Preferred Language
Articles
/
Cxc5-Y0BVTCNdQwCEStJ
Techniques for DDoS Attack in SDN: A Comparative Study

Abstract Software-Defined Networking (commonly referred to as SDN) is a newer paradigm that develops the concept of a software-driven network by separating data and control planes. It can handle the traditional network problems. However, this excellent architecture is subjected to various security threats. One of these issues is the distributed denial of service (DDoS) attack, which is difficult to contain in this kind of software-based network. Several security solutions have been proposed recently to secure SDN against DDoS attacks. This paper aims to analyze and discuss machine learning-based systems for SDN security networks from DDoS attack. The results have indicated that the algorithms for machine learning can be used to detect DDoS attacks in SDN efficiently. From machine learning approaches, it can be explored that the best way to detect DDoS attack is based on utilizing deep learning procedures.Moreover, analyze the methods that combine it with other machine learning techniques. The most benefits that can be achieved from using the deep learning methods are the ability to do both feature extraction along with data classification; the ability to extract the specific information from partial data. Nevertheless, it is appropriate to recognize the low-rate attack, and it can get more computation resources than other machine learning where it can use graphics processing unit (GPU) rather than central processing unit (CPU) for carrying out the matrix operations, making the processes computationally effective and fast.

Crossref
View Publication
Publication Date
Sat Jun 27 2020
Journal Name
Iraqi Journal Of Science
SDN-assisted Service Placement for the IoT-based Systems in Multiple Edge Servers Environment

Edge computing is proved to be an effective solution for the Internet of Things (IoT)-based systems. Bringing the resources closer to the end devices has improved the performance of the networks and reduced the load on the cloud. On the other hand, edge computing has some constraints related to the amount of the resources available on the edge servers, which is considered to be limited as compared with the cloud. In this paper, we propose Software-Defined Networking (SDN)-based resources allocation and service placement system in the multi-edge networks that serve multiple IoT applications. In this system, the resources of the edge servers are monitored using the proposed Edge Server Application (ESA) to determine the state of the edge s

... Show More
Scopus (4)
Crossref (2)
Scopus Crossref
View Publication Preview PDF
Publication Date
Tue Jun 01 2021
Journal Name
Journal Of Engineering
Numerical Study for HAWT Wake shape with different Angles of Attack

Increasing world demand for renewable energy resources as wind energy was one of the goals behind research optimization of energy production from wind farms. Wake is one of the important phenomena in this field. This paper focuses on understanding the effect of angle of attack (α) on wake characteristics behind single horizontal axis wind turbines (HAWT). This was done by design three rotors different from each other in value of α used in the rotor design process. Values of α were (4.8˚,9.5˚,19˚). The numerical simulations were conducted using Ansys Workbench 19- Fluent code; the used turbulence model was (k-ω SST). The results showed that best value for extracted wind energy was at α=19˚, spread distance of wak

... Show More
Crossref
View Publication Preview PDF
Publication Date
Sun Jul 03 2016
Journal Name
Journal Of The Faculty Of Medicine Baghdad
Comparative study of two different techniques for leak and bleeding prevention during laparoscopic sleeve gastrectomy

Background: Laparoscopic sleeve gastrectomy has gained more popularity as an independent bariatric procedure because laparoscopic sleeve gastrectomy was reported to be an effective, safe, and time-savingprocedure, leading to adequate weight loss for morbidly obese patients and becoming one of the most common procedures performed for the treatment of morbidly obese patients in the last few years until now.
Objectives: The aim of this study is to compare two different techniques of the reinforcement of staple line during LSG in the reduction of major complications (bleeding and leak).
Patients and methods: prospective randomized study of a consecutive series of 126 patients that underwent LSG between April 20

... Show More
Crossref
View Publication Preview PDF
Publication Date
Mon Aug 01 2016
Journal Name
Indonesian Journal Of Electrical Engineering And Computer Science
Wireless Indoor Localization Systems and Techniques: Survey and Comparative Study

<p>The popularity, great influence and huge importance made wireless indoor localization has a unique touch, as well its wide successful on positioning and tracking systems for both human and assists also contributing to take the lead from outdoor systems in the scope of the recent research works. In this work, we will attempt to provide a survey of the existing indoor positioning solutions and attempt to classify different its techniques and systems. Five typical location predication approaches (triangulation, fingerprinting, proximity, vision analysis and trilateration) are considered here in order to analysis and provide the reader a review of the recent advances in wireless indoor localization techniques and systems to hav

