Preferred Language
Articles
/
Cxc5-Y0BVTCNdQwCEStJ
Techniques for DDoS Attack in SDN: A Comparative Study
...Show More Authors

Abstract Software-Defined Networking (commonly referred to as SDN) is a newer paradigm that develops the concept of a software-driven network by separating data and control planes. It can handle the traditional network problems. However, this excellent architecture is subjected to various security threats. One of these issues is the distributed denial of service (DDoS) attack, which is difficult to contain in this kind of software-based network. Several security solutions have been proposed recently to secure SDN against DDoS attacks. This paper aims to analyze and discuss machine learning-based systems for SDN security networks from DDoS attack. The results have indicated that the algorithms for machine learning can be used to detect DDoS attacks in SDN efficiently. From machine learning approaches, it can be explored that the best way to detect DDoS attack is based on utilizing deep learning procedures.Moreover, analyze the methods that combine it with other machine learning techniques. The most benefits that can be achieved from using the deep learning methods are the ability to do both feature extraction along with data classification; the ability to extract the specific information from partial data. Nevertheless, it is appropriate to recognize the low-rate attack, and it can get more computation resources than other machine learning where it can use graphics processing unit (GPU) rather than central processing unit (CPU) for carrying out the matrix operations, making the processes computationally effective and fast.

Crossref
View Publication
Publication Date
Fri Dec 01 2023
Journal Name
Iop Conference Series: Earth And Environmental Science
The Effect of Power Sources in the Agricultural Tractor and the Developed Sprayer System on the Performance of the Electrical and Mechanical Sprayer System and some Performance Indicators of the Engine
...Show More Authors
Abstract<p>An experiment was conducted to study the effect of the sprayer type according to the source of power and the size of the spray nozzle concerning the quality of the spray produced and fuel consumption.Two types of sprayers were used: a conventional boom sprayer (S1) and a modified (electrified) boom sprayer (S2), along with three sizes of the XR TeeJet 110 spray nozzle (N). The following technical performance indicators were examined: Density of coverage (drops/cm2) using ImageJ software, a 600dpi business card scanner, specifically the ScanShell 800N by CSSN, Inc, and water-sensitive paper (WSP), rate of spray nozzles discharge (ml/min), and fuel consumption (liters/hectare) using a c</p> ... Show More
View Publication
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Sun Jan 01 2017
Journal Name
Journal Of Cosmetics, Dermatological Sciences And Applications
Topical 40% &amp;lt;i&amp;gt;Loranthus europaeus&amp;lt;/i&amp;gt; Ointment as an Alternative Medicine in the Treatment of Acute Cutaneous Leishmaniasis versus Topical 25% Podophyllin Solution
...Show More Authors

View Publication
Crossref (2)
Crossref
Publication Date
Mon Jan 02 2017
Journal Name
Journal Of Educational And Psychological Researches
The Mathematical construct and its relationship with effective mathematical operations in both sides of the brain among students of the Department of Mathematics at the Colleges of Education and Basic Education
...Show More Authors

The current research aims to identify: 1. The level of mathematical construct among the Department of Mathematics students in the colleges of education and basic education. 2. The level of effective mathematical operations in both sides of the brain at the Department of Mathematics students in the colleges of education and basic education. 3. The strength and direction of the correlation between the mathematical construct and effective mathematical operations on both sides of the brain at the Department of Mathematics students in the colleges of Education and Basic Education. To investigate the research objectives, the researcher formulated zero-main hypothesis for each aim and from the same hypothesis, three sub-zero hypotheses are deri

... Show More
View Publication Preview PDF
Publication Date
Sun Dec 12 2010
Journal Name
Journal Of Planner And Development
Utilizing the resources of the local environment in the establishment of the constituent units of the urban fabric within the framework of preservation of the urban heritage (Hassan Fathi's model experiment)
...Show More Authors

No country in the world has an ancient heritage of its own. It represents the product of the civilizations left behind by previous eras. It represents the development of urban life and its capital of the interest of its people in the field of construction and reconstruction. The urban heritage and its associated arts may seem to be a material heritage at first glance, but it is not free from the spiritual side. Therefore, the nations in different parts of the earth cherish it and care for it with all due diligence, because it mixes with its history, memories and emotions.
This research discusses the use of local environment materials in the production of urban fabric constituents. I

