Abstract Software-Defined Networking (commonly referred to as SDN) is a newer paradigm that develops the concept of a software-driven network by separating data and control planes. It can handle the traditional network problems. However, this excellent architecture is subjected to various security threats. One of these issues is the distributed denial of service (DDoS) attack, which is difficult to contain in this kind of software-based network. Several security solutions have been proposed recently to secure SDN against DDoS attacks. This paper aims to analyze and discuss machine learning-based systems for SDN security networks from DDoS attack. The results have indicated that the algorithms for machine learning can be used to detect DDoS attacks in SDN efficiently. From machine learning approaches, it can be explored that the best way to detect DDoS attack is based on utilizing deep learning procedures.Moreover, analyze the methods that combine it with other machine learning techniques. The most benefits that can be achieved from using the deep learning methods are the ability to do both feature extraction along with data classification; the ability to extract the specific information from partial data. Nevertheless, it is appropriate to recognize the low-rate attack, and it can get more computation resources than other machine learning where it can use graphics processing unit (GPU) rather than central processing unit (CPU) for carrying out the matrix operations, making the processes computationally effective and fast.
The sustainable competitive advantage for organizations is one of the requirements for value creation, which centered on the possession of scarce resources that achieve maximum flows to invest in intellectual capital, if what has been interest in them, measured and employed the way properly and style, so I figured the need for new technologies to enable organizations to measure the intellectual and physical assets and to assess its performance accordingly, so it sheds search light on the measurement of the added value of existing knowledge using the standard value-added factor is the intellectual (value added intellectual coefficient) (VAIC) and to develop a set of assumptions about the extent of the difference between the sample
... Show MoreThis study aims to develop a recommendation engine methodology to enhance the model’s effectiveness and efficiency. The proposed model is commonly used to assign or propose a limited number of developers with the required skills and expertise to address and resolve a bug report. Managing collections within bug repositories is the responsibility of software engineers in addressing specific defects. Identifying the optimal allocation of personnel to activities is challenging when dealing with software defects, which necessitates a substantial workforce of developers. Analyzing new scientific methodologies to enhance comprehension of the results is the purpose of this analysis. Additionally, developer priorities were discussed, especially th
... Show MoreThe research seeks to find out the extent of the coverage of the Mosul press to the issues of psychological and social effects of the organization "IS" on the community of Mosul, by analyzing the content of the newspapers “Economic City” and “Mosul News”. As well as to stand at the types of psychological and social effects and their repercussions on the Mosul community including figures, statistics and evidence that were covered in the theoretical study of these topics.
This study is the first scientific diagnosis to reveal the size and types of psychological and social effects of the “ISIS” organization through what was monitored by the Mosul press. The study seeks to draw the attention of officials, decision-m
... Show MoreThe deployment of UAVs is one of the key challenges in UAV-based communications while using UAVs for IoT applications. In this article, a new scheme for energy efficient data collection with a deadline time for the Internet of things (IoT) using the Unmanned Aerial Vehicles (UAV) is presented. We provided a new data collection method, which was set to collect IoT node data by providing an efficient deployment and mobility of multiple UAV, used to collect data from ground internet of things devices in a given deadline time. In the proposed method, data collection was done with minimum energy consumption of IoTs as well as UAVs. In order to find an optimal solution to this problem, we will first provide a mixed integer linear programming m
... Show MoreBackground: Survey of the occlusion in population groups usually include in their objections the academic assessment of occlusal feature, the planning resources for public health treatment programmers, the comparison of different population and the screening of groups for orthodontic treatment. Likewise a thorough investigation of the occurrence of malocclusions among school–students would be of major importance in the planning of orthodontic treatment in the public dental health services. For this purpose it is necessary to have detailed information on the prevalence of individual malocclusion among boys and girls at different ages distributed regionally, and moreover, an analysis of the need for orthodontic treatment in the different sc
... Show MoreThis paper considers a new Double Integral transform called Double Sumudu-Elzaki transform DSET. The combining of the DSET with a semi-analytical method, namely the variational iteration method DSETVIM, to arrive numerical solution of nonlinear PDEs of Fractional Order derivatives. The proposed dual method property decreases the number of calculations required, so combining these two methods leads to calculating the solution's speed. The suggested technique is tested on four problems. The results demonstrated that solving these types of equations using the DSETVIM was more advantageous and efficient
The impact of a proposal for the curriculum dictated by some of the barriers to the development of motor skillsA. M. D. Huda Ibrahim RezoukiM. M. Susan Salim DawoodIs the childhood of the most important and most fertile stage of basic education because of their significant impact in building a base on which the stated origin of sound in the early stages older age because the baby at this stage be very vulnerability to environmental factors different surroundings in which to leave their mark on his life in the stages of life other.The Gymnastics of sports long-term training, which begins between the ages very early relative to the rest of other games to reach the stage of the tournament from the age of 13-17 years almost to the women, this a
... Show MoreObjectives: Small field of view gamma detection and imaging technologies for monitoring in vivo tracer uptake are rapidly expanding and being introduced for bed-side imaging and image guided surgical procedures. The Hybrid Gamma Camera (HGC) has been developed to enhance the localization of targeted radiopharmaceuticals during surgical procedures; for example in sentinel lymph node (SLN) biopsies and for bed-side imaging in procedures such as lacrimal drainage imaging and thyroid scanning. In this study, a prototype anthropomorphic head and neck phantom has been designed, constructed, and evaluated using representative modelled medical scenarios to study the capability of the HGC to detect SLNs and image small organs. Methods: An anthropom
... Show More