Preferred Language
Articles
/
Cxc5-Y0BVTCNdQwCEStJ
Techniques for DDoS Attack in SDN: A Comparative Study
...Show More Authors

Abstract Software-Defined Networking (commonly referred to as SDN) is a newer paradigm that develops the concept of a software-driven network by separating data and control planes. It can handle the traditional network problems. However, this excellent architecture is subjected to various security threats. One of these issues is the distributed denial of service (DDoS) attack, which is difficult to contain in this kind of software-based network. Several security solutions have been proposed recently to secure SDN against DDoS attacks. This paper aims to analyze and discuss machine learning-based systems for SDN security networks from DDoS attack. The results have indicated that the algorithms for machine learning can be used to detect DDoS attacks in SDN efficiently. From machine learning approaches, it can be explored that the best way to detect DDoS attack is based on utilizing deep learning procedures.Moreover, analyze the methods that combine it with other machine learning techniques. The most benefits that can be achieved from using the deep learning methods are the ability to do both feature extraction along with data classification; the ability to extract the specific information from partial data. Nevertheless, it is appropriate to recognize the low-rate attack, and it can get more computation resources than other machine learning where it can use graphics processing unit (GPU) rather than central processing unit (CPU) for carrying out the matrix operations, making the processes computationally effective and fast.

Crossref
View Publication
Publication Date
Sat Feb 01 2020
Journal Name
Iop Conference Series: Materials Science And Engineering
How geometric reverse engineering techniques can conserve our heritage; a case study in Iraq using 3D laser scanning
...Show More Authors
Abstract<p>Laser scanning has become a popular technique for the acquisition of digital models in the field of cultural heritage conservation and restoration nowadays. Many archaeological sites were lost, damaged, or faded, rather than being passed on to future generations due to many natural or human risks. It is still a challenge to accurately produce the digital and physical model of the missing regions or parts of our cultural heritage objects and restore damaged artefacts. The typical manual restoration can become a tedious and error-prone process; also can cause secondary damage to the relics. Therefore, in this paper, the automatic digital application process of 3D laser modelling of arte</p> ... Show More
View Publication
Scopus (8)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Tue Jan 01 2019
Journal Name
Therapeutic Advances In Drug Safety
Deferasirox in thalassemia: a comparative study between an innovator drug and its copy among a sample of Iraqi patients
...Show More Authors
Background:

The health care industry is witnessing an increasing trend in the use of generic medicines because of their presumed low cost compared with innovator medicines. The aim of this study was to determine and compare the performance of the copy drug Osveral®and its innovator drug deferasirox (Exjade®).

Methods:

A prospective observational study including 223 patients receiving the branded medicine Exjade®and 101 patients receiving the copy Osveral®was carried out. Data were assessed for a 1-year period and included clinical symptoms, serum ferrit

... Show More
View Publication Preview PDF
Scopus (5)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Thu Feb 04 2016
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
Study in the procedural provisions of the action consumption incidents A comparative study Under Iraqi Consumer Protection Act No. 1 of 2010.: Study in the procedural provisions of the action consumption incidents A comparative study Under Iraqi Consumer Protection Act No. 1 of 2010.
...Show More Authors

This research Sheds highlights the procedural protections that must be enjoyed by the consumer in the face of the product, which is the protection of no less dangerous than the substantive protection of our obligations and duties delivered by the legislature upon the product of consumer interest, what is the benefit of the right if the access road to him complicated, so know The consumer has a right to the face of the product, but leaves the claim, either to ignorance For access to this right either to the difficulty of connecting to him.
That this research modest attempt we tried through which to focus on the way to the consumer behavior of arrived right, as we tried to highlight the weaknesses and the complexity of the procedure to

... Show More
View Publication
Publication Date
Tue Nov 21 2023
Journal Name
Pharmacia
A comparative study of oral diacerein and transdermal diacerein as Novasomal gel in a model of MIA induced Osteoarthritis in rats
...Show More Authors

