Software-defined networks (SDN) have a centralized control architecture that makes them a tempting target for cyber attackers. One of the major threats is distributed denial of service (DDoS) attacks. It aims to exhaust network resources to make its services unavailable to legitimate users. DDoS attack detection based on machine learning algorithms is considered one of the most used techniques in SDN security. In this paper, four machine learning techniques (Random Forest, K-nearest neighbors, Naive Bayes, and Logistic Regression) have been tested to detect DDoS attacks. Also, a mitigation technique has been used to eliminate the attack effect on SDN. RF and KNN were selected because of their high accuracy results. Three types of network topology have been generated to observe the effectiveness of proposed algorithms on different network architectures. The results reveal that RF performs better than KNN in a single topology, and both have close performance in other topologies.
Maximum values of one particle radial electronic density distribution has been calculated by using Hartree-Fock (HF)wave function with data published by[A. Sarsa et al. Atomic Data and Nuclear Data Tables 88 (2004) 163–202] for K and L shells for some Be-like ions. The Results confirm that there is a linear behavior restricted the increasing of maximum points of one particle radial electronic density distribution for K and L shells throughout some Be-like ions. This linear behavior can be described by using the nth term formula of arithmetic sequence, that can be used to calculate the maximum radial electronic density distribution for any ion within Be like ions for Z<20.
Market share is a major indication of business success. Understanding the impact of numerous economic factors on market share is critical to a company’s success. In this study, we examine the market shares of two manufacturers in a duopoly economy and present an optimal pricing approach for increasing a company’s market share. We create two numerical models based on ordinary differential equations to investigate market success. The first model takes into account quantity demand and investment in R&D, whereas the second model investigates a more realistic relationship between quantity demand and pricing.
In this paper, we present a Branch and Bound (B&B) algorithm of scheduling (n) jobs on a single machine to minimize the sum total completion time, total tardiness, total earliness, number of tardy jobs and total late work with unequal release dates. We proposed six heuristic methods for account upper bound. Also to obtain lower bound (LB) to this problem we modified a (LB) select from literature, with (Moore algorithm and Lawler's algorithm). And some dominance rules were suggested. Also, two special cases were derived. Computational experience showed the proposed (B&B) algorithm was effective in solving problems with up to (16) jobs, also the upper bounds and the lower bound were effective in restr
... Show MoreThe performa of evaluation process is a process that should be carried out by all industrial management in order to stand on aspects of development or underdevelopment of the various departments and activities in its industrial project for the purpose of identifying obstacles and find out the causes and then avoid them quickly. And intended to rectify the performance evaluation of the activities of industrial project or economic union by measuring the results achieved within a specific operational process and compare it to what is already targeted, and often the time for comparison of one year.
The process of performance evaluation depends upon several criteria and indicators within the
... Show MoreThe current study presents the simulative study and evaluation of MANET mobility models over UDP traffic pattern to determine the effects of this traffic pattern on mobility models in MANET which is implemented in NS-2.35 according to various performance metri (Throughput, AED (Average End-2-end Delay), drop packets, NRL (Normalize Routing Load) and PDF (Packet Delivery Fraction)) with various parameters such as different velocities, different environment areas, different number of nodes, different traffic rates, different traffic sources, different pause times and different simulation times . A routing protocol.…was exploited AODV(Adhoc On demand Distance Vector) and RWP (Random Waypoint), GMM (Gauss Markov Model), RPGM (Refere
... Show MoreThe aim of this investigation is to study and analysis the role of governance in the evaluation of the and social performance of the economic units to be addressed through the concept of corporate governance and then to the social performance and its relationship to corporate governance.
The most important obtained results from this research is that the corporate governance of extreme importance, and derive their importance from being an essential tool to contribute to the transparency and fair disclosure of the financial results of economic units in the fight against financial and administrative corruption in economic units, thus providing protection and confidence of all parties, and the evaluating soci
... Show MoreAbstract The purpose of this study, teach the art of performing Olympic lifts (snatch and, clean and jerk) using the two methods are instructional (self-learning associated with the model) and (reverse style of partial way). Identify the effectiveness of these methods in learning the art of performance and style of the best Olympic lifting in the learning and retention of novice for Olympic lifts. The research sample consisted of 16 lifters were selected purposively representing specialist center for the care of athletic talent to weightlifting for ages 14 years. The sample was divided into two experimental, Each group (8) eight weightlifters. The experimental group used the style of the first self-learning associated with the m
... Show MoreThe aim of this study was to identify the effectiveness of using generative learning model in learning kinetic series on rings and horizontal bar in artistic gymnastics for men ,Also, the two groups were better in learning the two series of movements on the rings and horizontal bar . The experimental method was used to design two parallel groups with pretested and posttest .The sample included third graders at the College of Physical Education and Sports Sciences - University of Baghdad ,The third class (d) was chosen to represent the control group that applied the curriculum in the college, with (12) students per group. After conducting the tribal tests, the main experiment was carried out for (8) weeks at the rate of two units per week di
... Show More