Software-defined networking (SDN) is an innovative network paradigm, offering substantial control of network operation through a network’s architecture. SDN is an ideal platform for implementing projects involving distributed applications, security solutions, and decentralized network administration in a multitenant data center environment due to its programmability. As its usage rapidly expands, network security threats are becoming more frequent, leading SDN security to be of significant concern. Machine-learning (ML) techniques for intrusion detection of DDoS attacks in SDN networks utilize standard datasets and fail to cover all classification aspects, resulting in under-coverage of attack diversity. This paper proposes a hybrid technique to recognize denial-of-service (DDoS) attacks that combine deep learning and feedforward neural networks as autoencoders. Two datasets were analyzed for the training and testing model, first statically and then iteratively. The auto-encoding model is constructed by stacking the input layer and hidden layer of self-encoding models’ layer by layer, with each self-encoding model using a hidden layer. To evaluate our model, we use a three-part data split (train, test, and validate) rather than the common two-part split (train and test). The resulting proposed model achieved a higher accuracy for the static dataset, where for ISCX-IDS-2012 dataset, accuracy reached a high of 99.35% in training, 99.3% in validation and 99.99% in precision, recall, and F1-score. for the UNSW2018 dataset, the accuracy reached a high of 99.95% in training, 0.99.94% in validation, and 99.99% in precision, recall, and F1-score. In addition, the model achieved great results with a dynamic dataset (using an emulator), reaching a high of 97.68% in accuracy.
Gold, silver and nickel used as electrodes in the fabrication of perovskite solar cell by using thermal evaporation deposition method with direct structure FTO\ TiO2\ MAPbI3\ spiro-MeOTAD\ metal electrode. The cell efficiency was compared between the electrodes material as a function of time to explaining the effect of these metals electrode on cell performance, X-ray diffraction pattern showed that the samples that contain gold and nickel do not contain a compound indicating the interaction of the metal with the components of the cell or the formation of a new compound, while in the cell containing silver it was found that silver iodide is fo
Introduction and Aim: Forkhead box P3 (FOXP3) and interleukin-10 (IL-10) are the key regulators controlling the activity of Treg cells, which are crucial for maintaining immune tolerance and reducing autoimmune reactions. The objective of this study was to investigate the potential utility of elevated levels of FOXP3 and IL-10 gene expression as a diagnostic indicator in patients with rheumatoid arthritis (RA). Materials and Methods: The study used quantitative polymerase chain reaction (qPCR) to examine the expression levels of FOXP3 and IL-10 transcripts in whole blood samples from Iraqi patients with rheumatoid arthritis. A group of healthy control subjects were also included in the study. Results: In blood samples taken fr
... Show MoreAn oral bi layer sustained release (SR) strips of Sodium Montelukast SMLT , which is selective leukotriene antagonist , used for patients suffered from mid-night asthma , were prepared successfully ,using different polymers, like guar gum , carrageenan , and xanthan gum , by solvent casting method .
The results obtained by this study revealed ,that best fast dissolving film of SMLT was loaded in carrageenan polymer 57% w\w (30mg.) , with acceptable physical properties, like film thickness , elastic endurance and surface pH .
Besides to that , the disintegration t
... Show MoreChromium tanned leather wastes (CTLW) and vegetable tanned leather wastes (VTLW) were used as adsorbent materials to remove the Biebrich scarlet dye (BS), as an anionic dye from wastewater, using an adsorption method. The effects of various factors, such as weight of leather waste, time of shaking, and the starting concentration of Biebrich scarlet dye, temperature and pH were studied. It described the adsorption process using Langmuir and Freundlich isotherm models. The obtained results agreed well with the Langmuir model, and the maximum adsorption capacities of CTLW and VTLW were 73.5294 and 78.1250 mg.g⁻¹, respectively, suggesting a monolayer adsorption process. The adsorption kinetic was found to follow a pseudo-second-order kinetic
... Show MoreThis research focuses on detecting the financial corruption cases in Iraq in light of adoption the strategic audit, the paper deals with the problem of the proliferation corruption cases particularly financial in Iraq and dramatically in the presence of audit and control devices as well as inspection and integrity devices, which indicates the existence of deficiencies and weaknesses in those devices in the implementation of audit and control functions in order to detect the corruption cases in the economic units in Iraq.
Stems objective of this research through the provision of approach of strategic audit concepts and indicate the extent importance of adopting of strategic audit as a means to detect the f
... Show MoreBy definition, the detection of protein complexes that form protein-protein interaction networks (PPINs) is an NP-hard problem. Evolutionary algorithms (EAs), as global search methods, are proven in the literature to be more successful than greedy methods in detecting protein complexes. However, the design of most of these EA-based approaches relies on the topological information of the proteins in the PPIN. Biological information, as a key resource for molecular profiles, on the other hand, acquired a little interest in the design of the components in these EA-based methods. The main aim of this paper is to redesign two operators in the EA based on the functional domain rather than the graph topological domain. The perturb
... Show MoreThe goal of this work is to check the presence of PNS (photon number splitting) attack in quantum cryptography system based on BB84 protocol, and to get a maximum secure key length as possible. This was achieved by randomly interleaving decoy states with mean photon numbers of 5.38, 1.588 and 0.48 between the signal states with mean photon numbers of 2.69, 0.794 and 0.24. The average length for a secure key obtained from our system discarding the cases with Eavesdropping was equal to 125 with 20 % decoy states and 82 with 50% decoy states for mean photon number of 0.794 for signal states and 1.588 for decoy states.