Preferred Language
Articles
/
Cxc5-Y0BVTCNdQwCEStJ
Techniques for DDoS Attack in SDN: A Comparative Study
...Show More Authors

Abstract Software-Defined Networking (commonly referred to as SDN) is a newer paradigm that develops the concept of a software-driven network by separating data and control planes. It can handle the traditional network problems. However, this excellent architecture is subjected to various security threats. One of these issues is the distributed denial of service (DDoS) attack, which is difficult to contain in this kind of software-based network. Several security solutions have been proposed recently to secure SDN against DDoS attacks. This paper aims to analyze and discuss machine learning-based systems for SDN security networks from DDoS attack. The results have indicated that the algorithms for machine learning can be used to detect DDoS attacks in SDN efficiently. From machine learning approaches, it can be explored that the best way to detect DDoS attack is based on utilizing deep learning procedures.Moreover, analyze the methods that combine it with other machine learning techniques. The most benefits that can be achieved from using the deep learning methods are the ability to do both feature extraction along with data classification; the ability to extract the specific information from partial data. Nevertheless, it is appropriate to recognize the low-rate attack, and it can get more computation resources than other machine learning where it can use graphics processing unit (GPU) rather than central processing unit (CPU) for carrying out the matrix operations, making the processes computationally effective and fast.

Crossref
View Publication
Publication Date
Fri Jan 01 2021
Journal Name
Journal Of Economics And Administrative Sciences
Crisis management according to the strategic leadership - the interactive role of decision support systems. (An exploratory study at the Ministry of Industry and Minerals / the State Company for Steel Industries)
...Show More Authors

The researcher aims to Diagnose the reality of research variables, strategic leadership and decision support systems, and their impact on crisis management in the General Company for Steel Industries because of their important role in preventing crises and reducing their occurrence for the research company in particular and other companies in general affiliated with the Ministry of Industry and Minerals, as well as clarifying theoretical concepts of research variables As it included the answer to questions related to the research problem, including (Is there an impact of the strategic leadership in managing crises if decision support systems are used), and the researcher adopted the descriptive and analytical approach in its comp

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Fri Oct 30 2020
Journal Name
Journal Of Economics And Administrative Sciences
The effect of applying total quality management on the competitiveness from the point of view of the front-rows employees for customer service (An analytical study of Palestinian local banks)
...Show More Authors

The study aimed to identify the effect of Total Quality Management on enhancing competitiveness through the opinions of employees of the front- rows of customer service in local Palestinian banks, the researcher adopted an analytical descriptive method through developing a special questionnaire to accomplish the study’s objectives and answer its questions. The study involved all the Palestinian local banks, with their scattered branches in West Bank. The study sample consisted of 3470 executive employees for banking services out of 4753 employees, in the rate of 73%, and the study sample reached (485) employees who were randomly selected working in the front -rows to provide services in the local Palestinian banks during the ye

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Jun 01 2019
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The adequacy of the methods used in the collection of tax debt in Iraq: Applied research in the General Authority for Taxation
...Show More Authors

If the sovereignty of the state is reflected in the taxation of its citizens, this sovereignty can not be completed and completed only if it works on its part to collect its debts, whether voluntary or compulsory, and the debt of the debt arises from the will of the individual and the will of the state alone, The existing management of seizure and collection is based on an unequal relationship between the State and the debtor from which the obligation arises. Naturally, this relationship has obligations and rights on both parties. The researcher used a set of studies and previous research, books and other sources related to the subject of research. This was done through the theoretical and practical aspects, which focused on direct and i

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Sep 30 2020
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The added value of internal audit and its role in achieving independence and responsibility: applied research in the Rafidain State Company for Dams implementation
...Show More Authors

The added value of internal audit greatly contributes to adding value to the institution, but most departments of economic units in Iraq neglected the role of internal audit and the added value that can be achieved by those institutions, since the term added value of internal audit is a relatively vague term from the premise that what cannot be measured is difficult Determine it, and perhaps descriptive standards for it is the extent of compliance with international auditing standards (IIA).

