Preferred Language
Articles
/
Cxc5-Y0BVTCNdQwCEStJ
Techniques for DDoS Attack in SDN: A Comparative Study
...Show More Authors

Abstract Software-Defined Networking (commonly referred to as SDN) is a newer paradigm that develops the concept of a software-driven network by separating data and control planes. It can handle the traditional network problems. However, this excellent architecture is subjected to various security threats. One of these issues is the distributed denial of service (DDoS) attack, which is difficult to contain in this kind of software-based network. Several security solutions have been proposed recently to secure SDN against DDoS attacks. This paper aims to analyze and discuss machine learning-based systems for SDN security networks from DDoS attack. The results have indicated that the algorithms for machine learning can be used to detect DDoS attacks in SDN efficiently. From machine learning approaches, it can be explored that the best way to detect DDoS attack is based on utilizing deep learning procedures.Moreover, analyze the methods that combine it with other machine learning techniques. The most benefits that can be achieved from using the deep learning methods are the ability to do both feature extraction along with data classification; the ability to extract the specific information from partial data. Nevertheless, it is appropriate to recognize the low-rate attack, and it can get more computation resources than other machine learning where it can use graphics processing unit (GPU) rather than central processing unit (CPU) for carrying out the matrix operations, making the processes computationally effective and fast.

Crossref
View Publication
Publication Date
Mon Jan 01 2018
Journal Name
Journal Of The College Of Languages (jcl)
Analysis of the symbolic images in the work of Mexican theater of: "all cats are brown," the writer Carlos Fuentes and "Palinuro on the stairs," the writer Fernando del Paso
...Show More Authors

 This article briefly analyzing contemporary works appeared in theater writer from Latin America, which comes within the theme of "power." Latin American Literature, such as two-way extremely clear: the vanguard of social and attention, have arrived at certain moments to some extent be regarded as a two-way rival. That desire to participate in the revolution of expression and artistic significance, has appeared evident in the literature of Latin America in the late nineteenth century and ended in the third decade of the twentieth century. The writers that stage would prefer not to serve the objectives of the revolution of Arts own but the objectives of social and political revolution that stimulate the world. These acts were issued

... Show More
View Publication Preview PDF
Publication Date
Wed Jun 01 2011
Journal Name
Al Mustansiriyah Journal Of Pharmaceutical Sciences
Comparing the clinical efficacy and safety of high doses of beclomethasone inhaler with medium doses of beclomethasone inhaler combined with oral aminophylline or montelukast tablets in persistent asthmatic Iraqi patients.
...Show More Authors

Asthma is a chronic inflammatory disorder of the airways in which many cells and cellular elements play a role. The treatment guidelines recommend theuse of a second controller drug in addition to medium doses of inhaled corticosteroids (ICSs) rather than the use of high doses ICS alone in the treatment of moderate-severe persistent asthma. This study was conducted to compare the clinical efficacy and safety of three treatment regimens in Iraqi patients with moderate-severe persistent asthma.The study included three groups; each group included 15 patients. Patients were administered beclomethasone inhaler alone 1500-2000 μg/day, beclomethasone inhaler 750-1000 μg/day plus oral controlled release aminophylline tablets 450 mg/day or

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jun 01 2018
Journal Name
Journal Of The College Of Languages (jcl)
L’imaginaire de l’épidémie dans La Peste d’Albert Camus et Le Choléra de Nazik al-Malaika The Imagination of Epidemic in Alber Kamo's Novel " Plague" and Nazik Al-Malaekah's poem "Cholera"
...Show More Authors

The present study deals with the story of Epidemic in two literary works issued in the same year (1947). One of them is a novel titled "Plague" written by the French writer Alber Kamo, the second is a poem of the Iraqi poetess Nazik Al-Malaekah. The research reflects a contrastive study of the war vision in the two works as both writers used science to serve literature by using Epidemic as a metaphor to refer to the dangers that the societies faced.

The problem of the present research lies in answering the question about the reason that makes the two writers use metaphor while narrating the issues of the society instead of mentioning them directly and illuminate what implications do the narrative style of Epidemic story have and

... Show More
View Publication Preview PDF
Publication Date
Fri Mar 01 2024
Journal Name
International Immunopharmacology
Evaluation of interleukins (IL-1α, IL-1Ra, IL-12, IL-17A, IL-31, and IL-33) and chemokines (CXCL10 and CXCL16) in the serum of male patients with ankylosing spondylitis
...Show More Authors

