Abstract Software-Defined Networking (commonly referred to as SDN) is a newer paradigm that develops the concept of a software-driven network by separating data and control planes. It can handle the traditional network problems. However, this excellent architecture is subjected to various security threats. One of these issues is the distributed denial of service (DDoS) attack, which is difficult to contain in this kind of software-based network. Several security solutions have been proposed recently to secure SDN against DDoS attacks. This paper aims to analyze and discuss machine learning-based systems for SDN security networks from DDoS attack. The results have indicated that the algorithms for machine learning can be used to detect DDoS attacks in SDN efficiently. From machine learning approaches, it can be explored that the best way to detect DDoS attack is based on utilizing deep learning procedures.Moreover, analyze the methods that combine it with other machine learning techniques. The most benefits that can be achieved from using the deep learning methods are the ability to do both feature extraction along with data classification; the ability to extract the specific information from partial data. Nevertheless, it is appropriate to recognize the low-rate attack, and it can get more computation resources than other machine learning where it can use graphics processing unit (GPU) rather than central processing unit (CPU) for carrying out the matrix operations, making the processes computationally effective and fast.
The science of jurisprudence is one of the legal sciences that scholars have been interested in since the first centuries of Islam, and they wrote many books about it, and the science of manuscripts is considered one of the scientific achievements in which many scholars emerged, including Imam Al-Samaani, so I chose this manuscript related to Istism to clarify its concept and meaning for all people, The student (Ali Ahmed Abdel-Aziz Sheikh Hamad) preceded me in the investigation of part of the book, and it was facilitated for me, by the grace of God Almighty, to investigate the issue (if one of the Muslim spouses apostatized and one of the infidel spouses converted to Islam until the end of the issue of if the two spouses were taken capt
... Show MoreIn structural construction fields, reducing the overall self-weight of the structure is considered a primary objective and substantial challenge in the civil engineering field, particularly in earthquake-affected buildings and tall buildings. Different techniques were implemented to attain this goal; one of them is setting voids in a specific position through the structure, just like a voided slab or BubbleDeck slab. The main objective of this research is to study the structural behavior of BubbleDeck reinforced concrete slabs under the effect of static uniformly distributed load. The experimental program involved testing five fixed-end supported two-way solid and BubbleDeck slabs of dimensions 2500×2500×200 mm. The considered par
... Show MoreHemorrhagic insult is a major source of morbidity and mortality in both adults and newborn babies in the developed countries. The mechanisms underlying the non-traumatic rupture of cerebral vessels are not fully clear, but there is strong evidence that stress, which is associated with an increase in arterial blood pressure, plays a crucial role in the development of acute intracranial hemorrhage (ICH), and alterations in cerebral blood flow (CBF) may contribute to the pathogenesis of ICH. The problem is that there are no effective diagnostic methods that allow for a prognosis of risk to be made for the development of ICH. Therefore, quantitative assessment of CBF may significantly advance the underst
With the increased development in digital media and communication, the need for methods to protection and security became very important factor, where the exchange and transmit date over communication channel led to make effort to protect these data from unauthentication access.
This paper present a new method to protect color image from unauthentication access using watermarking. The watermarking algorithm hide the encoded mark image in frequency domain using Discrete Cosine Transform. The main principle of the algorithm is encode frequent mark in cover color image. The watermark image bits are spread by repeat the mark and arrange in encoded method that provide algorithm more robustness and security. The propos
... Show MoreOne of the contemporary trends in education and training is the use of educational, competitive and digital games, because one of the most important goals of games is (motivation and challenge). Thus, it ensures the expected reaction from the recipient’s interaction with the game, so we seek his interaction with the content he receives. It is no secret that games distance him from boring content and introduce him to the world of motivation by integrating them with magical elements that make an attractive and desirable game. Naturally, in the case of stimuli and motives that activate the recipient within the context of the educational process procedures, the return is high and especially enjoyable. The aim of the research is to pre
... Show MoreObjectives: To evaluate the effect of non-pharmacological pain relief methods on duration of labor stage.Methodology: A quasi-experimental study design was conducted during the period of (4th July 2018 through 24th October 2018) on non-probability of (60) women (30) of them were a control group and (30) were the study group whom admitted to Al-Elwyia Maternity Teaching Hospital suffering from labor pain. A questionnaire was used as a tool of data collection Descriptive& Inferential statistical analyses were used to analyze the data.Result: The highest percentages of study and control groups were in age group (< 20) years old, primary schools graduates, housewife, from "urban area", within low category of socioeconomic scale,
... Show MoreThe research topic dealt with the strategic recovery of the insurance service, which is one of the approaches that have an important role in providing solutions and remedies for the recession that affects companies and hinders them from achieving their strategic goals. The research also addressed the strategic objectives of the company as the rationale and actual guide for companies of all activities in order to protect their systems from deviation for its desired purpose. So the aim of the research is to demonstrate the repercussions of the strategic recovery of the insurance Service represented by (compensation, speed of response, apology, initiative (identifying the problem). The company's strategic goals are represented (prof
... Show MoreBackground: The timing of eruption of permanent teeth is of considerable importance to the dental health planning for diagnostic, preventive and therapeutic measures for children and teenagers. The purposes of this study were to determine timing of maxillary and mandibular permanent teeth emergence (except third molars) and to evaluate the effect nutritional status by anthropometric measures on the eruption time of permanent teeth, investigations had been done according to jaw and gender variations. Materials and Methods: This study was conducted among four to fifteen years old children and teenagers from kindergarten and schools in Basrah city in the south region of Iraq. The total sample composed of 1807 children and teenagers that were
... Show MoreThe problem of research is that there are differences between learners in processing in formation in general and there is variation at the learners level perform scrolling skill of the passes up and down by the volley ball .Therefore the researchers decided to conduct astudy through which identify the relationship between information processing and the skill of scrolling from the top and bottom by the volleyball. The researchers used the descriptive approach by themethod of interconnectivity .Asampleconsist of21 students from first staye in collage of physical education and sports science for Girls(university of Baghdad) and attest has been applied(process information and scroll up and down) on the research sample after the required
... Show More