Preferred Language
Articles
/
Cxc5-Y0BVTCNdQwCEStJ
Techniques for DDoS Attack in SDN: A Comparative Study
...Show More Authors

Abstract Software-Defined Networking (commonly referred to as SDN) is a newer paradigm that develops the concept of a software-driven network by separating data and control planes. It can handle the traditional network problems. However, this excellent architecture is subjected to various security threats. One of these issues is the distributed denial of service (DDoS) attack, which is difficult to contain in this kind of software-based network. Several security solutions have been proposed recently to secure SDN against DDoS attacks. This paper aims to analyze and discuss machine learning-based systems for SDN security networks from DDoS attack. The results have indicated that the algorithms for machine learning can be used to detect DDoS attacks in SDN efficiently. From machine learning approaches, it can be explored that the best way to detect DDoS attack is based on utilizing deep learning procedures.Moreover, analyze the methods that combine it with other machine learning techniques. The most benefits that can be achieved from using the deep learning methods are the ability to do both feature extraction along with data classification; the ability to extract the specific information from partial data. Nevertheless, it is appropriate to recognize the low-rate attack, and it can get more computation resources than other machine learning where it can use graphics processing unit (GPU) rather than central processing unit (CPU) for carrying out the matrix operations, making the processes computationally effective and fast.

Crossref
View Publication
Publication Date
Wed Jan 01 2025
Journal Name
Open Veterinary Journal
<b>Antimicrobial susceptibility patterns of infective <i>Streptococci</i> recovered from local and imported mozzarella cheese from different markets in Baghdad</b>
...Show More Authors

Background: This research identified Streptococci spp. depending on culture, biochemistry, the VITEK technique, ability to produce biofilms, and antibiotic resistance. Aim: The goal of this study was to perform microbiological procedures to evaluate the qualitative qualities of mozzarella cheese against infective Streptococci using microbiological care. Methods: Sixty (60) mozzarella cheese samples were brought from diverse markets in Baghdad from October 2023 to December 2023 at the Zoonoses Research Unit and Veterinary Public Health Department, Veterinary Medicine College, University of Baghdad. Culture of samples on agar (MacConkey and blood) and aerobically incubated at 37°C for 48 hours. Gram staining purified colonies to

... Show More
View Publication Preview PDF
Publication Date
Wed Jan 11 2023
Journal Name
College Of Islamic Sciences
The jurisprudential aspects of Imam Abu al-Fayyadh al-Basri And its impact on the Shafi’i school of thought, In the provisions of transactions, personal status, felonies, borders, and others
...Show More Authors

Summary of the discussion of the jurisprudential aspects of Imam Abu Al-Fayyad Al-Basri, and their impact on the Shafi’i school, on the provisions of transactions, personal status, janaabah, limits, and others

      Praise be to God, Lord of the Worlds, and prayers and peace be upon the Master of the Messengers, our master Muhammad, and upon his pure family, and his ignorant and ignorant companions, and those who followed them in goodness until the Day of Judgment.

     Then:

     The many jurisprudential aspects that the Shafi’i imams said are of great importance, because these aspects are nothing but the opinions of venerable jurists who have reached a high degree of knowledge unti

... Show More
View Publication Preview PDF
Publication Date
Fri Mar 01 2024
Journal Name
International Immunopharmacology
Evaluation of interleukins (IL-1α, IL-1Ra, IL-12, IL-17A, IL-31, and IL-33) and chemokines (CXCL10 and CXCL16) in the serum of male patients with ankylosing spondylitis
...Show More Authors

View Publication
Scopus (5)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Sun Jan 02 2022
Journal Name
Journal Of The College Of Languages (jcl)
Word-Formation System And Its Influence On The Translation Of New Vocabulary In Russian And Arabic: Словообразовательная Система И Ее Влияние На Перевод Новой Лексики В Русском И Арабском Языках
...Show More Authors

Derivational word formation process is one of the most substantial linguistic procedures that solves many problems in the translation of the language new vocabulary and helps to comprehend the smallest language component that not simply semantically and structurally explain the elements  of both Russian and Arabic but also enables translators to comprehend the derivational method procedures of both languages. It also reveals the structural aspects of translation equivalences, cognitive and semantic foundations of translation. The rapid development of languages and the appearance of a new vocabulary like ṭabaʿa "print → ṭābiʿat "printer", kataba "to write" → kātib → kātibat, rafaʿa "to raise" → rāfiʿat "a crane" d

