Aljanabi, Mohammad
Unknown Affiliation

Published : 3 Documents Claim Missing Document
Claim Missing Document
Check
Articles

Found 3 Documents
Search

Distributed denial of service attack defense system-based auto machine learning algorithm Aljanabi, Mohammad; Hayder, Russul; Talib, Shatha; Hussien Ali, Ahmed; Mohammed, Mostafa Abdulghafoor; Sutikno, Tole
Bulletin of Electrical Engineering and Informatics Vol 12, No 1: February 2023
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v12i1.4537

Abstract

The use of network-connected gadgets is rising quickly in the internet age, which is escalating the number of cyberattacks. The detection of distributed denial of service (DDoS) attacks is a tedious task that has necessitated the development of a number of models for its identification recently. Nonetheless, because of major fluctuations in subscriptions and traffic rates, it continues to be a difficult challenge. A novel automatic detection technique was created to address this issue in this work, which reduces the feature space and consequently minimizes the computational time and model overfitting. Data preprocessing is done first to increase the model's generalizability; then, a feature selection method is used to choose the most pertinent features to increase the accuracy of the classification process. Additionally, hyperparameter tuning-choosing the proper parameters for the learning approach-improved model performance. Finally, the support vector machine (SVM) is compatible with the optimization and the hyperparameters offered by supervised learning methods. The CICDDoS2019 dataset was used to evaluate each of these assays, and the experimental findings demonstrated that, with an accuracy of 99.95%, the suggested model performs well when compared to more modern techniques.
Cloud Computing Issues, Challenges, and Needs: A Survey Aljanabi, Mohammad; Abd-Alwahab, Shams N.; Saedudin, RD Rohmat; Ebraheem, Hind Raad; Defni, -; Hadi, Ronal; Ismail, Mohd Arfian
JOIV : International Journal on Informatics Visualization Vol 5, No 3 (2021)
Publisher : Society of Visual Informatics

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30630/joiv.5.3.671

Abstract

Cloud computing represents a kind of computing that is based on the sharing of computing resources instead of possessing personal devices or local servers for handling several applications and tasks. This kind of computing includes three distinguished kinds of services provided remotely for clients that can be accessed by using the Internet. Typically, clients work on paying annual or monthly service fees for suppliers, in order to gain access to systems that work on delivering infrastructure as a service, platforms as a service, and software as a service for any subscriber. In this paper, the usefulness and the abuse of the cloud computing are briefly discussed and presented by highlighting the influences of cloud computing in different areas. Moreover, this paper also presents the kinds and services of cloud. In addition, the security issues that cover the cloud security solution requirements, and the cloud security issues, which is one of the biggest issues in recent years in cloud computing were presented in this paper. The security requirement that needs by the cloud computing covers privacy, lack of user control, unauthorized secondary usage, and finally data proliferation and data flow. Meanwhile, the security issues cover including ownership of device, the trust issue and legel aspects. To overcome the security issues, this paper also presents the solution at the end of this paper.
Study the Field of View Influence on the Monchromatic and Polychromatic Image Quality of a Human Eye Qasim, Adeeb Mansoor; Aljanabi, Mohammad; Kasim, Shahreen; Ismail, Mohd Arfian; Gusman, Taufik
JOIV : International Journal on Informatics Visualization Vol 6, No 1-2 (2022): Data Visualization, Modeling, and Representation
Publisher : Society of Visual Informatics

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30630/joiv.6.1-2.931

Abstract

In this paper, the effect of the eye field of view (known as F.O.V.) on the performance and quality of the image of the human eye is studied, analyzed, and presented in detail. The image quality of the retinal is numerically analyzed using the eye model of Liou and Brennan with this polymer contact lens. The image, which is in digital form were collected from various sources such as from photos, text structure, manuscripts, and graphics. These images were obtained from scanned documents or from a scene. The color fringing which is chromatic aberration addition to polychromatic effect was studied and analyzed. The Point Spreads Function or (known as PSF) as well as The Modulation Transfers Function (known as MTF) were measured as the most appropriate measure of image quality. The calculations of the image quality were made by using Zemax software. Then, the result of the calculation demonstrates the value of correcting the chromatic aberration. The results presented in this paper had shown that the form of image is so precise to the eye (F.O.V.). The image quality is degraded as (F.O.V.) increase due to the increment in spherical aberration and distortion aberration respectively. In conclusion, then Zemax software that was used in this study assist the researcher potential to design human eye and correct the aberration by using external optics.