Abstract Software-Defined Networking (commonly referred to as SDN) is a newer paradigm that develops the concept of a software-driven network by separating data and control planes. It can handle the traditional network problems. However, this excellent architecture is subjected to various security threats. One of these issues is the distributed denial of service (DDoS) attack, which is difficult to contain in this kind of software-based network. Several security solutions have been proposed recently to secure SDN against DDoS attacks. This paper aims to analyze and discuss machine learning-based systems for SDN security networks from DDoS attack. The results have indicated that the algorithms for machine learning can be used to detect DDoS attacks in SDN efficiently. From machine learning approaches, it can be explored that the best way to detect DDoS attack is based on utilizing deep learning procedures.Moreover, analyze the methods that combine it with other machine learning techniques. The most benefits that can be achieved from using the deep learning methods are the ability to do both feature extraction along with data classification; the ability to extract the specific information from partial data. Nevertheless, it is appropriate to recognize the low-rate attack, and it can get more computation resources than other machine learning where it can use graphics processing unit (GPU) rather than central processing unit (CPU) for carrying out the matrix operations, making the processes computationally effective and fast.
A (b,t)-blocking set B in PG(2,q) is set of b points such that every line of PG(2,q) intersects B in at least t points and there is a line intersecting B in exactly t points. In this paper we construct a minimal (b,t)-blocking sets, t = 1,2,3,4,5 in PG(2,5) by using conics to obtain complete arcs and projective codes related with them.
The study aims to set an image to the mechanisms of the skills of the 21st century in the educational competencies of the basic education stage. To achieve this aim, a qualitative research design has been adopted in its analytical content analysis way. The study has arrived to the following conclusions: the availability of: the communicative and team work skills with a percentage of 25.9%, linguistic competency with a percentage of 24.6%, the skills of local and global citizenship, creativity, and problem solving with a percentage of 13.6%, critical thinking with a percentage of 10.38%, technological culture with a percentage of 5.8%, pioneerism and initiativeness with a percentage of 10.38%, technological culture with a percentage of
... Show MoreA robust and sensitive analytical method is presented for the extraction and determination of six pharmaceuticals in freshwater sediments.
The Ciliophoran Trichodina magna Van As and Basson, 1989 is recorded for the first time in in Iraq from gills of the blue tilapia Oreochromis aureus (Steindachner, 1864) Iraq from Al-Graiat location on the Tigris River at Baghdad city. The description and measurements of this external parasite as well as its illustrations are given.
One of the contemporary trends in education and training is the use of educational, competitive and digital games, because one of the most important goals of games is (motivation and challenge). Thus, it ensures the expected reaction from the recipient’s interaction with the game, so we seek his interaction with the content he receives. It is no secret that games distance him from boring content and introduce him to the world of motivation by integrating them with magical elements that make an attractive and desirable game. Naturally, in the case of stimuli and motives that activate the recipient within the context of the educational process procedures, the return is high and especially enjoyable. The aim of the research is to pre
... Show MoreThis research aims to clarify the importance of an accounting information system that uses artificial intelligence to detect earnings manipulation. The research problem stems from the widespread manipulation of earning in economic entities, especially at the local level, exacerbated by the high financial and administrative corruption rates in Iraq due to fraudulent accounting practices. Since earning manipulation involves intentional fraudulent acts, it is necessary to implement preventive measures to detect and deter such practices. The main hypothesis of the research assumes that an accounting information system based on artificial intelligence cannot effectively detect the manipulation of profits in Iraqi economic entities. The researche
... Show MoreThe goal of the study is to discover the best model for forecasting the exchange rate of the US dollar against the Iraqi dinar by analyzing time series using the Box Jenkis approach, which is one of the most significant subjects in the statistical sciences employed in the analysis. The exchange rate of the dollar is considered one of the most important determinants of the relative level of the health of the country's economy. It is considered the most watched, analyzed and manipulated measure by the government. There are factors affecting in determining the exchange rate, the most important of which are the amount of money, interest rate and local inflation global balance of payments. The data for the research that represents the exchange r
... Show More Five fish species were collected from Tigris river at Al-Adhamiyah region, Baghdad during the period from September to December 2011. These fishes were examined for ectoparasites. They were infected with 13 species of parasites which included one species of ciliated protozoans and 12 species of monogeneans. Among such parasites, Ligophorus imitans Euzet et Suriano, 1977 is reported for the first time in Iraq. In addition, eight new host records in Iraq were reported in the present study.