Software-defined networks (SDN) have a centralized control architecture that makes them a tempting target for cyber attackers. One of the major threats is distributed denial of service (DDoS) attacks. It aims to exhaust network resources to make its services unavailable to legitimate users. DDoS attack detection based on machine learning algorithms is considered one of the most used techniques in SDN security. In this paper, four machine learning techniques (Random Forest, K-nearest neighbors, Naive Bayes, and Logistic Regression) have been tested to detect DDoS attacks. Also, a mitigation technique has been used to eliminate the attack effect on SDN. RF and KNN were selected because of their high accuracy results. Three types of network topology have been generated to observe the effectiveness of proposed algorithms on different network architectures. The results reveal that RF performs better than KNN in a single topology, and both have close performance in other topologies.
The present study was conducted to investigate the relationship between critical thinking, epistemological beliefs, and learning strategies with the academic performance of high school first-grade male and female students in Yazd. For this purpose, from among all first-grade students, as many as 250 students (130 females and 120 males) were selected by using multistage cluster sampling. The data needed were then collected through using California Critical Thinking Skills Test, Schommer's Epistemological Beliefs Questionnaire, Biggs’ Revised Two Factor Study Process Questionnaire. The findings indicated that there is a positive significant relationship between critical thinking and academic performance and achievement. Moreover, four fa
... Show Moremajor goal of the next-generation wireless communication systems is the development of a reliable high-speed wireless communication system that supports high user mobility. They must focus on increasing the link throughput and the network capacity. In this paper a novel, spectral efficient system is proposed for generating and transmitting twodimensional (2-D) orthogonal frequency division multiplexing (OFDM) symbols through 2- D inter-symbol interference (ISI) channel. Instead of conventional data mapping techniques, discrete finite Radon transform (FRAT) is used as a data mapping technique due to the increased orthogonality offered. As a result, the proposed structure gives a significant improvement in bit error rate (BER) performance. Th
... Show MoreAbstract
The research aims to determine the impact of the strategy performance evaluation and of the Standards (leadership, people, knowledge, processes, financial) in the achievement of organizational effectiveness in accordance with the dimensions (planning and setting goals, Exploitation of the Environment, achieve the goals, the ability to adapt, information management and communications) and the relationship between them, the problem of the research in the growing interest in the process of performance evaluation for organizations, the erroneous belief that the performance evaluation activity is useful, and the fact that performance evaluation process is one of the main tasks of the work of the Office of the Inspecto
... Show MoreThe experiment was conducted to evaluate and performance comparison for moldboard and disk plows in central of Iraq in 2011. Three factor were used in this study included Two types of plows included moldboard and disk plows which represented main plot , three forward speeds of the tillage was second factor included 1.85, 3.75 and 5.62 km / h which represented sup plot , and three levels of soil moisture was third factor included 21 , 18 and 14 % to determined data actual plow depth , Practical productivity, Volume of disturbed soil, Field efficiency , Slippage percentage in silt clay loam soil with depth 22 cm were studied in the experiment Split – split plot design under randomized complete block design with three replications using
... Show MorePlagiarism is becoming more of a problem in academics. It’s made worse by the ease with which a wide range of resources can be found on the internet, as well as the ease with which they can be copied and pasted. It is academic theft since the perpetrator has ”taken” and presented the work of others as his or her own. Manual detection of plagiarism by a human being is difficult, imprecise, and time-consuming because it is difficult for anyone to compare their work to current data. Plagiarism is a big problem in higher education, and it can happen on any topic. Plagiarism detection has been studied in many scientific articles, and methods for recognition have been created utilizing the Plagiarism analysis, Authorship identification, and
... Show MoreAbstract:
This Research aims to define role of the system of evaluating the performance for higher leadership in determining the level of institutional work quality in the Ministry of Agriculture, by measuring system efficiency of evaluating the performance for higher leadership and its effect in institutional work quality, the searcher reached through the theoretical framing and involved studies to build default plan define the relation between Research variables formed from system of evaluating leadership performance as independent variable contains six subsidiary dimensions: (Polarization, evaluating the performance of personnel, training, motivation, se
... Show MoreThe migration from IPv4 to IPv6 can not be achieved in a brief period, thus both protocols co-exist at certain years. IETF Next Generation Transition Working Group (NGtrans) developed IPv4/IPv6 transition mechanisms. Since Iraq infrastructure, including universities, companies and institutions still use IPv4 protocol only. This research article tries to highlight, discuss a required transition roadmap and extend the local knowledge and practice on IPv6. Also, it introduces a prototype model using Packet tracer (network simulator) deployed for the design and implementation of IPv6 migration. Finally, it compares and evaluates the performance of IPv6, IPv4 and dual stack using OPNET based on QoS metrics such as throughput, delay and point to
... Show More