Abstract Software-Defined Networking (commonly referred to as SDN) is a newer paradigm that develops the concept of a software-driven network by separating data and control planes. It can handle the traditional network problems. However, this excellent architecture is subjected to various security threats. One of these issues is the distributed denial of service (DDoS) attack, which is difficult to contain in this kind of software-based network. Several security solutions have been proposed recently to secure SDN against DDoS attacks. This paper aims to analyze and discuss machine learning-based systems for SDN security networks from DDoS attack. The results have indicated that the algorithms for machine learning can be used to detect DDoS attacks in SDN efficiently. From machine learning approaches, it can be explored that the best way to detect DDoS attack is based on utilizing deep learning procedures.Moreover, analyze the methods that combine it with other machine learning techniques. The most benefits that can be achieved from using the deep learning methods are the ability to do both feature extraction along with data classification; the ability to extract the specific information from partial data. Nevertheless, it is appropriate to recognize the low-rate attack, and it can get more computation resources than other machine learning where it can use graphics processing unit (GPU) rather than central processing unit (CPU) for carrying out the matrix operations, making the processes computationally effective and fast.
The research aims to apply one of the techniques of management accounting, which is the Quality Function Deployment(QFD) on the Pepsi product in Baghdad Soft Drinks Company and to determine the technical requirements objectively that have been applied in practice in Baghdad Soft Drinks Company / a private shareholding company, as it focuses on meeting the quality requirements and achieving positive quality to provide a product It meets the requirements of current and future customers, hence the importance of research that indicates that the Quality Function Deployment(QFD) is a useful tool to develop the requirements of new products, being a design process driven by customers through their voices, and thus contribute to achieve a competi
... Show MoreIf the State attaches great importance to its foreign relations and intends to strengthen them in order to ensure the achievement of the highest national goals and interests. External relations between countries are one of the most prominent features of foreign policy, which depends on a combination of internal and external factors, the modern relations between Tunisia and Tunisia, which goes back to the pre-independence of Tunisia, when Iraq was a supporter of Tunisia's independence from France in the 1940s, Although these relations did not cause any disturbance by the two countries, but they remained weak relations did not develop in all areas except the sports and cultural field, which we will determine the reasons and the pos
... Show MoreThis research was conducted to measure the safety of heat stable enterotoxin a (STa) produced by enterotoxigenic Escherichia coli, through studying its toxic effect on mice since it showed a promising effect in reducing the proliferation of colorectal cancer cells. The cytogenetic effect was determined after giving five different doses (100, 200, 400, 800 and 1600)μg/Kg in comparison with negative (phosphate buffer saline / PBS) and positive (mitomycin C/ MMC, at doses of 2 and 5μg/Kg) controls on mouse bone marrow cells by employing the following parameters: mitotic index, chromosomal aberrations and micronucleus, also, the serum level of liver functional enzymes (GOT, GPT, ALP) was recorded. In addition, lethal dose 50 (LD 50) with cert
... Show MoreSocial Networking has dominated the whole world by providing a platform of information dissemination. Usually people share information without knowing its truthfulness. Nowadays Social Networks are used for gaining influence in many fields like in elections, advertisements etc. It is not surprising that social media has become a weapon for manipulating sentiments by spreading disinformation. Propaganda is one of the systematic and deliberate attempts used for influencing people for the political, religious gains. In this research paper, efforts were made to classify Propagandist text from Non-Propagandist text using supervised machine learning algorithms. Data was collected from the news sources from July 2018-August 2018. After annota
... Show MoreBackground: Dental implant is one of the most important options for teeth replacement. In two stage implant surgery, a few options could be used for uncovering implants, scalpel and laser are both considered as effective methods for this purpose. The Aim of the study: To compare soft tissue laser and scalpel for exposing implant in 2nd stage surgery in terms of the need for anesthesia, duration of procedure and pain level assessment at day 1 and day 7 post operatively using visual analogue scale . Materials and methods: Ten patients who received bilateral implants participated after healing period completed, gingival depth over each implant was recorded and then implant(s) were exposed by either scalpel or laser with determination for th
... Show MoreEfficient and cost-effective drilling of directional wells necessitates the implementation of best drilling practices and advanced techniques to optimize drilling operations. Failure to adequately consider drilling risks can result in inefficient drilling operations and non-productive time (NPT). Although advanced drilling techniques may be expensive, they offer promising technical solutions for mitigating drilling risks. This paper aims to demonstrate the effectiveness of advanced drilling techniques in mitigating risks and improving drilling operations when compared to conventional drilling techniques. Specifically, the advanced drilling techniques employed in Buzurgan Oil Field, including vertical drilling with mud motor, managed pres
... Show MoreThe study aimed to study the role of technology in the production of the mural photography, and to develop its concept to the viewer, through the achievement of the aesthetic and functional vision. Through this study, some types of these techniques, which are organically related to architecture, were identified.
The mural photography includes a huge amount of techniques, and methods, and the researcher presented them through five techniques: (AlTamira, Alfresk, acrylic, mosaic, and glass art, which takes the architectural character.
The research consists of:
Methodological framework: research problem, research objectives, research limits, importance of research, and definition of terms.
Theoretical framewo
... Show MoreCompression for color image is now necessary for transmission and storage in the data bases since the color gives a pleasing nature and natural for any object, so three composite techniques based color image compression is implemented to achieve image with high compression, no loss in original image, better performance and good image quality. These techniques are composite stationary wavelet technique (S), composite wavelet technique (W) and composite multi-wavelet technique (M). For the high energy sub-band of the 3 rd level of each composite transform in each composite technique, the compression parameters are calculated. The best composite transform among the 27 types is the three levels of multi-wavelet transform (MMM) in M technique wh
... Show MoreCompression for color image is now necessary for transmission and storage in the data bases since the color gives a pleasing nature and natural for any object, so three composite techniques based color image compression is implemented to achieve image with high compression, no loss in original image, better performance and good image quality. These techniques are composite stationary wavelet technique (S), composite wavelet technique (W) and composite multi-wavelet technique (M). For the high energy sub-band of the 3rd level of each composite transform in each composite technique, the compression parameters are calculated. The best composite transform among the 27 types is the three levels of multi-wavelet
... Show More