characteristics of this topology. Also, we show that the fuzzy topological spectrum of this structure is compact and T<sub>1</sub> -space.</p>
View Publication
Scopus (2)
Scopus Crossref
Publication Date
Fri Sep 01 2023
Journal Name
Journal Of Surgical Case Reports
A rare variant of mirror hand deformity
...Show More Authors

Congenital hand and forearm anomalies pose a unique challenge in plastic and pediatric surgery. We present a case report of an 8- months-old girl with a congenital left sided hand and forearm anomaly, provisionally diagnosed as atypical left mirror hand anomaly. Classically there is absence of radius and duplication of ulna; however, our case had normal radius and ulna and a hand with seven digits arranged in two groups. We did a surgery which involved a ray amputation of the finger ulnar to the most radial digit, aiming to preserve an adequate first web space to reconstruct the thumb. The result of the surgical treatment in both functional and cosmetic aspects was, in authors’ opinion, good.

Publication Date
Sun Jun 02 2019
Journal Name
Baghdad Science Journal
Properties of a Complete Fuzzy Normed Algebra
...Show More Authors

          The aim of this paper is to translate the basic properties of the classical complete normed algebra to the complete fuzzy normed algebra at this end a proof of multiplication fuzzy continuous is given. Also a proof of every fuzzy normed algebra  without identity can be embedded into fuzzy normed algebra  with identity  and  is an ideal in  is given. Moreover the proof of the resolvent set of a non zero element in complete fuzzy normed space is equal to the set of complex numbers is given. Finally basic properties of the resolvent space of a complete fuzzy normed algebra is given.

View Publication Preview PDF
Scopus (3)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Thu Dec 15 2022
Journal Name
Al-adab Journal
Anglicism as a source of language neologization
...Show More Authors

Одной из активно развивающихся отраслей лексикологии является неология, объект её изучения - новое слово или неологизм. В задачу неологии входит выявление новых слов и новых значений у уже существующих в языке слов, анализ причин и способов их появления, описание факторов, влияющих на появление нового в лексической системе языка, разработка языковой политики в отношении новых номинаций.  Лексикограф

... Show More
View Publication
Crossref
Publication Date
Fri Jun 01 2018
Journal Name
Journal Of The College Of Languages (jcl)
A Pragmatic Study of English Honorific Forms
...Show More Authors

         It is axiomatic that languages mirror  the world view of their users. Manipulating honorific forms  among people inevitably reflects this truth . Honorifics are conventionalized forms or expressions  manifested in all the world's languages and  are used to  express the social status of the participants in the verbal interaction and to convey indications like politeness and respect  . English is no exception. However the question is what exactly creates these forms and their meanings. Although  honorifics have been extensively researched from a grammatical and semantic  angle  , yet they haven’t received that significant  attention  i

... Show More
View Publication Preview PDF
Publication Date
Fri Jul 21 2023
Journal Name
Journal Of Engineering
Design and Implementation of a Vlsm Simulator
...Show More Authors

Variable-Length Subnet Masks (VLSM), often referred to as "subnetting a subnet", is used to maximize addressing efficiency. The network administrator is able to use a long mask on networks with few hosts, and a short mask on subnets with many hosts. This addressing scheme allows growth and does not involve wasting addresses. VLSM gives a way of subnetting a network with
minimal loses of IP addresses for a specific range. Unfortunately, the network administrator has to perform several mathematical steps (or use charts) to get the required results from VLSM. In this paper, a simple graph simulator is proposed (using Visual Basic 6.0 Language) to perform all the required mathematical steps and to display the obtained required informatio

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Sep 08 2022
Journal Name
Al-khwarizmi Engineering Journal
Design and Analysis of a Spraying Robot
...Show More Authors

An indoor spraying robot is built in this research to solve numerous challenges associated with manual spraying. The mechanical, hardware and essential technologies used are all detailed and designed. The proposed spraying robot's conceptual design is split into two parts: hardware and software. The mechanical design, manufacturing, electrical, and electronics systems are described in the hardware part, while the control of the robot is described in the software section. This robot's kinematic and dynamic models were developed using three links that move in the x, y, and z directions. The robot was then designed using SolidWorks software to compute each connection's deflection and maximum stresses. The characteristics of the stepper moto

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (3)
Scopus Crossref
Publication Date
Sun Dec 20 2020
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Importance of obligation to the rules of professional conduct and its impact on tax revenues: An applied research in a sample of companies registered at the Department of the Public Authority for corporate taxes
...Show More Authors

The researcher  tried to show the importance of obligation with the rules of professional conduct set by the Association of Accountants and Auditors of Iraqis when expressing an opinion the financial statements submitted tax administration and enhance the confidence of these lists, and adopted in the tax settling accounts process and its impact on tax revenues, and touched a researcher at the theoretical side of the search to the problem of research and of my Is there a trace of non- not to obligation by the rules of professional conduct in Iraq affect the tax revenue with the rules of professional conduct in tax revenue for companies research sample, the research aims to study the rules of professional conduct set by the Associatio

... Show More
View Publication Preview PDF
Publication Date
Wed Aug 27 2025
Journal Name
Baghdad Science Journal
A Clustering Technique Based on the Hard K-Means (H.KM.) Method to Determine the Governorate That Have More Influence for Spreading COVID-19 in the Kingdom of Saudi Arabia
...Show More Authors

View Publication
Scopus Clarivate Crossref