... Show More
View Publication Preview PDF
Publication Date
Wed Jun 09 2021
Journal Name
Design Engineering
The Impact of Transforming the Educational System in Iraq from 6-3-3 to 4-4-4 on Educational Planning Standards and the Deficiency of School Buildings (Primary and Secondary Education)
...Show More Authors

&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Educational services in Iraq face many problems that have reduced the efficiency of the educational process, as a result of the difficult conditions experienced by educational services in Iraq. This led to the accumulation of these problems and their exacerbation significantly over the years, as there was no fundamental solution to these problems. The study proposes a planning method for managing the educational system in Iraq, especially for the primary and secondary levels, where these negative phenomena are very prominent, especially the deficit in school buildings and the phenomenon of overcrowding in classrooms. &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&am

... Show More
View Publication Preview PDF
Publication Date
Mon Dec 30 2019
Journal Name
College Of Islamic Sciences
The mother of the believers, the mother of Salamah and her narrators of jurisprudence In attaining the goal of the rulings evidence Ibn Hajar al-Asqalani (d. 852 AH)      (prayer book)
...Show More Authors

The Muslim woman actively participated in narrating, preserving, controlling and maintaining the hadith, along with her brother, the man who later became an inexhaustible representative of the effort to preserve, control, and narrate the Sunnah. Undoubtedly, the mothers of the believers, may God be pleased with them, had a great advantage in communicating Islam and spreading the Sunnah of the Prophet Especially among women, all of them heard from him, may God’s prayers and peace be upon him, and lived with him in the details of his life on the disparity between them in memorizing and narrating and publishing them. It narrated (378) recently, and it is considered the second narrator after the mother of the believers Aisha, may God be pl

... Show More
View Publication Preview PDF
Publication Date
Mon May 08 2017
Journal Name
Research Journal Of Pharmaceutical, Biological And Chemical Sciences
Structure, Diagnosis, and in the Vitro Antimicrobial evaluation of 2-amino pyridine-derived Ligand Schiff base and its complexes with Cu (II), Hg (II), Ni (II), Mn (II) and Co (II
...Show More Authors

Publication Date
Mon Jan 01 2018
Journal Name
Journal Of The College Of Languages (jcl)
Analisis de la metáfora en la poema " Noche oscura del alma" de San Juan de la Cruz Analysis metaphor in the poem "Dark Night of the Soul" John of the Cross
...Show More Authors

RESUMEN

 Una joven cuenta cómo, en plena noche, aprovechando la tranquilidad de esa hora, sale a escondidas de su casa y va a reunirse con su enamorado. Envuelta en la oscuridad, se deja dirigir por la luz de su propio amor hasta el lugar de la cita, donde la pasión de los amantes culmina. A continuación, relajados por la brisa nocturna, los amantes se adormecen, primero, el amado velado por la amada, por último, ella misma.

Amor entre dos enamorados. Unión mística de alma y Dios , aunque , de hecho , podría servirnos de clara exposición temática el subtitulo con que el poema suele publicarse en la tradición , tanto manuscrita como impresa : Canciones del alma que se goza d

... Show More
View Publication Preview PDF
Publication Date
Thu Jun 04 2020
Journal Name
Journal Of Discrete Mathematical Sciences And Cryptography
User authentication system based specified brain waves
...Show More Authors

A security system can be defined as a method of providing a form of protection to any type of data. A sequential process must be performed in most of the security systems in order to achieve good protection. Authentication can be defined as a part of such sequential processes, which is utilized in order to verify the user permission to entree and utilize the system. There are several kinds of methods utilized, including knowledge, and biometric features. The electroencephalograph (EEG) signal is one of the most widely signal used in the bioinformatics field. EEG has five major wave patterns, which are Delta, Theta, Alpha, Beta and Gamma. Every wave has five features which are amplitude, wavelength, period, speed and frequency. The linear

... Show More
Scopus (7)
Scopus
Publication Date
Tue Aug 24 2021
Journal Name
Conference: The 5th International Multi-conference On Artificial Intelligence Technology (mcait 2021).
Text Encryption Based on DNA Cryptography, RNA, and Amino Acid
...Show More Authors

To achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DN

... Show More