Software-defined networks (SDN) have a centralized control architecture that makes them a tempting target for cyber attackers. One of the major threats is distributed denial of service (DDoS) attacks. It aims to exhaust network resources to make its services unavailable to legitimate users. DDoS attack detection based on machine learning algorithms is considered one of the most used techniques in SDN security. In this paper, four machine learning techniques (Random Forest, K-nearest neighbors, Naive Bayes, and Logistic Regression) have been tested to detect DDoS attacks. Also, a mitigation technique has been used to eliminate the attack effect on SDN. RF and KNN were selected because of their high accuracy results. Three types of network topology have been generated to observe the effectiveness of proposed algorithms on different network architectures. The results reveal that RF performs better than KNN in a single topology, and both have close performance in other topologies.
The auditor has a role in allocating joint costs in the gas industry, and the auditor's procedures are considered as systematic critical examination, analysis and evaluation of everything related to costs in general and joint costs in the gas industry in particular, with the aim of controlling the joint costs of gas industry products, and knowing the share of the cost of each product from the total industry costs Gas products reflect the reality of the company's performance by discovering weaknesses, defects and any errors, to ensure increased effectiveness and efficiency of the parties concerned with auditing them and imposing control and control over the company's resources, as well as
... Show MoreLately great interests have emerged to find educational alternatives to teach and improve motor skills according to modern educational methods that take into account individual differences and speed in learning for the learner through individual learning that the learner adopts by teaching himself by passing through various educational situations to acquire skills and information in the way he is The learner is the focus of the educational process and among these alternatives the interactive video, the researchers noted through the educational training units at the Model Squash School of the Central Union, and that most of the methods and methods used in learning basic skills take a lot of time in the educational program and do not involve
... Show MoreThe research aimed to identify "the effectiveness of educational-learning design according to the model of brain compatibility in achievement among firstmiddle grade students in mathematics", in schools affiliated with the Second Karkh Directorate of Education. To achieve the goal of research, the following zero hypothesis has been formulated: " There is no statistically significant difference at the semantic level (05.0) between the average scores of experimental group students who will study with design accreditation (educational - learning) according to the brain compatibility model and the grades of control group students who will study in the usual way in the achievement thinking test". The research community, which is represented by
... Show MoreAbstract: The aim of the research identify the effect of using the five-finger strategy in learning a movement chain on the balance beam apparatus for students in the third stage in the College of Physical Education and Sports Science, as well as to identify which groups (experimental and controlling) are better in learning the kinematic chain on the balance beam device, has been used The experimental approach is to design the experimental and control groups with pre-and post-test. The research sample was represented by third-graders, as the third division (j) was chosen by lot to represent the experimental group, and a division Third (i) to represent the control group, after which (10) students from each division were tested by lot to repr
... Show MoreIn this study, a traumatic spinal cord injury (TSCI) classification system is proposed using a convolutional neural network (CNN) technique with automatically learned features from electromyography (EMG) signals for a non-human primate (NHP) model. A comparison between the proposed classification system and a classical classification method (k-nearest neighbors, kNN) is also presented. Developing such an NHP model with a suitable assessment tool (i.e., classifier) is a crucial step in detecting the effect of TSCI using EMG, which is expected to be essential in the evaluation of the efficacy of new TSCI treatments. Intramuscular EMG data were collected from an agonist/antagonist tail muscle pair for the pre- and post-spinal cord lesi
... Show MoreThe current study aims to investigate the effect of strategic knowledge management practices on an excellent performance at the Institution of Industrial Development and Research- the Ministry of Iraqi Industry (IDRMII). The present research is designed according to the descriptive method. To achieve the mentioned research objective, the researchers used the questionnaire as the main data collection tool. The research sample was 150 managers who are working at the top and middle management levels. To analyses the data gathered and reaching the results, several statistical techniques were used within AMOS.V25, SPSS.V21Software, This study reached a set of results, the most important of which is the existence of a positive correlat
... Show MoreThis research aims to knowledge of the scope of applying the international specification of which is regarded to occupational health and safety management system (OHSAS 18001) second edition for year 2007 by The AL-Mammon Factory / The General Company For Vegetable Oils Industry in order to diagnosis the gap between specification requirements and reality by using the checklist made based upon the items of the specification, after translating the English copy into Arabic. The results of the research and analysis that occupational health and safety management system in comparison to the specification requirements in all of its main items, which was (%22.26) applied and documented partly, this refer to the existence of great gap (%7
... Show MoreResearch includes evaluation of projects implemented and which entered into trial operation period in accordance with the evaluation criteria and of (cost, quality and time) to determine the size deviations gap for the sample of projects during the years of assessment (2011-2012-2013-2014) of each of the three evaluation criteria, and then followed by a calculation the size of the overall gap to the problem based on the research problem to determine deviations from the specific implementation of each project by answering several questions to answer turns out the reasons for these deviations occur.
The importance of research Focus on the evaluation of received projects from contractors executing the projec
... Show MoreSome auditors may think that the audit process ends with discovering misstatements and informing management about them, while the discovery of misstatements may be classified by some as the first step in the phase of separating these distortions, as the auditor should collect these misstatements, evaluate them and detail them into misstatements involving errors or misstatements involving fraud Then evaluating it to material or immaterial according to what was stated in the international auditing standards and directing management to amend the essential ones. The importance of this research lies in identifying the concept of distortions and their types, identifying the method of evaluating distortions into substantial and non-essent
... Show More