The research aims to study the procedures and results of auditing to verify that they have given an added value to the audit with a positive impact, develop its aspects and research, identify deficiencies for the audi

... Show More
View Publication Preview PDF
Publication Date
Thu Mar 03 2022
Journal Name
Archives Of Rheumatology
Association of tumor necrosis factor-alpha promoter region gene polymorphism at positions -308G/A, -857C/T, and -863C/A with etanercept response in Iraqi rheumatoid arthritis patients
...Show More Authors

Objectives: This study aims to evaluate the association between polymorphisms in the promoter region of the tumor necrosis factor-alpha (TNF-α) gene at locations -308G/A, -857C/T, and -863C/A with the tendency of being non-responder to etanercept.

Patients and methods: Between October 2020 and August 2021, a total of 80 patients (10 males, 70 females; mean age: 50 years; range, 30 to 72 years) with rheumatoid arthritis (RA) receiving etanercept for at least six months were included. The patients were divided into two groups responders and non-responders, based on their response after six months of continuous treatment. Following polymerase chain reac

... Show More
View Publication Preview PDF
Scopus (14)
Crossref (13)
Scopus Clarivate Crossref
Publication Date
Tue Mar 15 2022
Journal Name
Al-academy
The semiotics of the visual image of women in the discourse of empowerment, Saudi Arabia Kingdom as a model
...Show More Authors

We studied, in this paper, the semiotics of the visual image of women in the discourse of empowerment, through three models of advertising images expressing the particularities of the Saudi Arabian environment.

We aim to know how the mark operates and how it is interpreted, as a semantic process in which the meaning ranges from description to interpretation, and we studied two hypotheses:

-The advertising image is a structure in which the mark corresponds to the reality and the discourse to the context.

-The significance is not found in the visual sign or in the textual sign of the advertising image, but in the creative event that opens up to the social, cultural, and psychological context, and creates a field of dia

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Dec 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
The reality of smart city development management in the comprehensive development plan for the city of Baghdad 2030
...Show More Authors

Abstract

Abstract has many advantages as has historically been one of the regions leading cultural centers . for centuries , it has been a center of commertial and financial operations in Iraq. it is also rich in archeological sites and natural resources, but because of its wars and implementation of urban development strategies are effective and sustainable , so contracted the secretariat of Baghdad with the company (khatib and scirntiffic) for the preparation of the comprehensive development plan for the city of Baghdad in 2030 and funded by the world bank and the fact that the plan was approved ( three stages of it ) and only one phase remains the fourth stage, which is under discussion the aim of the

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Wed Dec 01 2021
Journal Name
Journal Of Economics And Administrative Sciences
The Effectiveness of Indicators of Financial Discipline in Strengthening the Exchange Rate, with a Special Reference to Iraq
...Show More Authors

Controlling public expenditures is one of the main objectives of the public budget. The public budget often suffers from a deficit, whether in developed or developing countries, because expenditures are usually greater than the revenues generated. This requires the existence of financial rules that are adhered to by the government, which in turn leads to discipline. Fiscal policy leads to a reduction in the obligations incumbent on the government.  Adhering to the financial rules would correct the course of fiscal policy in Iraq, with the need to direct oil revenues in the years of financial abundance when global oil prices rise to sovereign funds similar to other rentier countries, which contributes to maintaining the stabi

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Thu Jun 01 2023
Journal Name
Journal Of Engineering
A Modified Vigenère Cipher based on Time and Biometrics features
...Show More Authors

Biometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses.

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sun Oct 02 2016
Journal Name
Journal Of Educational And Psychological Researches
The Effect of Driver and Posner Models in correcting Alternative Perceptions in Educational Psychology Material for the Students at the Institute of Fine Arts
...Show More Authors

To achieve the goals, the researcher followed the design of equal and   independent groups of partial control and post-test . The research has chosen the Institute of Fine Arts in the area Almansour area as deliberate sample where three sections of students have been chosen and the   number of students is (69) students. The researcher conducted equivalence in the variables (age, and IQ , and the overall rate for grade III). in diagnostic phase,  (21) concepts of alternative    image out of (46) concepts have been identified in addition to the goals of formulation of acquisition concepts according to the three processes (definition, discrimination and application). Achievement test has been

... Show More
View Publication Preview PDF