The recent advancements in security approaches have significantly increased the ability to identify and mitigate any type of threat or attack in any network infrastructure, such as a software-defined network (SDN), and protect the internet security architecture against a variety of threats or attacks. Machine learning (ML) and deep learning (DL) are among the most popular techniques for preventing distributed denial-of-service (DDoS) attacks on any kind of network. The objective of this systematic review is to identify, evaluate, and discuss new efforts on ML/DL-based DDoS attack detection strategies in SDN networks. To reach our objective, we conducted a systematic review in which we looked for publications that used ML/DL approach
... Show MoreAbstract:
This research aims to compare Bayesian Method and Full Maximum Likelihood to estimate hierarchical Poisson regression model.
The comparison was done by simulation using different sample sizes (n = 30, 60, 120) and different Frequencies (r = 1000, 5000) for the experiments as was the adoption of the Mean Square Error to compare the preference estimation methods and then choose the best way to appreciate model and concluded that hierarchical Poisson regression model that has been appreciated Full Maximum Likelihood Full Maximum Likelihood with sample size (n = 30) is the best to represent the maternal mortality data after it has been reliance value param
... Show MoreThis paper shews how to estimate the parameter of generalized exponential Rayleigh (GER) distribution by three estimation methods. The first one is maximum likelihood estimator method the second one is moment employing estimation method (MEM), the third one is rank set sampling estimator method (RSSEM)The simulation technique is used for all these estimation methods to find the parameters for generalized exponential Rayleigh distribution. Finally using the mean squares error criterion to compare between these estimation methods to find which of these methods are best to the others
This paper aims to calculate the petrophysical properties in the Al-Ahdab field in the middle of Iraq within the Mauddud Formation. This study was based on the information available from well logs. The interactive petrophysical software IP (V4.5) was used to calculate the porosity, hydrocarbon saturation and shale volume, divide the formation into reservoir units and buffer units, and evaluate these units in each well. The Mauddud was divided into five units, two of them were considered good reservoirs having good petrophysical properties (high porosity, Low water saturation, and low shale volume). The other three are not reservoirs because of poor petrophysical properties.
Spatial data analysis is performed in order to remove the skewness, a measure of the asymmetry of the probablitiy distribution. It also improve the normality, a key concept of statistics from the concept of normal distribution “bell shape”, of the properties like improving the normality porosity, permeability and saturation which can be are visualized by using histograms. Three steps of spatial analysis are involved here; exploratory data analysis, variogram analysis and finally distributing the properties by using geostatistical algorithms for the properties. Mishrif Formation (unit MB1) in Nasiriya Oil Field was chosen to analyze and model the data for the first eight wells. The field is an anticline structure with northwest- south
... Show MoreThe aim of this study is interpretation well logs to determine Petrophysical properties of tertiary reservoir in Khabaz oil field using IP software (V.3.5). The study consisted of seven wells which distributed in Khabaz oilfield. Tertiary reservoir composed from mainly several reservoir units. These units are : Jeribe, Unit (A), Unit (A'), Unit (B), Unit (BE), Unit (E),the Unit (B) considers best reservoir unit because it has good Petrophysical properties (low water saturation and high porous media ) with high existence of hydrocarbon in this unit. Several well logging tools such as Neutron, Density, and Sonic log were used to identify total porosity, secondary porosity, and effective porosity in tertiary reservoir. For
... Show MoreA comparison was conducted between two wells, Kt-1and Kt-2, in Kumait and two wells, Du-1and Du-2, in Dujaila oil fields that belong to Mishrif formation, southern Iraq. Seismic inversion method was employed to detect oil and water reservoirs. The comparison included the behavior of acoustic impedance (AI) of fluids and the lithology with related petrophysical properties. The values of water saturation, Shale volume (Vsh), and effective porosity were compared between the AI, two fluid reservoirs. It was found that the AI value for the oil reservoir unit is relatively low to medium, whereas it was relatively medium for the water reservoir. Effective porosity value showed, in general, an increase in the oil reservoir and
... Show MoreIn this paper, the blow-up solutions for a parabolic problem, defined in a bounded domain, are studied. Namely, we consider the upper blow-up rate estimate for heat equation with a nonlinear Neumann boundary condition defined on a ball in Rn.
The aim of this research is to use robust technique by trimming, as the analysis of maximum likelihood (ML) often fails in the case of outliers in the studied phenomenon. Where the (MLE) will lose its advantages because of the bad influence caused by the Outliers. In order to address this problem, new statistical methods have been developed so as not to be affected by the outliers. These methods have robustness or resistance. Therefore, maximum trimmed likelihood: (MTL) is a good alternative to achieve more results. Acceptability and analogies, but weights can be used to increase the efficiency of the resulting capacities and to increase the strength of the estimate using the maximum weighted trimmed likelihood (MWTL). In order to perform t
... Show MoreThe most significant function in oil exploration is determining the reservoir facies, which are based mostly on the primary features of rocks. Porosity, water saturation, and shale volume as well as sonic log and Bulk density are the types of input data utilized in Interactive Petrophysics software to compute rock facies. These data are used to create 15 clusters and four groups of rock facies. Furthermore, the accurate matching between core and well-log data is established by the neural network technique. In the current study, to evaluate the applicability of the cluster analysis approach, the result of rock facies from 29 wells derived from cluster analysis were utilized to redistribute the petrophysical properties for six units of Mishri
... Show More