Software-defined networking (SDN) is an innovative network paradigm, offering substantial control of network operation through a network’s architecture. SDN is an ideal platform for implementing projects involving distributed applications, security solutions, and decentralized network administration in a multitenant data center environment due to its programmability. As its usage rapidly expands, network security threats are becoming more frequent, leading SDN security to be of significant concern. Machine-learning (ML) techniques for intrusion detection of DDoS attacks in SDN networks utilize standard datasets and fail to cover all classification aspects, resulting in under-coverage of attack diversity. This paper proposes a hybr
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCommunity detection is an important and interesting topic for better understanding and analyzing complex network structures. Detecting hidden partitions in complex networks is proven to be an NP-hard problem that may not be accurately resolved using traditional methods. So it is solved using evolutionary computation methods and modeled in the literature as an optimization problem. In recent years, many researchers have directed their research efforts toward addressing the problem of community structure detection by developing different algorithms and making use of single-objective optimization methods. In this study, we have continued that research line by improving the Particle Swarm Optimization (PSO) algorithm using a
... Show MoreEnvironmental Tax is deemed as one of the most important tools that can be used to eliminate the problem of oil –based environment pollution resulted out of oil products processes and this has been significantly approved by the experience in those leading countries in the field of protecting the environment against pollution whereas oil-producing countries which are rather awkward in maintaining the environment such as Iraq , suffer from notorious environmental effects pertaining to oil product processes.
The problem of the research is represented the increased and constant rise in the volume of the environmental pollutants resulted from the processes managed by the intern
... Show MoreIn order to evaluate the performance of introduced varieties of maize and test them under different levels of plant density, and to determine which of the introduced varieties give a high yield and at what plant density, a field experiment was carried out at Station A in the Department of Field Crops- College of Agricultural Engineering Sciences - University of Baghdad- Jadiriyah, for the fall season 2021, the RCBD design was used with four replications, in a split plot arrangement, the three plant densities (50.000, 70.000, and 90.000 Plant s ha-1) were the main plates, while the varieties represented the secondary factor, which is six varieties of maize, class 2 = 5783 DKC, Class 3 = 6315 DKC, Class 4= 6590 DKC, whic
... Show MorePhotos of the backwardness of the Muslims and their backwardness in creating
sustainable development policies have driven them to a state of civilization , which witnesses
Avckaddoha time ago and not disrupt the adversary is a phenomenon thought the youth to
exercise its role and duty in the construction and development of the state witnesses Mdanah
civilized nation.
The vigilance thought the youth of its slumber correct form could provide opportunities for
growth and development in the Arab and Islamic worlds, and both material and moral support
through the creation model youth Islamic social role models, but that the image of the model
, , - 1