View Publication
Scopus (5)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Sun Jan 02 2022
Journal Name
Journal Of The College Of Languages (jcl)
Word-Formation System And Its Influence On The Translation Of New Vocabulary In Russian And Arabic: Словообразовательная Система И Ее Влияние На Перевод Новой Лексики В Русском И Арабском Языках
...Show More Authors

Derivational word formation process is one of the most substantial linguistic procedures that solves many problems in the translation of the language new vocabulary and helps to comprehend the smallest language component that not simply semantically and structurally explain the elements  of both Russian and Arabic but also enables translators to comprehend the derivational method procedures of both languages. It also reveals the structural aspects of translation equivalences, cognitive and semantic foundations of translation. The rapid development of languages and the appearance of a new vocabulary like ṭabaʿa "print → ṭābiʿat "printer", kataba "to write" → kātib → kātibat, rafaʿa "to raise" → rāfiʿat "a crane" d

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jan 01 2025
Journal Name
Open Veterinary Journal
<b>Antimicrobial susceptibility patterns of infective <i>Streptococci</i> recovered from local and imported mozzarella cheese from different markets in Baghdad</b>
...Show More Authors

Background: This research identified Streptococci spp. depending on culture, biochemistry, the VITEK technique, ability to produce biofilms, and antibiotic resistance. Aim: The goal of this study was to perform microbiological procedures to evaluate the qualitative qualities of mozzarella cheese against infective Streptococci using microbiological care. Methods: Sixty (60) mozzarella cheese samples were brought from diverse markets in Baghdad from October 2023 to December 2023 at the Zoonoses Research Unit and Veterinary Public Health Department, Veterinary Medicine College, University of Baghdad. Culture of samples on agar (MacConkey and blood) and aerobically incubated at 37°C for 48 hours. Gram staining purified colonies to

... Show More
View Publication Preview PDF
Publication Date
Tue Mar 31 2015
Journal Name
Al-khwarizmi Engineering Journal
Influence of Coating with Some Natural Based Materials on the Erosion Wear Behavior of Glass Fiber Reinforced Epoxy Resin
...Show More Authors

Abstract 

In the present study, composites were prepared by Hand lay-up molding. The composites constituents were epoxy resin as a matrix, 6% volume fractions of glass fibers (G.F) as reinforcement and 3%, 6% volume fractions of preparation natural material (Rice Husk Ash, Carrot Powder, and Sawdust) as filler. Studied the erosion wear behavior and coating by natural wastes (Rice Husk Ash) with epoxy resin after erosion. The results showed the non – reinforced epoxy have lower resistance erosion than natural based material composites and the specimen (Epoxy+6%glass fiber+6%RHA) has higher resistance erosion than composites reinforced with carrot powder and sawdust  at 30cm , angle 60

... Show More
View Publication Preview PDF
Publication Date
Fri Feb 21 2025
Journal Name
2025 First International Conference On Advances In Computer Science, Electrical, Electronics, And Communication Technologies (ce2ct)
Enhancing Cloud Security Implementing AI-Based Intrusion Detection Systems
...Show More Authors

The increasing complexity of assaults necessitates the use of innovative intrusion detection systems (IDS) to safeguard critical assets and data. There is a higher risk of cyberattacks like data breaches and unauthorised access since cloud services have been used more frequently. The project's goal is to find out how Artificial Intelligence (AI) could enhance the IDS's ability to identify and classify network traffic and identify anomalous activities. Online dangers could be identified with IDS. An intrusion detection system, or IDS, is required to keep networks secure. We must create efficient IDS for the cloud platform as well, since it is constantly growing and permeating more aspects of our daily life. However, using standard intrusion

... Show More
View Publication
Crossref (1)
Scopus Crossref
Publication Date
Tue Aug 24 2021
Journal Name
Conference: The 5th International Multi-conference On Artificial Intelligence Technology (mcait 2021).
Text Encryption Based on DNA Cryptography, RNA, and Amino Acid
...Show More Authors

To achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DN

... Show More
Publication Date
Thu Jun 04 2020
Journal Name
Journal Of Discrete Mathematical Sciences And Cryptography
User authentication system based specified brain waves
...Show More Authors

A security system can be defined as a method of providing a form of protection to any type of data. A sequential process must be performed in most of the security systems in order to achieve good protection. Authentication can be defined as a part of such sequential processes, which is utilized in order to verify the user permission to entree and utilize the system. There are several kinds of methods utilized, including knowledge, and biometric features. The electroencephalograph (EEG) signal is one of the most widely signal used in the bioinformatics field. EEG has five major wave patterns, which are Delta, Theta, Alpha, Beta and Gamma. Every wave has five features which are amplitude, wavelength, period, speed and frequency. The linear

... Show More
Scopus (7)
Scopus