Abstract Software-Defined Networking (commonly referred to as SDN) is a newer paradigm that develops the concept of a software-driven network by separating data and control planes. It can handle the traditional network problems. However, this excellent architecture is subjected to various security threats. One of these issues is the distributed denial of service (DDoS) attack, which is difficult to contain in this kind of software-based network. Several security solutions have been proposed recently to secure SDN against DDoS attacks. This paper aims to analyze and discuss machine learning-based systems for SDN security networks from DDoS attack. The results have indicated that the algorithms for machine learning can be used to detect DDoS attacks in SDN efficiently. From machine learning approaches, it can be explored that the best way to detect DDoS attack is based on utilizing deep learning procedures.Moreover, analyze the methods that combine it with other machine learning techniques. The most benefits that can be achieved from using the deep learning methods are the ability to do both feature extraction along with data classification; the ability to extract the specific information from partial data. Nevertheless, it is appropriate to recognize the low-rate attack, and it can get more computation resources than other machine learning where it can use graphics processing unit (GPU) rather than central processing unit (CPU) for carrying out the matrix operations, making the processes computationally effective and fast.
The topic of urban transformations has attracted the attention of researchers as it is one of the basic issues through which cities can be transformed towards sustainability. A specific level of transformation levels according to a philosophical concept known as a crossing. This article has relied on a specific methodology that aims to find a new approach for urban transformation based on the crossing concept. This concept derives from philosophical entrances based on the concepts of (being, process, becoming, and integration). Four levels have been for the crossing are (normal, ascending, leap, and descending). Each of these levels includes specific characteristics that distinguish it. The results showed that there is no descending
... Show MoreIn this work, an efficient energy management (EEM) approach is proposed to merge IoT technology to enhance electric smart meters by working together to satisfy the best result of the electricity customer's consumption. This proposed system is called an integrated Internet of things for electrical smart meter (2IOT-ESM) architecture. The electric smart meter (ESM) is the first and most important technique used to measure the active power, current, and energy consumption for the house’s loads. At the same time, the effectiveness of this work includes equipping ESM with an additional storage capacity that ensures that the measurements are not lost in the event of a failure or sudden outage in WiFi network. Then then these
... Show MoreThe objective of an Optimal Power Flow (OPF) algorithm is to find steady state operation point which minimizes generation cost, loss etc. while maintaining an acceptable system performance in terms of limits on generators real and reactive powers, line flow limits etc. The OPF solution includes an objective function. A common objective function concerns the active power generation cost. A Linear programming method is proposed to solve the OPF problem. The Linear Programming (LP) approach transforms the nonlinear optimization problem into an iterative algorithm that in each iteration solves a linear optimization problem resulting from linearization both the objective function and constrains. A computer program, written in MATLAB environme
... Show MoreFeature selection (FS) constitutes a series of processes used to decide which relevant features/attributes to include and which irrelevant features to exclude for predictive modeling. It is a crucial task that aids machine learning classifiers in reducing error rates, computation time, overfitting, and improving classification accuracy. It has demonstrated its efficacy in myriads of domains, ranging from its use for text classification (TC), text mining, and image recognition. While there are many traditional FS methods, recent research efforts have been devoted to applying metaheuristic algorithms as FS techniques for the TC task. However, there are few literature reviews concerning TC. Therefore, a comprehensive overview was systematicall
... Show MoreThe corcosion behoviour of Aluminum bronze in sodium chloride solution has been studied ^tentiostatically at five temperatures in the range 293-313K.The corrosion potential shifted to more negative values with increasing temperature. The corrosion current density increased with increasing temperature. Values of Tal'el slopes and the transfer coefficients indicated hydrogen evolution reaction to occur at the cathode and mainly the dissolution at the anode.Benzotriazole (BTA) had an inhibiting effect ??? the corrosion of the Al-bronze in deaerated NaCl solution at a concentration (1*10'?- IxlO‘1) mol dm'^ over the temperature range 293-313K. Values of the protection efficiency and kinetics parameters were obtained from the corrosion current
... Show MoreThis research aims to show the most important approaches applicable in forming the accounting standards , the importance approaches used to formulate local accounting standards & the need to cancel or develop the unified accounting system in Iraq besides activate the local auditing & accounting standards council to issue accounting standards able to save the relevance & Reliable accounting information that serve the decisions of stockholders and others of stakeholders in the incorporate companies , especially the companies listed in the Iraq securities exchange , So this study based partially on analyzing the questionnaire form which has been designed to inquiry the specialists and experts opinion about the accoun
... Show MoreThe present study was designed to shed light on the molecular effects caused by acute myeloid leukemia (AML). It was also aimed to investigate ASXL1 point mutations in newly AML patients as compared to healthy control. The study comprised of 43 AML Iraqi patients and their ages ranged between 16-75 years. It included 23 females and 20 males compared with 20 healthy controls. Results revealed that the extracted DNA from 30 AML patients and amplified by PCR to obtain ASXL1 gene from exon 12 showed larger bands (479). Among forty three patients, two of them displayed point mutations of deletion and substitution, while the others were normal since no mutations were detected. The total of mutations in two mutated patients was 27 mutations, the m
... Show More