Preferred Language
Articles
/
Cxc5-Y0BVTCNdQwCEStJ
Techniques for DDoS Attack in SDN: A Comparative Study
...Show More Authors

Abstract Software-Defined Networking (commonly referred to as SDN) is a newer paradigm that develops the concept of a software-driven network by separating data and control planes. It can handle the traditional network problems. However, this excellent architecture is subjected to various security threats. One of these issues is the distributed denial of service (DDoS) attack, which is difficult to contain in this kind of software-based network. Several security solutions have been proposed recently to secure SDN against DDoS attacks. This paper aims to analyze and discuss machine learning-based systems for SDN security networks from DDoS attack. The results have indicated that the algorithms for machine learning can be used to detect DDoS attacks in SDN efficiently. From machine learning approaches, it can be explored that the best way to detect DDoS attack is based on utilizing deep learning procedures.Moreover, analyze the methods that combine it with other machine learning techniques. The most benefits that can be achieved from using the deep learning methods are the ability to do both feature extraction along with data classification; the ability to extract the specific information from partial data. Nevertheless, it is appropriate to recognize the low-rate attack, and it can get more computation resources than other machine learning where it can use graphics processing unit (GPU) rather than central processing unit (CPU) for carrying out the matrix operations, making the processes computationally effective and fast.

Crossref
View Publication
Publication Date
Mon Jan 01 2024
Journal Name
Fusion: Practice And Applications
A Hybrid Meta-Heuristic Approach for Test Case Prioritization and Optimization
...Show More Authors

The application of the test case prioritization method is a key part of system testing intended to think it through and sort out the issues early in the development stage. Traditional prioritization techniques frequently fail to take into account the complexities of big-scale test suites, growing systems and time constraints, therefore cannot fully fix this problem. The proposed study here will deal with a meta-heuristic hybrid method that focuses on addressing the challenges of the modern time. The strategy utilizes genetic algorithms alongside a black hole as a means to create a smooth tradeoff between exploring numerous possibilities and exploiting the best one. The proposed hybrid algorithm of genetic black hole (HGBH) uses the

... Show More
View Publication
Scopus (4)
Crossref (2)
Scopus Crossref
Publication Date
Mon Aug 01 2022
Journal Name
Baghdad Science Journal
A Case control study to determine Macrophage migration inhibitor, and N-telopeptides of type I bone collagen Levels in the sera of osteoporosis patients
...Show More Authors

This study focused on determining the markers of Macrophage migration inhibitor (MIF), as well as the N-telopeptides of type I bone collagen (NTX), and some other parameters (alkaline phosphatase (ALP), vitamin D (Vit D), calcium (Ca), phosphorus (P), and magnesium (Mg), and their correlation with other parameters in osteoporosis. One hundred ten subjects were involved in the current study. There were two groups of patients: group I (30) women with severe osteoporosis and group II (30) women with mild osteoporosis. For comparison, 50 apparently healthy individuals were included as a control. Serum levels of MIF, and NTX were significantly higher in groups I and II as compared to the control group, which indicate that these two parameters

... Show More
View Publication Preview PDF
Scopus (18)
Crossref (7)
Scopus Clarivate Crossref
Publication Date
Sun Feb 25 2024
Journal Name
Baghdad Science Journal
Prioritized Text Detergent: Comparing Two Judgment Scales of Analytic Hierarchy Process on Prioritizing Pre-Processing Techniques on Social Media Sentiment Analysis
...Show More Authors

Most companies use social media data for business. Sentiment analysis automatically gathers analyses and summarizes this type of data. Managing unstructured social media data is difficult. Noisy data is a challenge to sentiment analysis. Since over 50% of the sentiment analysis process is data pre-processing, processing big social media data is challenging too. If pre-processing is carried out correctly, data accuracy may improve. Also, sentiment analysis workflow is highly dependent. Because no pre-processing technique works well in all situations or with all data sources, choosing the most important ones is crucial. Prioritization is an excellent technique for choosing the most important ones. As one of many Multi-Criteria Decision Mak

... Show More
View Publication Preview PDF
Scopus (2)
Scopus Crossref
Publication Date
Mon Nov 05 2018
Journal Name
Iraqi National Journal Of Nursing Specialties
Effect of Mechanical Surface Treatment on the Tensile Bond Strength of Repaired Acrylic Denture Base Resin Cured by Two Different Techniques
...Show More Authors

Objective: To evaluate and compare the effect of mechanical surface treatment (groove, aluminum oxide particles)
with 45 degree bevel type of joint on tensile bond strength of acrylic specimens repaired by two curing methods
(microwave and water both).
Methodology: Eighty specimens (80) were prepared from pink heat cure acrylic resin. They were divided into two
main groups (40 specimen repaired by microwave energy and 40 specimens repaired by water bath method).Each
group can be divided into four subgroups of ten according to the surface treatment. The control group A was left
intact, group B received no surface treatment, group C and D received surface treatment by (groove, 50 m aluminum
oxide particles). Specimens

