Abstract Software-Defined Networking (commonly referred to as SDN) is a newer paradigm that develops the concept of a software-driven network by separating data and control planes. It can handle the traditional network problems. However, this excellent architecture is subjected to various security threats. One of these issues is the distributed denial of service (DDoS) attack, which is difficult to contain in this kind of software-based network. Several security solutions have been proposed recently to secure SDN against DDoS attacks. This paper aims to analyze and discuss machine learning-based systems for SDN security networks from DDoS attack. The results have indicated that the algorithms for machine learning can be used to detect DDoS attacks in SDN efficiently. From machine learning approaches, it can be explored that the best way to detect DDoS attack is based on utilizing deep learning procedures.Moreover, analyze the methods that combine it with other machine learning techniques. The most benefits that can be achieved from using the deep learning methods are the ability to do both feature extraction along with data classification; the ability to extract the specific information from partial data. Nevertheless, it is appropriate to recognize the low-rate attack, and it can get more computation resources than other machine learning where it can use graphics processing unit (GPU) rather than central processing unit (CPU) for carrying out the matrix operations, making the processes computationally effective and fast.
In this paper, we develop the work of Ghawi on close dual Rickart modules and discuss y-closed dual Rickart modules with some properties. Then, we prove that, if are y-closed simple -modues and if -y-closed is a dual Rickart module, then either Hom ( ) =0 or . Also, we study the direct sum of y-closed dual Rickart modules.
The preliminary test of the compounds N [2– (3,4–dimethoxy nitrobenzene oxazepine– 2,3–dihydro–4,7–dione]–5–mercupto–2–amino–1,3,4–thiadiazol [A] and N [ 2–anthralidene– 5– ( 2–nitrophenyl ) –1,3–oxazepine–4,7–dione–2–d](5–mercapto–1,3,4–thiadiazole–2–amin) [B] , showed that they possess high activity against some positive and negative bacteria , like pseudomonas aeruginosa (pseudo.), Escherichia coli (E-coli), staphylococcus aureus (sta.) and Bacillus subtilis (Ba.) and finally there is a study of the effect of some antibiotics like streptomyci
... Show MoreThe research is a vision of the future of industry in Iraq, so it is may be outside the ceiling of the capabilities of the Iraqi economy, and therefore it is exaggerated. Therefore, future plans must be applicable through the availability of capabilities. Everyone knows that the financial and administrative corruption and mismanagement of resources are the main cause of the inefficiency of the industrial sector, and the failure to exercise its real role in achieving economic development.; as well as the political situation and the dominance of parties and their insistence on addressing positions that have a strong relationship in managing the economic sector that has a significant impact on drawing the economic map in its current
... Show MoreMultiple applications use offline handwritten signatures for human verification. This fact increases the need for building a computerized system for signature recognition and verification schemes to ensure the highest possible level of security from counterfeit signatures. This research is devoted to developing a system for offline signature verification based on a combination of local ridge features and other features obtained from applying two-level Haar wavelet transform. The proposed system involves many preprocessing steps that include a group of image processing techniques (including: many enhancement techniques, region of interest allocation, converting to a binary image, and Thinning). In feature extraction and
... Show MoreThe chemical additives used to enhance the properties of drilling mud cause damage to humans and the environment. Therefore, it is necessary to search for alternative additives to add them to the drilling mud. Thus, this study investigates the effects of pomegranate peel and grape seed powders as natural waste when added to un-weighted water-based mud. The test includes measurements of the rheological properties and filtration, as well as the alkanity and density of the drilling mud. The results showed a decrease in PH values with an increase in the concentrations of pomegranate peel or grapeseed, and a decrease in mud density with an increase in powders of pomegranate peel and grape seed concentrations that resulted f
... Show Moreيتكون الانحدار المقسم من عدة أقسام تفصل بينها نقاط انتماء مختلفة، فتظهر حالة عدم التجانس الناشئة من عملية فصل الأقسام ضمن عينة البحث. ويهتم هذا البحث في تقدير موقع نقطة التغيير بين الأقسام وتقدير معلمات الأنموذج، واقتراح طريقة تقدير حصينة ومقارنتها مع بعض الطرائق المستعملة في الانحدار الخطي المقسم. وقد تم استعمال أحد الطرائق التقليدية (طريقة Muggeo) لإيجاد مقدرات الإمكان الأعظم بالأسلوب الت
... Show MoreIrrigation scheduling techniques is one of the suggested solutions for water scarcity problem. The study aims to show the possibility of using practical and applicable irrigation scheduling program which was designed by Water Resources Department at the University of Baghdad by using Spreadsheet Formulas for Microsoft Excel program, version 2007, with some modification to generalize it and made it applicable to various climatic zone and different soil types, as a salvation for the shortage of irrigation water inside the irrigation projects. Irrigation projects which incidence of Tigris River basin will be taken as an applicable example. This program was based on water budgeting and programmed depending on scientific concepts which facili
... Show MoreToday the Genetic Algorithm (GA) tops all the standard algorithms in solving complex nonlinear equations based on the laws of nature. However, permute convergence is considered one of the most significant drawbacks of GA, which is known as increasing the number of iterations needed to achieve a global optimum. To address this shortcoming, this paper proposes a new GA based on chaotic systems. In GA processes, we use the logistic map and the Linear Feedback Shift Register (LFSR) to generate chaotic values to use instead of each step requiring random values. The Chaos Genetic Algorithm (CGA) avoids local convergence more frequently than the traditional GA due to its diversity. The concept is using chaotic sequences with LFSR to gene
... Show MoreNew mixed ligand complexes of some metal ions Zn(II), Cd(II) and Hg(II) were prepared by reacting with mixture of two bidentate ligands [ HL = (P-methyl anilino) –P– chloro phenyl acetonitrile and en = ethylene diamine] in a molar ratio of 1:1:1[ M : HL : en] in ethanol . The ligand HL was previously prepared by Strecker’s procedure which includes the reaction of p- toluidine with P- chlorobenzaldehyde in the presence of KCN in acidic medium. The structures of new compounds were identified by elemental analyses, atomic absorption and thermal analyses TG/DTG in addition to FTIR and U.V-VIS. Spectra. The electrical conductivity measurements of metal complexes were also determined. From the obtained data the octahedral structure was s
... Show MoreThe effect of short range correlations on the inelastic longitudinal Coulomb form
factors for the lowest four excited 2+ states in 18O is analyzed. This effect (which
depends on the correlation parameter β) is inserted into the ground state charge
density distribution through the Jastrow type correlation function. The single particle
harmonic oscillator wave function is used with an oscillator size parameter b. The
parameters β and b are, considered as free parameters, adjusted for each excited state
separately so as to reproduce the experimental root mean square charge radius of
18O. The model space of 18O does not contribute to the transition charge density. As
a result, the inelastic Coulomb form factor of 18