Background: Osteoarthritis is a chronic pathology of the joints causing disability and morbidity. Diacerein is a disease-modifying agent indicated for osteoarthritis management with enhanced performance and have much lower side effects profile than conventional non-steroidal anti-inflammatory drugs. Oral administration of Diacerein is associated with a laxative effect, thus causing treatment discontinuation. Aim: This study aimed to evaluate the activity of Diacerein novasome-based transdermal gel compared with standard oral treatment in the management of induced osteoarthritis in a rat model. Materials and methods: A single intra-articular injection of monosodium iodoacetate was administered to the left knee joint, resulting in the develop

... Show More
View Publication
Scopus (5)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Fri Sep 23 2022
Journal Name
Specialusis Ugdymas
Intrusion Detection System Techniques A Review
...Show More Authors

With the high usage of computers and networks in the current time, the amount of security threats is increased. The study of intrusion detection systems (IDS) has received much attention throughout the computer science field. The main objective of this study is to examine the existing literature on various approaches for Intrusion Detection. This paper presents an overview of different intrusion detection systems and a detailed analysis of multiple techniques for these systems, including their advantages and disadvantages. These techniques include artificial neural networks, bio-inspired computing, evolutionary techniques, machine learning, and pattern recognition.

Publication Date
Thu Jun 20 2019
Journal Name
Baghdad Science Journal
A Comparative Analysis of the Zernike Moments for Single Object Retrieval
...Show More Authors

Zernike Moments has been popularly used in many shape-based image retrieval studies due to its powerful shape representation. However its strength and weaknesses have not been clearly highlighted in the previous studies. Thus, its powerful shape representation could not be fully utilized. In this paper, a method to fully capture the shape representation properties of Zernike Moments is implemented and tested on a single object for binary and grey level images. The proposed method works by determining the boundary of the shape object and then resizing the object shape to the boundary of the image. Three case studies were made. Case 1 is the Zernike Moments implementation on the original shape object image. In Case 2, the centroid of the s

... Show More
View Publication Preview PDF
Crossref (2)
Clarivate Crossref
Publication Date
Thu Mar 25 2021
Journal Name
International Journal Of Drug Delivery Technology
A comparative study of retinol-binding protein-4 and progranulin in iraqi women with thyroid disorder
...Show More Authors

Thyroid hormones (TH) regulate the metabolic processes required for normal development and growth; also, to organizemetabolism in adults, any defect in thyroid function leads to abnormality in thyroid hormones level. The current study hasbeen designed to find the relationship between retinol-binding protein-4 and progranulin in the serum of Iraqi women withhypothyroidism and hyperthyroidism, also, to study whether these patients are exposed to a risk of developing diabetes mellitus,and PGRN may be a biomarker in detection early stage of diabetes mellitus.Materials and Methods: in this study, serum samples were obtained from 50 Iraqis women patients, [25 patients withhypothyroidism (G2) and 25 patients with hyperthyroidism (G3)] in addition

... Show More
Scopus (2)
Scopus
Publication Date
Mon Oct 28 2019
Journal Name
Periodicals Of Engineering And Natural Sciences (pen)
Kinetic profile of silver and zinc oxide nanoparticles by intraperitoneal injection in mice , a comparative study
...Show More Authors

View Publication
Scopus (3)
Scopus Crossref
Publication Date
Sun Dec 01 2024
Journal Name
The Medical Journal Of Tikrit University
ChemiluminescenceMicroparticle Immunoassay in the Diagnosis of Hepatitis C Virus among Patients on Hemodialysis: A Comparative Study
...Show More Authors

Browse Iraqi academic journals and research papers

View Publication
Publication Date
Tue Oct 09 2018
Journal Name
Bulletin Of The Iraq Natural History Museum (p-issn: 1017-8678 , E-issn: 2311-9799)
A COMPARATIVE HISTOLOGICAL STUDY OF THYROID TISSUE IN CARP FISH CYPRINUS CARPSIO AND MICE SWISS ALBICANS
...Show More Authors

    This histological study was carried out to compare between the thyroid gland of mice (as a model of the mammals) and the thyroid tissue of fish.  Unlike mice, the thyroid gland of fish can't be recognized by naked eye.  The present study revealed that the thyroid of mice varied from that of fish by the location and the histological structure. The study classified the physiological state of the thyroid of mice into three states and that of the fish into only two states. Accordingly, the study concluded that the metabolism of thyroid fish was of moderate type.

View Publication Preview PDF