Abstract Software-Defined Networking (commonly referred to as SDN) is a newer paradigm that develops the concept of a software-driven network by separating data and control planes. It can handle the traditional network problems. However, this excellent architecture is subjected to various security threats. One of these issues is the distributed denial of service (DDoS) attack, which is difficult to contain in this kind of software-based network. Several security solutions have been proposed recently to secure SDN against DDoS attacks. This paper aims to analyze and discuss machine learning-based systems for SDN security networks from DDoS attack. The results have indicated that the algorithms for machine learning can be used to detect DDoS attacks in SDN efficiently. From machine learning approaches, it can be explored that the best way to detect DDoS attack is based on utilizing deep learning procedures.Moreover, analyze the methods that combine it with other machine learning techniques. The most benefits that can be achieved from using the deep learning methods are the ability to do both feature extraction along with data classification; the ability to extract the specific information from partial data. Nevertheless, it is appropriate to recognize the low-rate attack, and it can get more computation resources than other machine learning where it can use graphics processing unit (GPU) rather than central processing unit (CPU) for carrying out the matrix operations, making the processes computationally effective and fast.
The lower Cretaceous sandstones of Zubair and Nahr Umr formations are the main producing reservoirs in Subba oilfield in southern Iraq. Key differences in their petrophysical and depositional attributes exist affecting their reservoir characteristics. The evaluation of well logs and core porosity-permeability data show better reservoir properties in Nahr Formation. The Litho-saturation logs indicate greater thickness of oil-saturated reservoir units for Nahr Unr Formation associated with lower values of shale volume, and higher values of effective porosity. In addition, higher values of permeability for Nahr Umr Formation is suggested by applying porosity-irreducible water saturation cross plot. The reducing reservoir quality of Zub
... Show MorePurpose: The purpose of the study is to compare and evaluate Earnings Management in Tunisia and Iraq. Theoretical framework: Earnings Management is an important topic that has been studied by a significant number of researchers, as well as those who are interested in the accounting profession. Earnings Management has gotten a lot of attention from academics, professionals, and other interested parties in recent years (e.g. Kliestik et al., 2020; Rahman et al., 2021; Gamra &Ellouze, 2021) Design/methodology/approach: The sample includes ten banks listed on the Bourse of Tunisia and Iraq Stock Exchanges for the year 2017. We have used a model of Kothari et al., (2005) as a tool to measure Earnings Management in both mark
... Show MoreSchools and artistic trends derive their themes from artistic styles and styles as methods followed by the artist to express his themes embodied in the values of artistic and plastic elements as symbols and signs that can be described according to the type of art school and the extent to which the artist is influenced in employing them as a goal to achieve the plastic achievement in the painting, and from those vocabulary (human beings nature Life) as encoded messages that have an appearance and an interior, the appearance of which are forms, colors, formats and distributions of space and their interior meanings and semantics embody attitudes, events and circumstances that stem from the social depth and daily life and derive their comp
... Show MoreThe research's aim is to place two teaching methods ( total and analytical method) and to know which one of them is better than the other in teaching the counter-attack with Epee. The researchers have used the experimental method for being considered suitable to solve the problem of the research. The sample of the research includes third –stage female students of college of physical education and sport sciences / Baghdad University in the subject of fencing, their number amounted 60 female students. It has been used SPSS for processing the results. They have concluded that the two groups of the research and the two methods (( total and analytical) have learnt the counter- attack of the two over mentioned groups. they have recommended to c
... Show MoreSoftware-defined networking (SDN) is an innovative network paradigm, offering substantial control of network operation through a network’s architecture. SDN is an ideal platform for implementing projects involving distributed applications, security solutions, and decentralized network administration in a multitenant data center environment due to its programmability. As its usage rapidly expands, network security threats are becoming more frequent, leading SDN security to be of significant concern. Machine-learning (ML) techniques for intrusion detection of DDoS attacks in SDN networks utilize standard datasets and fail to cover all classification aspects, resulting in under-coverage of attack diversity. This paper proposes a hybr
... Show MoreBackground: One of the major problems in endodontics is micro-leakage of root canal fillings which might contribute to the failure of endodontic treatment. To avoid this problem, a variety of sealers have been tested. The objective of this, in vitro, study was to evaluate the shear bond strength of four resin based sealers (AH plus, silver free AH26, RealSeal SE and Perma Evolution permanent root canal filling material) to dentin. Materials and Methods: Forty non-carious extracted lower premolars were used. The 2mm of the occlusal surfaces of teeth were sectioned, to expose the dentin surface. The exposed dentin surfaces of teeth were washed with 5ml of 2.5% NaOCl solution followed by 5ml of 17 % EDTA then rinsed by deionized water to remov
... Show MoreAn idiom is a group of words whose meaning put together is different from the meaning of
individual words. English is a rich language when it comes to idioms, they represent variety. For
foreign learners, idioms are problematic because even if they know the meaning of individual
words that compose an idiom the meaning of it might be something completely different.
The present study investigates Iraqi third year college students’ recognition of idioms. To
achieve this, the researchers have conducted a test which comprises three questions. Certain
conclusions are reached here along with some suggestions and recommendations.
Researching the effects of the research and technological development contract, determining its extent and demarcating the boundaries of the obligations imposed in it, is the cornerstone of economic growth and development, because defining these obligations removes the ambiguity and conflict between interests, by stating the rights owed to each party and even trying to reconcile them, or impose protection by specifying guarantees that are compatible with the essence of the R&D contract, For the purpose of studying the subject thoroughly, we will divide this research into two sections. The first is devoted to identifying the parties to the research and technological development contract. As for the other topic, we will explain the obligation
... Show MoreResearchers are interested in the issue of children abuse and they look for its cause in the past and present. Their interest is limited to identifying penal liability which is caused by children abuse away from focusing on civil liability. So, the study is going to clarify the parents' responsibility for children abuse rather than civil liability of the medic in case he wouldn’t notify the authorities about the case according to the American law rules and the attitude of Iraqi law rather than some judicial application of civil cases that were exposed to American judiciary concerning children abuse.