Abstract Software-Defined Networking (commonly referred to as SDN) is a newer paradigm that develops the concept of a software-driven network by separating data and control planes. It can handle the traditional network problems. However, this excellent architecture is subjected to various security threats. One of these issues is the distributed denial of service (DDoS) attack, which is difficult to contain in this kind of software-based network. Several security solutions have been proposed recently to secure SDN against DDoS attacks. This paper aims to analyze and discuss machine learning-based systems for SDN security networks from DDoS attack. The results have indicated that the algorithms for machine learning can be used to detect DDoS attacks in SDN efficiently. From machine learning approaches, it can be explored that the best way to detect DDoS attack is based on utilizing deep learning procedures.Moreover, analyze the methods that combine it with other machine learning techniques. The most benefits that can be achieved from using the deep learning methods are the ability to do both feature extraction along with data classification; the ability to extract the specific information from partial data. Nevertheless, it is appropriate to recognize the low-rate attack, and it can get more computation resources than other machine learning where it can use graphics processing unit (GPU) rather than central processing unit (CPU) for carrying out the matrix operations, making the processes computationally effective and fast.
mixtures of cyclohexane + n-decane and cyclohexane + 1-pentanol have been measured at 298.15, 308.15, 318.15, and 328.15 K over the whole mole fraction range. From these results, excess molar volumes, VE , have been calculated and fitted to the Flory equations. The VE values are negative and positive over the whole mole fraction range and at all temperatures. The excess refractive indices nE and excess viscosities ?E have been calculated from experimental refractive indices and viscosity measurements at different temperature and fitted to the mixing rules equations and Heric – Coursey equation respectively to predict theoretical refractive indices, we found good agreement between them for binary mixtures in this study. The variation of th
... Show MoreAn experimental investigation of natural convection heat transfer from an isothermal horizontal,vertical and inclined heated square flat plates with and without circular hole, were carried out in two cases, perforated plates without an impermeable adiabatic hole "open core" and perforated plates with an impermeable adiabatic hole "closed core" by adiabatic plug. The experiments covered the laminar region with a range of Rayleih number of (1.11x106 ≤RaLo≤4.39x106 ), at Prandtle number (Pr=0.7). Practical experiments have been done with variable inclination angles from horizon (Ф=0o ,45o,90o,135oand 180o),facing upward (0o≤Ф<90o), and downward (90o
≤Ф<180o). The results showed that the temperature gradient increases whi
As the reservoir conditions are in continuous changing during its life, well production rateand its performance will change and it needs to re-model according to the current situationsand to keep the production rate as high as possible.Well productivity is affected by changing in reservoir pressure, water cut, tubing size andwellhead pressure. For electrical submersible pump (ESP), it will also affected by numberof stages and operating frequency.In general, the production rate increases when reservoir pressure increases and/or water cutdecreases. Also the flow rate increase when tubing size increases and/or wellhead pressuredecreases. For ESP well, production rate increases when number of stages is increasedand/or pump frequency is
... Show MoreAverage per capita GDP income is an important economic indicator. Economists use this term to determine the amount of progress or decline in the country's economy. It is also used to determine the order of countries and compare them with each other. Average per capita GDP income was first studied using the Time Series (Box Jenkins method), and the second is linear and non-linear regression; these methods are the most important and most commonly used statistical methods for forecasting because they are flexible and accurate in practice. The comparison is made to determine the best method between the two methods mentioned above using specific statistical criteria. The research found that the best approach is to build a model for predi
... Show MoreThis study came for the reason that some project administrations still do not follow the appropriate scientific methods that enable them to perform their work in a manner that achieves the goals for which those projects arise, in addition to exceeding the planned times and costs, so this study aims to apply the methods of network diagrams in Planning, scheduling and monitoring the project of constructing an Alzeuot intersection bridge in the city of Ramadi, as the research sample, being one of the strategic projects that are being implemented in the city of Ramadi, as well as being one of the projects that faced during its implementation Several of problems, the project problem was studied according to scientific methods through the applica
... Show Moreackground An autoimmune and inflammatory illness called rheumatoid arthritis (RA) occurs when your immune system mistakenly attacks normal cells in your body. Interleukin-35 is a brand-new cytokine that belongs to the immunosuppressive and anti-inflammatory IL-12 family. β -herpesvirus that produces inflammation and stays dormant in its host for life is the human cytomegalovirus. Human herpesvirus (HCMV) has been at the core of several RA-related theories. Objective The current study looked at the association between RA and serum IL-35 levels as well as the association between RA and CMV. Patients and methods Blood samples were taken in the Baghdad Teaching Hospital and Typical Rheumatology Unit from January 2022 to Mars 2022 for the curre
... Show MoreDue to increased consumption of resources, especially energy it was necessary to find alternatives characterized by the same quality as well as being of less expensive, and most important of these alternatives are characterized by waste and the fact that humancannot stop consumption. So we have consideredwaste as an alternative and cheap economic resources and by using environmental index the MIP (input materials per unit ,unit / service) is based on the grounds that the product is not the end of itselfit is a product to meet the need of a product or service, awarded a resource input and output within the five basic elements are the raw materials is ecological, Raw materials ecological, water, air and soil erosion for a
... Show MoreVarious visual media are becoming an increasingly important and active instrument of communication. This fact has led some political parties and leading personalities in Iraq to make use of them as an accepted forum for the discussion of public affairs usually in a manner that conforms to their declared policy. They have to draw as much popular support as they could for the causes which they fight for. As a result, a state of great confusion has been created from the contradictory statements made by the contending parties and gave left grave consequences on all types of the audience receiving them. The problem of the study can be summarized in one major question: What is the opinions of the audience as regards the statements made by the
... Show MoreImplementation of TSFS (Transposition, Substitution, Folding, and Shifting) algorithm as an encryption algorithm in database security had limitations in character set and the number of keys used. The proposed cryptosystem is based on making some enhancements on the phases of TSFS encryption algorithm by computing the determinant of the keys matrices which affects the implementation of the algorithm phases. These changes showed high security to the database against different types of security attacks by achieving both goals of confusion and diffusion.