Preferred Language
Articles
/
Nxazs4sBVTCNdQwCZdeM
Performance Evaluation of SDN DDoS Attack Detection and Mitigation Based Random Forest and K-Nearest Neighbors Machine Learning Algorithms
...Show More Authors

Software-defined networks (SDN) have a centralized control architecture that makes them a tempting target for cyber attackers. One of the major threats is distributed denial of service (DDoS) attacks. It aims to exhaust network resources to make its services unavailable to legitimate users. DDoS attack detection based on machine learning algorithms is considered one of the most used techniques in SDN security. In this paper, four machine learning techniques (Random Forest, K-nearest neighbors, Naive Bayes, and Logistic Regression) have been tested to detect DDoS attacks. Also, a mitigation technique has been used to eliminate the attack effect on SDN. RF and KNN were selected because of their high accuracy results. Three types of network topology have been generated to observe the effectiveness of proposed algorithms on different network architectures. The results reveal that RF performs better than KNN in a single topology, and both have close performance in other topologies.

Scopus Crossref
View Publication
Publication Date
Wed Mar 02 2022
Journal Name
International Journal Of Drug Delivery Technology
N-Acetyl Cysteine Plus Metformin Versus Metformin Alone in Treatment of Iraqi Women with Polycystic Ovarian Syndrome
...Show More Authors

Publication Date
Fri Jun 01 2012
Journal Name
Journal Of Economics And Administrative Sciences
Handling a problem of transport solid waste in Baghdad City to Healthy landfill sites using transportation Model
...Show More Authors

 A problem of solid waste became in the present day common global problem among all countries, whether developing or developed countries, and can say that no country in the world today is immuning from this dilemma which must find appropriate solutions. The problem has reached a stage that can not ignore or delay, but has became a daily problem occupies the minds of ecologists, economists and politicians took occupies center front in the lists of  priorities for the countries in terms of finding solutions to the rapid scientific and radical them. and that transport costs constitute an important component of total costs borne by the municipal districts in the process of disposal of solid waste, so any improvement in the

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Jun 01 2013
Journal Name
Journal Of Economics And Administrative Sciences
Comparison Ridge regression method with some classical methods to estimate the parameters of Lomax distribution by simulation
...Show More Authors

Abstract

In this research provide theoretical aspects of one of the most important statistical distributions which it is Lomax, which has many applications in several areas, set of estimation methods was used(MLE,LSE,GWPM) and compare with (RRE) estimation method ,in order to find out best estimation method set of simulation experiment (36) with many replications  in order  to get mean square error and used it to make compare , simulation experiment  contrast with (estimation method, sample size ,value of location and shape parameter) results show that estimation method effected by simulation experiment factors and ability of using other estimation methods such as(Shrinkage, jackknif

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Dec 01 2017
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The Role of Benford’s law to appreciation the risk in financial transactions: Application study in Baghdad University
...Show More Authors

The financial fraud considers part of large concept to management and financial corruption, the financial fraud is appeared especially after corporate, that is Emerge agency theory, that is because recognize relationship between the management company and stakeholder, that is through group from constriction in order to block the management to fraud practice, that on the basis was choose another party in order fraud this practice and give opinion on financial statement, that consider basis decision making from stakeholder to basis the report auditor about creditability this is statement that reflect real activity for the company.The Auditor in order to lead work him Full professionalism to must using group from control Techniques, that is

... Show More
View Publication
Crossref (1)
Crossref
Publication Date
Sun Oct 15 2023
Journal Name
Bionatura
Study the effect of the different doses from the laser on Staphylococcus aureus Bacteria growth in vitro
...Show More Authors

Background: Laser is a novel physical therapy technique used to treat various conditions, including wound healing, inhibition of bacterial growth, and postoperative wounds. High-power pulsed alexandrite laser therapy is one of the most prevalent forms of laser therapy, which is a noninvasive method for treating various pathological conditions, thereby enhancing functional capacities and quality of life. It is a modern medical and physiotherapeutic technology. Generally, the Alexandrite laser emits infrared light with a wavelength of 755 nm, allowing it to propagate and penetrate tissues. Objective: This study focused on the application of a high-power pulsed alexandrite laser in vitro to evaluate the effect of a pulsed alexandrite l

