Abstract Software-Defined Networking (commonly referred to as SDN) is a newer paradigm that develops the concept of a software-driven network by separating data and control planes. It can handle the traditional network problems. However, this excellent architecture is subjected to various security threats. One of these issues is the distributed denial of service (DDoS) attack, which is difficult to contain in this kind of software-based network. Several security solutions have been proposed recently to secure SDN against DDoS attacks. This paper aims to analyze and discuss machine learning-based systems for SDN security networks from DDoS attack. The results have indicated that the algorithms for machine learning can be used to detect DDoS attacks in SDN efficiently. From machine learning approaches, it can be explored that the best way to detect DDoS attack is based on utilizing deep learning procedures.Moreover, analyze the methods that combine it with other machine learning techniques. The most benefits that can be achieved from using the deep learning methods are the ability to do both feature extraction along with data classification; the ability to extract the specific information from partial data. Nevertheless, it is appropriate to recognize the low-rate attack, and it can get more computation resources than other machine learning where it can use graphics processing unit (GPU) rather than central processing unit (CPU) for carrying out the matrix operations, making the processes computationally effective and fast.
The main objective of this work is to propose a new routing protocol for wireless sensor network employed to serve IoT systems. The routing protocol has to adapt with different requirements in order to enhance the performance of IoT applications. The link quality, node depth and energy are used as metrics to make routing decisions. Comparison with other protocols is essential to show the improvements achieved by this work, thus protocols designed to serve the same purpose such as AODV, REL and LABILE are chosen to compare the proposed routing protocol with. To add integrative and holistic, some of important features are added and tested such as actuating and mobility. These features are greatly required by some of IoT applications and im
... Show MoreWe consider the outflow of water from the peak of a triangular ridge into a channel of finite depth. Solutions are computed for different flow rates and bottom angles. A numerical method is used to compute the flow from the source for small values of flow rate and it is found that there is a maximum flow rate beyond which steady solutions do not seem to exist. Limiting flows are computed for each geometrical configuration. One application of this work is as a model of saline water being returned to the ocean after desalination. References Craya, A. ''Theoretical research on the flow of nonhomogeneous fluids''. La Houille Blanche, (1):22–55, 1949. doi:10.1051/lhb/1949017 Dun, C. R. and Hocking, G. C. ''Withdrawal of fluid through
... Show More<span lang="EN-US">In the last years, the self-balancing platform has become one of the most common candidates to use in many applications such as flight, biomedical fields, and industry. In this paper, the physical prototype of a proposed self-balancing platform that described the self-balancing attitude in the (X-axis, Y-axis, or biaxial) under the influence of road disturbance has been introduced. In the physical prototype, the inertial measurement unit (IMU) sensor will sense the disturbance in (X-axis, Y-axis, and biaxial). With the determined error, the corresponding electronic circuit, DC servo motors, and the Arduino software, the platform overcame the tilt angle(disturbance). Optimization of the proportional-integral-
... Show MoreBackground: The demand for esthetic orthodontic appliances is increasing; so the esthetic orthodontic archwires were introduced. Among them, Teflon and Epoxy coated stainless steel archwires. The amount of force available from the archwire depends on the structural properties and susceptibility to corrosion. All metallic alloys are changed during immersion in artificial saliva, chlorhexidine mouthwash andtoothpaste, but their behaviors differ from one type to another. They corrode at different rates, which lead to decrease the amount of force applied to the teeth. This in vitro study was designed to evaluate the corrosion pits in stainless steel archwires coated with Teflon and with Epoxy in dry and after immersion in artificial saliva, chl
... Show MoreBanks represents financial institutions that influence the economy of any country and their evolution and development is the need to seek all states , communities, maintain and control a guarantee of the beneficiaries investors and to promote confidence, so the specialized organizations trying to set principles and rules must be adhered to and are Basel (II) of the necessary effects to be introduced and work on their application. Banks exposed by various risks one of them operational risks that have multiple effects on the activity of the institution itself, as well as the national economy, so this study was to find out what those effects and to find solutions and appropriate proposals to avoid Iraqi banks from the effects of risk,
... Show MoreThis research aims to clarify the role of Information Technology Competency (ITC) with dimensions' (IT Usage, IT Knowledge, and IT Operations) as an independent variable in the activation of Human Resources Management Practices (HRM Practices) as a dependent variable with dimensions' (Training and Development, Recruitment, Job Design, and Performance appraisal). Based on this, the correlation and effect relationships between the independent and dependent variables are determined by formulating two main hypotheses. There are a significant relationship and effect of IT competency with HRM practices within the dimensions. Furthermore, the scope and population of this research are the Informatics and Communications P
... Show MoreUltraviolet spectrophotometric studies for antibiotic (amino glycoside) derivatives including, Neomycin, Streptomycin, Gentamycin and Kanamycin with special reagents, which are benzoyl chloride; benzene sulfonyl chloride, toluenesulfonyl chloride and phthalic anhydride were made. Amino glycosides derivatives were followed through measurements of the ultraviolet absorbance (A) from which the absorptivity (ε) of the complexes was deduced and molar absorbances using Ultraviolet for products and calculate the number of reagents molecule that combine to amino glycosides.
The current study aimed to reveal the moral values available in the Arabic language textbook (Al-Mu’nes) for grades eleven and twelve for post-basic education in the Sultanate of Oman. The researcher adopted the descriptive approach using the sentence as measuring unit in the analysis process. The five fields of moral values and their subcategories values represented the categories of the analysis. Iterations of values and the percentages of iteration were calculated in those textbooks. Moreover and the analysis and stability of the process were confirmed.
After referring to previous studies, it was possible to de
... Show MoreMany people take protein supplements in an effort to gain muscle. However, there is some controversy as to whether this is really effective. There is evidence suggesting that consuming high level s of protein may in fact have negative side effects for health. The current study included 29 young Iraqi building muscles in two different groups (taken and not protein supplements) (age range=17-31 years), the cases were selected from family, friends, college students, and Gyms), from November 2014 to March 2015. A careful history was obtained from each volunteer including age, duration of sports, type of supplements, and family history of diseases. Some biochemical parameters like (glucose, urea, uric acid, creatinine, bilirubin, serum protei
... Show MoreThis research seeks to attempt to reveal the intention of Al-Hafiz Al-Mazi from his market to hadiths from Imam Ahmad’s Musnad in his book “Masterpiece of Supervision in Knowing the Parties”, and researchers know that this book was classified by Al-Mazi to collect the parties to the six books: Sahih Al-Bukhari, Sahih Muslim, Sunan Abi Dawud, Jamea Al-Tirmidhi and Sunan Al-Nasa’i and Sunan Ibn Majah, in addition to some of the books ’authors’ books, and arranging them according to the Musnad, and it is not Musnad Ahmad from his condition, even if it is close to the arrangement of Mazi’s work, as he was a follower of that to the original owner Abu al-Qasim bin Asaker in his book “Supervising Knowledge of the Parties” in M
... Show More