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Apr 01 2017
Journal Name
International Journal Of Science And Research
Evaluating the Behavior of Ring Footing on Two-Layered Soil Subjected to Inclined Load
...Show More Authors

Evaluating the behavior of a ring foundation resting on multi-layered soil is one of the important issues facing civil engineers. Many researchers have studied the behavior of ring foundation rests on multi-layered soil with vertical loads acting on the foundation. In real life ring foundation can be subjected to both vertical and horizontal loads at the same time due to wind or the presence of soil. In this research, the behavior of ring footing subjected to inclined load has been studied using PLAXIS software. Furthermore, the effect of multi-layered soil has been simulated in the model. The results showed that both vertical and horizontal stresses are mainly affected when the inclination angle of the load exceeded 45 degrees with a reduc

... Show More
Publication Date
Mon Oct 13 2025
Journal Name
Mesopotamian Journal Of Cybersecurity
Improvement of the Face Recognition Systems Security Against Morph Attacks using the Developed Siamese Neural Network
...Show More Authors

Face Recognition Systems (FRS) are increasingly targeted by morphing attacks, where facial features of multiple individuals are blended into a synthetic image to deceive biometric verification. This paper proposes an enhanced Siamese Neural Network (SNN)-based system for robust morph detection. The methodology involves four stages. First, a dataset of real and morphed images is generated using StyleGAN, producing high-quality facial images. Second, facial regions are extracted using Faster Region-based Convolutional Neural Networks (R-CNN) to isolate relevant features and eliminate background noise. Third, a Local Binary Pattern-Convolutional Neural Network (LBP-CNN) is used to build a baseline FRS and assess its susceptibility to d

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Fri Feb 21 2025
Journal Name
2025 First International Conference On Advances In Computer Science, Electrical, Electronics, And Communication Technologies (ce2ct)
Enhancing Cloud Security Implementing AI-Based Intrusion Detection Systems
...Show More Authors

The increasing complexity of assaults necessitates the use of innovative intrusion detection systems (IDS) to safeguard critical assets and data. There is a higher risk of cyberattacks like data breaches and unauthorised access since cloud services have been used more frequently. The project's goal is to find out how Artificial Intelligence (AI) could enhance the IDS's ability to identify and classify network traffic and identify anomalous activities. Online dangers could be identified with IDS. An intrusion detection system, or IDS, is required to keep networks secure. We must create efficient IDS for the cloud platform as well, since it is constantly growing and permeating more aspects of our daily life. However, using standard intrusion

... Show More
View Publication
Scopus Crossref
Publication Date
Tue Aug 24 2021
Journal Name
Conference: The 5th International Multi-conference On Artificial Intelligence Technology (mcait 2021).
Text Encryption Based on DNA Cryptography, RNA, and Amino Acid
...Show More Authors

To achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DN

... Show More
Publication Date
Thu Jun 04 2020
Journal Name
Journal Of Discrete Mathematical Sciences And Cryptography
User authentication system based specified brain waves
...Show More Authors

A security system can be defined as a method of providing a form of protection to any type of data. A sequential process must be performed in most of the security systems in order to achieve good protection. Authentication can be defined as a part of such sequential processes, which is utilized in order to verify the user permission to entree and utilize the system. There are several kinds of methods utilized, including knowledge, and biometric features. The electroencephalograph (EEG) signal is one of the most widely signal used in the bioinformatics field. EEG has five major wave patterns, which are Delta, Theta, Alpha, Beta and Gamma. Every wave has five features which are amplitude, wavelength, period, speed and frequency. The linear

... Show More
Scopus (7)
Scopus
Publication Date
Wed Sep 18 2019
Journal Name
مجلة الدراسات الدولية
The media message of ISIS: The content of the discourse and the mechanisms of media confrontation. The media message of ISIS: The content of the discourse and the mechanisms of media confrontation.
...Show More Authors

يهدف البحث الى صياغة استراتيجية اعلامية لمواجهة اعلام التنظيمات الارهابية

Preview PDF