... Show More
View Publication Preview PDF
Publication Date
Fri Dec 15 2017
Journal Name
Journal Of Baghdad College Of Dentistry
The Effect of Insertion Rate on The Adaptability of Gutta-Percha and The Apical Extrusion of Thermoplasticized Gutta Percha Obturation Techniques.
...Show More Authors

Background: In the Thermafil as a root canal obturation, system little is known about the effect that varying rates of insertion have on the adaptability of thermoplasticized GP and the amount of apical extrusion. Materials and methods: thirty simulated root canals were obturated with thermafil obturators and Apexit Plus sealer at three different insertion rates. The obturated canals were sectioned at three different levels, the sealer average film thickness for each section was calculated and the amount of apical extrusion for each canal was conducted. Results: the higher adaptability was seen with the faster insertion rate while the slower insertion rate showed fewer tendencies to cause apical extrusion. Conclusions: the intermediate i

... Show More
View Publication
Crossref
Publication Date
Sat Feb 25 2017
Journal Name
International Journal On Advanced Science, Engineering And Information Technology
A Novel DNA Sequence Approach for Network Intrusion Detection System Based on Cryptography Encoding Method
...Show More Authors

A novel method for Network Intrusion Detection System (NIDS) has been proposed, based on the concept of how DNA sequence detects disease as both domains have similar conceptual method of detection. Three important steps have been proposed to apply DNA sequence for NIDS: convert the network traffic data into a form of DNA sequence using Cryptography encoding method; discover patterns of Short Tandem Repeats (STR) sequence for each network traffic attack using Teiresias algorithm; and conduct classification process depends upon STR sequence based on Horspool algorithm. 10% KDD Cup 1999 data set is used for training phase. Correct KDD Cup 1999 data set is used for testing phase to evaluate the proposed method. The current experiment results sh

... Show More
View Publication
Scopus (9)
Crossref (5)
Scopus Crossref
Publication Date
Sun Mar 28 2021
Journal Name
Journal Of The College Of Education For Women
The Phenomenon of Phonological Follow in Al-Amali Abi Ali Al-Qali’s Book (seq.356 Hijri): A Phonological Study: هند فاضل عباس
...Show More Authors

This research discusses the verbal follow phenomenon in Al-Amali Abi Al-Qali’s book (seq.356 Hijri). It aims to limit the examples of this phenomenon in the book, and  examine it phonologically. Accordingly, the researcher adopted the analaytical descriptive approach, taking into account Al-Rawi’s letter when ordering the verbal follow-based examples, and the order they took in the book in question. The purposes behind this phonological study of verbal follow in Al-Amali’s book are to: reach the sounds which Arabs prefer in the process of following, confirm different beautiful and desirable senses, have easy and speedy pronunciation, maintain harmony between adjacent sounds, count the sounds that occur at the beginning of the

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Feb 04 2019
Journal Name
Journal Of The College Of Education For Women
Semantic (Badi'iyah)Readings in The Prophetic Praise Poetry (Mada'h Nabawiya) (Abdel Rahim Bin Ahmad Bin Ali Al Borai as a case study)
...Show More Authors

The importance of this topic may not be overlooked by many of the specialists, because it is one the sciences of the Arabic language, but it is an important method in the field of influencing the recipient and his aesthetic ability to create influential images as well.
The talking about Semantic (Badi'iyah)is as old as the Arabic age, so it may be talking about it not the new thing because the people who specialized have preceded us and exhausted all the talk .

View Publication Preview PDF
Publication Date
Sat Dec 24 2022
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
A Study of the inhibitory effect of Terpinen-4-ol on Amastigote Forms of Leishmania tropica within Macrophages of Mouse in vitro
...Show More Authors

It was recorded that Terpinen-4-ol has an anti-parasitic properties, so it will be noteworthy to intensify the studies about this compound.

This study aims to test the effectiveness of terpinen-4-ol on amastigote forms of Leishmania parasite in macrophages.

This effect was studied by adding increasing concentrations  of  Terpinen-4-ol to  culture wells containing mouse macrophages that were previously incubated with the promastigote forms of the parasites for 24 hours .Then, they were incubated for another 24 hours with increasing concentrations of Terpinen-4-ol.  After, Parasites were enumerated into macrophages in wells either treated with Terpinen-4-ol or in control wells.

Treatment with Ter

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Fri Mar 01 2019
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The Relationship Between Competitive Intelligence and Entrepreneurial Performance By Centralizing Strategic Vigilance: Field study of a sample of National colleges in Iraq
...Show More Authors

The aim of this study is to highlight the relationship between competitive intelligence and Entrepreneurial Performance by centralizing the strategic vigilance of a sample of civil faculties in Baghdad. The sample of the study was targeted at 10 Iraqi civil colleges, which consisted of (133) members of the faculty council of the faculties, the search data was collected using the questionnaire form as the main research tool. The results showed that the correlation and influence of competitive intelligence and strategic vigilance in the Entrepreneurial Performance, as well as the role of strategic vigilance as an intermediate variable between competitive intelligence and Entrepreneurial Performance.

View Publication Preview PDF
Crossref (1)
Crossref