Software-defined networks (SDN) have a centralized control architecture that makes them a tempting target for cyber attackers. One of the major threats is distributed denial of service (DDoS) attacks. It aims to exhaust network resources to make its services unavailable to legitimate users. DDoS attack detection based on machine learning algorithms is considered one of the most used techniques in SDN security. In this paper, four machine learning techniques (Random Forest, K-nearest neighbors, Naive Bayes, and Logistic Regression) have been tested to detect DDoS attacks. Also, a mitigation technique has been used to eliminate the attack effect on SDN. RF and KNN were selected because of their high accuracy results. Three types of network topology have been generated to observe the effectiveness of proposed algorithms on different network architectures. The results reveal that RF performs better than KNN in a single topology, and both have close performance in other topologies.
Far infrared photoconductive detectors based on multi-wall carbon nanotubes (MWCNTs) were fabricated and their characteristics were tested. MWCNTs films deposited on porous silicon (PSi) nanosurface by dip and drop coating techniques. Two types of deposited methods were used; dip coating sand drop –by-drop methods. As well as two types of detector were fabricated one with aluminum mask and the other without, and their figures of merits were studied. The detectors were illuminated by 2.2 and 2.5 Watt from CO2 of 10.6 m and tested. The surface morphology for the films is studied using AFM and SEM micrographs. The films show homogeneous distributed for CNTs on the PSi layer. The root mean square (r.m.s.) of the films surface roughness in
... Show MoreThe art of preventing the detection of hidden information messages is the way that steganography work. Several algorithms have been proposed for steganographic techniques. A major portion of these algorithms is specified for image steganography because the image has a high level of redundancy. This paper proposed an image steganography technique using a dynamic threshold produced by the discrete cosine coefficient. After dividing the green and blue channel of the cover image into 1*3-pixel blocks, check if any bits of green channel block less or equal to threshold then start to store the secret bits in blue channel block, and to increase the security not all bits in the chosen block used to store the secret bits. Firstly, store in the cente
... Show MoreThe Internet of Things (IoT) is an information network that connects gadgets and sensors to allow new autonomous tasks. The Industrial Internet of Things (IIoT) refers to the integration of IoT with industrial applications. Some vital infrastructures, such as water delivery networks, use IIoT. The scattered topology of IIoT and resource limits of edge computing provide new difficulties to traditional data storage, transport, and security protection with the rapid expansion of the IIoT. In this paper, a recovery mechanism to recover the edge network failure is proposed by considering repair cost and computational demands. The NP-hard problem was divided into interdependent major and minor problems that could be solved in polynomial t
... Show MoreBackground: The healing period for bone–implant contact takes 3–6 months or even longer. Application of Escherichia coli-derived recombinant human bone morphogenetic protein-2 (ErhBMP-2) to implant surfaces has been of great interest on osseointegration due to its osteoinductive potential. The objective of this study was to evaluate the effect of ErhBMP-2 on implant stability. Materials and methods: A total of 48 dental implants were inserted in 15 patients. Twenty four implants coated with 0.5 mg/ml ErhBMP-2 (study group). The other 24 implants were uncoated (control group). Each patient was received at least two dental implants at the same session. Both groups were followed with repeated implant stability measurements by me
... Show MoreThe most important topics that constitute the aesthetic and substantive aspect of the theatrical performance represented by the spatial environment of the presentation and the proposed virtual place that contains the technical and artistic elements of the presentation and highlights the strength of influence on it. In light of the above, the researchers divided the topic into four chapters.
The first chapter contained (the methodological framework), which included the research problem with regard to the directing treatments between the directors in establishing or creating theatrical venue, the importance of the research and the aim of the research, and the limits of the research to conclude the chapter by defining the terms.
... Show MoreThis work presents the simulation of a Low density Parity Check (LDPC) coding scheme with
multiuserMulti-Carrier Code Division Multiple Access (MC-CDMA) system over Additive White
Gaussian Noise (AWGN) channel and multipath fading channels. The decoding technique used in
the simulation was iterative decoding since it gives maximum efficiency with ten iterations.
Modulation schemes that used are Phase Shift Keying (BPSK, QPSK and 16 PSK), along with the
Orthogonal Frequency Division Multiplexing (OFDM). A 12 pilot carrier were used in the estimator
to compensate channel effect. The channel model used is Long Term Evolution (LTE) channel with
Technical Specification TS 25.101v2.10 and 5 MHz bandwidth including the chan
The Research examines the transmission advantage from Floor Trading (FT) to the Electronic Trading (ET) in the Iraqi Stock Exchange (ISE). Testing three hypothesis, first, test the significant different of market depth before and after period of ET used, second, test the significant different of market liquidity also before and after period of ET used. And third test the impact of market depth and liquidity on the performance of ISE. AnEvent Study is depended with 74 observing distributed equality on research period which is extent among 2006 to 2012, Note that the event window is 5-7-2009.The Result of hypothesis testing explore that the all three null main hypothesis is refusing and accept the alternative of it's because the ET
... Show MoreBackground: This study compared in vitro the marginal adaptation of three different, low shrink, direct posterior composites Filtekâ„¢ P60 (packable composite), Filtekâ„¢ P90 (Silorane-based composite) and Sonic fillâ„¢ (nanohybrid composite) at three different composite/enamel interface regions (occlusal, proximal and gingival regions) of a standardized Class II MO cavity after thermal changes and mechanical load cycling by scanning electron microscopy. Materials and methods:Thirty six sound human maxillary first premolars of approximately comparable sizes were divided into three main groups of (12 teeth) in each according to the type of restorative material that was used: group (A) the teeth were restored with Filtekâ„¢ P6
... Show More
Abstract
This study aims to identify the degree to which the first cycle teachers use different feedback patterns in the e-learning system in addition to the differences in the degree of use according to specialization, teaching experience, and in-service training in the field of classroom assessment, as well as the interaction between them. The study sample consisted of (350) female teachers of the first cycle in government schools in Muscat Governorate for the academic year 2020/2021. The study used a questionnaire that contained four different patterns of feedback, which are reinforcement, informative, corrective, and interpretive feedback. The psychometric properties of the que
... Show MoreArts acts to reduce and exclude everything that is not necessary in the delivery of meaning, especially representative performance, which is based on the intensification of the physical and vocal actions, and in drawing the dimensions of the character. And because that, the artistic staff, among others in the ministry of education, are considered the cornerstone, in the development of theatrical activities in schools, this research came to find out the extent to which teachers in primary schools, in secondary schools and artistic supervisors rely on shorthand mechanisms in the representative performance.
The current research relied on the descriptive approach, in analyzing his sample, which was deliberately chosen, Among the most imp