... Show More
View Publication
Crossref (1)
Scopus Crossref
Publication Date
Fri Dec 31 2021
Journal Name
Iraqi Geological Journal
Development of 1D-Synthetic Geomechanical Well Logs for Applications Related to Reservoir Geomechanics in Buzurgan Oil Field
...Show More Authors

Knowledge of the distribution of the rock mechanical properties along the depth of the wells is an important task for many applications related to reservoir geomechanics. Such these applications are wellbore stability analysis, hydraulic fracturing, reservoir compaction and subsidence, sand production, and fault reactivation. A major challenge with determining the rock mechanical properties is that they are not directly measured at the wellbore. They can be only sampled at well location using rock testing. Furthermore, the core analysis provides discrete data measurements for specific depth as well as it is often available only for a few wells in a field of interest. This study presents a methodology to generate synthetic-geomechani

... Show More
Crossref (1)
Crossref
Publication Date
Tue Aug 20 2019
Journal Name
Political Sciences Journal
The authority of the president in the successive regimes in Iraq in the time - span 1920-2003
...Show More Authors

Abstract The success of the system of government in any country needs to have a handle on the amount of power efficiency , capacity , capability and wisdom, Iraq has gone through since its inception through several stages of time, namely: The first stage: which ran from August 23, 1921 until July 14, 1958 and was ruling monarchy (rule of the royal family) and punishing power of political elites both of them and works access to power without taking into consideration the laws and principles of the Constitution, and as a result of the inability of civilian powers and political parties access to power to grant that army officers regulatory and disciplinary specifications as well as possessing arms and overthrow the rule of the minority coup

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Feb 05 2022
Journal Name
Applied Nanoscience
RETRACTED ARTICLE: The impact of fear on a stage structure prey–predator system with anti-predator behavior
...Show More Authors

A prey-predator interaction model has been suggested in which the population of a predator consists of a two-stage structure. Modified Holling's disk equation is used to describe the consumption of the prey so that it involves the additional source of food for the predator. The fear function is imposed on prey. It is supposed that the prey exhibits anti-predator behavior and may kill the adult predator due to their struggle against predation. The proposed model is investigated for existence, uniqueness, and boundedness. After determining all feasible equilibrium points, the local stability analyses are performed. In addition, global stability analyses for this model using the Lyapunov method are investigated. The chance of occurrence of loc

... Show More
Scopus (7)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Tue Sep 11 2018
Journal Name
Iraqi Journal Of Physics
An experimental cross-section measurement of 10B(n,α)7Li reaction on counting alpha particles track density
...Show More Authors

The present work determines the particle size based only on the number of tracks detected in a cluster created by a hot particle on the CR-39 solid state nuclear track detector and depending on the exposure time. The mathematical model of the cross section developed here gives the relationship between alpha particle emitting from the (n, α) reaction and the number of tracks created and distribution of tracks created on the surface of the track detector. In an experiment performed during this work, disc of boron compound (boric acid or sodium tetraborate) of different weights were prepared and exposed to thermal neutron from the source. Chemical etching is processes of path formation in the detector, during which a suitable etching solut

... Show More
View Publication
Crossref
Publication Date
Mon Feb 12 2024
Journal Name
Mustansiriyah Journal Of Sports Science
The effect of special exercises in restoring lost physical fitness after childbirth at ages (25-30) years
...Show More Authors

The importance of the study, which is how to use these exercises with the device in rehabilitating the flabby muscles after childbirth, which is a problem found in our society and in need of high education on it because the form of exercises does not need places designated for training such as halls or fitness halls, especially since the social woman has limited movement in which we see the responses Physiology in different ways, the woman’s body is not only subject to the day’s need for work or the need to complete hours of physical training, but she has feminist components that she must overcome, whether it is physiological or otherwise.The research sample was determined by the intentional method available from women whose age

... Show More
View Publication
Crossref