Abstract Software-Defined Networking (commonly referred to as SDN) is a newer paradigm that develops the concept of a software-driven network by separating data and control planes. It can handle the traditional network problems. However, this excellent architecture is subjected to various security threats. One of these issues is the distributed denial of service (DDoS) attack, which is difficult to contain in this kind of software-based network. Several security solutions have been proposed recently to secure SDN against DDoS attacks. This paper aims to analyze and discuss machine learning-based systems for SDN security networks from DDoS attack. The results have indicated that the algorithms for machine learning can be used to detect DDoS attacks in SDN efficiently. From machine learning approaches, it can be explored that the best way to detect DDoS attack is based on utilizing deep learning procedures.Moreover, analyze the methods that combine it with other machine learning techniques. The most benefits that can be achieved from using the deep learning methods are the ability to do both feature extraction along with data classification; the ability to extract the specific information from partial data. Nevertheless, it is appropriate to recognize the low-rate attack, and it can get more computation resources than other machine learning where it can use graphics processing unit (GPU) rather than central processing unit (CPU) for carrying out the matrix operations, making the processes computationally effective and fast.
Abstract:
The internal control is the tool through which it is possible to verify and ensure the implementation of tasks in accordance with the established plans and programs and to evaluate the level of performance that is implemented within the different companies.
A guarantee from the supplier with the absence of a specialized technical committee that follows up the stages of implementing the contract and disbursing all amounts of financial dues to the supplier before completing the implementation of the contract and overlooking the non-implementation of some clauses of the contract by the committee in charge of
... Show MoreThe purpose of the study is to identify the teaching techniques that mathematics' teachers use due to the Brain-based learning theory. The sample is composed of (90) teacher: (50) male, (40) female. The results have shown no significant differences between male and female responses' mean. Additionally, through the observation of author, he found a lack of using Brain-based learning techniques. Thus, the researcher recommend that it is necessary to involve teachers in remedial courses to enhance their ability to create a classroom that raise up brain-based learning skills.
This research tries to reveal how to manage and control the competitive edge for business by building managerial skills in various organizational levels. Our research aims at finding out the nature of various technical, human and in tellectual skills of a new president whose superiority is his competitive ness in the application field at general company for construe tioual industriesand testing the surveyed minor and major changes through a questionnaire to collect information from officials. The sample was composed of (45) director. The data was analyzed using some methods and statistical programs. The most prominent of these is (SPSS) that was used to extract the arithmetic mean, standard deviation, correlation coefficient
... Show MoreDiscretionary Punishment, Public Regulation, Interest
Abstract
This Research aims for harnessing critical and innovative thinking approaches besides innovative problem solving tools in pursuing continual quality improvement initiatives for the benefit of achieving operations results effectively in water treatment plants in Baghdad Water Authority. Case study has been used in fulfilling this research in the sadr city water treatment plant, which was chosen as a study sample as it facilitates describing and analyzing its current operational situation, collecting and analyzing its own data, in order to get its own desired improvement opportunity be done. Many statistical means and visual thinking promoting methods has been used to fulfill research task.
... Show MoreA total number of 33 isolates of Pseudomoans aeruginosa were collected from different clinical samples, such as: burn, wound and urine from patients attending Al-Yarmouk teaching hospital and some private clinical laboratories in Baghdad city through the period from October to December 2016. On the other hand, 21 isolates of P. aeruginosa were collected from 38 different food samples; such as: vegetables and fruits, from different local markets in Baghdad city during the period from November to December 2016. All isolates were identified by using different bacteriological and biochemical assays and confirmed by Vitek-2 identification system. The antimicrobial susceptibility test for clinical and food isolates towards 17 antimicrobial a
... Show MoreBackground : Although development and progress in various diagnostic methods, but still identification of remnants of skeletal and decomposing parts of human is one of the most difficult skills in forensic medicine . Gender and age estimation is also considering an important problem in the identification of unknown skull. The aims of study: To estimate volume and dimension of maxillary sinus in individuals with dentate and edentulous maxillae using CT scan, and to correlate the maxillary sinus volume in relation to gender and age. Materials and Methods : This study included 120 patients ranged from (40-69 years), divided into two groups, dentate group with fully dentate maxilla and edentulous group with complete edentulous maxilla, and e
... Show MoreThe current research includes a look at the participation of Iraqi women in the combat roles, which starts from the assumption of the democratic transition that must be led - in one of its aspect - until the army or the military foundation to become a "citizen army," the matter which is represented a demand increasingly needed in the experiences of Democratic transformation that facing serious security challenges such as in Iraq, this means that the army or security foundation - which is involved in counterterrorism - should not reflect a specific group in society , and hence embody the most important democratic principles, which are equality and equal opportunities, especially gender equality. On the other hand, the influence of armed conf
... Show MoreThere are obstacles to high levels of hypertension awareness that are embedded in gender, income and lifestyle habits which need to be addressed leading to high levels of undiagnosed and uncontrolled hypertension. This study aimed to explore the various factors which affect hypertension awareness among a hypertensive population in a tertiary care hospital.
A quantitative study was conducted among hypertensive patients at a tertiary care hospital in Selangor, Malaysia. A validated and translated questionnaire was utilised as a data collection tool. Descriptive and inferential statistical analysis was done using SPSS version 25.
A thousand participants (female n=621, male n= 379) were recruited, and their
... Show More