Software-defined networks (SDN) have a centralized control architecture that makes them a tempting target for cyber attackers. One of the major threats is distributed denial of service (DDoS) attacks. It aims to exhaust network resources to make its services unavailable to legitimate users. DDoS attack detection based on machine learning algorithms is considered one of the most used techniques in SDN security. In this paper, four machine learning techniques (Random Forest, K-nearest neighbors, Naive Bayes, and Logistic Regression) have been tested to detect DDoS attacks. Also, a mitigation technique has been used to eliminate the attack effect on SDN. RF and KNN were selected because of their high accuracy results. Three types of network topology have been generated to observe the effectiveness of proposed algorithms on different network architectures. The results reveal that RF performs better than KNN in a single topology, and both have close performance in other topologies.
True random number generators are essential components for communications to be conconfidentially secured. In this paper a new method is proposed to generate random sequences of numbers based on the difference of the arrival times of photons detected in a coincidence window between two single-photon counting modules
In this paper, we applied the concept of the error analysis using the linearization method and new condition numbers constituting optimal bounds in appraisals of the possible errors. Evaluations of finite continued fractions, computations of determinates of tridiagonal systems, of determinates of second order and a "fast" complex multiplication. As in Horner's scheme, present rounding error analysis of product and summation algorithms. The error estimates are tested by numerical examples. The executed program for calculation is "MATLAB 7" from the website "Mathworks.com
The expanding use of multi-processor supercomputers has made a significant impact on the speed and size of many problems. The adaptation of standard Message Passing Interface protocol (MPI) has enabled programmers to write portable and efficient codes across a wide variety of parallel architectures. Sorting is one of the most common operations performed by a computer. Because sorted data are easier to manipulate than randomly ordered data, many algorithms require sorted data. Sorting is of additional importance to parallel computing because of its close relation to the task of routing data among processes, which is an essential part of many parallel algorithms. In this paper, sequential sorting algorithms, the parallel implementation of man
... Show MoreIn this research, some thermophysical properties of ethylene glycol with water (H2O) and two solvent mixtures dimethylformamide/ water (DMF + H2O) were studied. The densities (ρ) and viscosities (η) of ethylene glycol in water and a mixed solvent dimethylformamide (DMF + H2O) were determined at 298.15 K, t and a range of concentrations from 0.1 to1.0 molar. The ρ and η values were subsequently used to calculate the thermodynamics of mixing including the apparent molar volume (ϕv), partial molar volume (ϕvo) at infinite dilution. The solute-solute interaction is presented by Sv results from the equation ∅_v=ϕ_v^o+S_v √m. The values of viscosity (B) coefficients and Falkenhagen coefficient(A) of the Jone-Dole equation and Gibbs fre
... Show MoreSilybum marianum, from which silymarin (SM) is extracted, is a medicinal herb. In the Biopharmaceutics Classification System, it is of the class II type, meaning it is almost completely insoluble in water. It has a number of therapeutic properties, including anti-inflammatory as well as properties that promote wound healing.
This research target is to promote the dissolution and solubility of SM by employing a technique called solid dispersion and then incorporating the formula of solid dispersion into a topical gel that can be used for wound healing.
Solid dispersion is a technique used to enhance solubility and dissolve pharmaceuticals that are not water-soluble. This method is widely used because of its low cos
... Show MoreViscosities (η) and densities (ρ) of atenolol and propranolol hydrochloride in water and in concentrations (0.05 M) and (0.1 M) aqueous solution of threonine have been used to reform different important thermodynamic parameters like apparent molal volumes fv partial molal volumes at infinite dilution fvo , transfer volume fvo (tr), the slop Sv , Gibbs free energy of activation for viscous flow of solution ΔG*1,2 and the B-coefficient have been calculated using Jones-Dole equation. These thermodynamic parameters have been predicted in terms of solute-solute and solute-solvent interaction.
Apparent molar volume, V?, and viscosity B-coefficient of nicotinc acid in water and in aqueous NaCl solutions have been determined from density and viscosity measurements at (293.15, 298.15, 303.15 and 308.15) K. The experimental density data were evaluated by Masson equation, and the derived, apparent molar volume at infinite dilution, Vo?, and the slope Sv, were interpreted in term of solute-solvent and solute- solute interactions. Transfer apparent molar volumes at infinite dilution of nicotinic acid from water to NaCl solutions at various temperatures have been calculated.The viscosity data have been analyzed using Jones-Dole equation, and the derived parameters, Jones-Dolecoefficient, B,and Falkenhagen coefficient,A, have been also in
... Show MoreThis paper is interested in certain subclasses of univalent and bi-univalent functions concerning to shell- like curves connected with k-Fibonacci numbers involving modified Sigmoid activation function θ(t)=2/(1+e^(-t) ) ,t ≥0 in unit disk |z|<1 . For estimating of the initial coefficients |c_2 | , |c_3 |, Fekete-Szego ̈ inequality and the second Hankel determinant have been investigated for the functions in our classes.
The research's aim is to place two teaching methods ( total and analytical method) and to know which one of them is better than the other in teaching the counter-attack with Epee. The researchers have used the experimental method for being considered suitable to solve the problem of the research. The sample of the research includes third –stage female students of college of physical education and sport sciences / Baghdad University in the subject of fencing, their number amounted 60 female students. It has been used SPSS for processing the results. They have concluded that the two groups of the research and the two methods (( total and analytical) have learnt the counter- attack of the two over mentioned groups. they have recommended to c
... Show More