... Show More
Scopus (46)
Crossref (33)
Scopus Crossref
View Publication
Publication Date
Tue Nov 19 2024
Journal Name
Journal Of Baghdad College Of Dentistry
A Comparative Study between Flapped and Flapless Surgical Techniques in Dental Implant Stability According to Resonance Frequency Analysis

Background: Recent implant surgical approach aims to cause less trauma, invasiveness and pain as much as possible and to reduce patient and surgeon discomfort, time of surgery and time needed for functional implant loading. Flapless surgical techniques considered recently as one of the most popular techniques that may achieve these aims especially enhancing osseointegration and subsequently implant stability within less time than the traditional flapped surgical technique. So this study aimed to make a comparison between flapped and flapless surgical techniques in resulted implant stability according to resonance frequency analysis RFA and in duration of surgical operation. Materials and methods: A total of 26 patients with 41 implants (o

... Show More
Crossref (1)
Crossref
View Publication Preview PDF
Publication Date
Tue Mar 28 2023
Journal Name
International Journal Of Dentistry
The Effect of Different Obturation Techniques in Primary Teeth on the Apical Microleakage using Endoflas: A Comparative In Vitro Study

Objectives. This study was carried out to quantitatively evaluate and compare the sealing ability of Endoflas by using differentobturation techniques. Materials and Methods. After 42 extracted primary maxillary incisors and canines were decoronated, theircanals were instrumented with K files of size ranging from #15 to #50. In accordance with the obturation technique, the sampleswere divided into three experimental groups, namely, group I: endodontic pressure syringe, group II: modified disposable syringe,and group III: reamer technique, and two control groups. Dye extraction method was used for leakage evaluation. Data wereanalyzed using one-way ANOVA and Dunnett’s T3 post hoc tests. The level of significance was set at p<0:05. Results.

... Show More
Crossref (2)
Crossref
View Publication
Publication Date
Mon Jan 01 2024
Journal Name
Lecture Notes In Networks And Systems
Scopus Crossref
View Publication
Publication Date
Sat Dec 24 2022
Journal Name
Journal Of Legal Sciences
Legal System for Electoral Campaigns : A Comparative Study

Electoral campaigns are one of the stages of the electoral process, and it means the sum of the activities and activities carried out by the candidate or the political party within a period of time, usually one day or more before the polling date, according to the legislation. To vote for this candidate or party, and this process affects the results of the elections, whether parliamentary or presidential, because it targets the votes that lead the candidate or political party to a boost to the presidency of the state or the legislative authority, so that this right is not abused in promoting political ideas and visions, considering This is one of the branches of freedom of opinion and expression that is guaranteed by most constitutions.

... Show More
View Publication Preview PDF
Publication Date
Fri Dec 30 2022
Journal Name
Journal Of The College Of Education For Women
Constructing Imminent Carcinogenic Attack in English and Arabic Scientific Discourse: A Corpus-Based Contrastive Study

Cancer is one of the critical health concerns. Health authorities around the world have devoted great attention to cancer and cancer causing factors to achieve control against the increasing rate of cancer. Carcinogens are the most salient factors that are accused of causing a considerable rate of cancer cases. Scientists, in different fields of knowledge, keep warning people of the imminent attack of carcinogens which are surrounding people in the environment and may launch their attack at any moment. The present paper aims to investigate the linguistic construction of the imminent carcinogen attack in English and Arabic scientific discourse. Such an investigation contributes to enhancing the scientists’ awareness of the linguistic co

... Show More
Crossref
View Publication Preview PDF
Publication Date
Sun Aug 01 2021
Journal Name
Journal Of Mechanical Engineering Research And Developments
Slot Design Procedure for a NACA 4412 at High Angle of Attack

The main objective of the present work is to find a method increases the efficiency of the airfoil that is used for blade in wind turbine, wing in aircraft, propeller and helicopter (like NACA 4412). By overcoming the separation of flow at high angle of attacks, a slotted airfoil had been used and solved numerically through connecting the pressure side in the bottom surface with the suction side in the top surface of the airfoil to energize the separated flow. Slot exit, width and slope were considered as a parameters of slot configuration to determine the effective design of consideration. Reynolds number was taken as [1.6 x106 ] and the angle of attacks were ranged from (0o - 20o ). The numerical solution with Ansys Fluent commercial prog

... Show More
View Publication