Software-defined networks (SDN) have a centralized control architecture that makes them a tempting target for cyber attackers. One of the major threats is distributed denial of service (DDoS) attacks. It aims to exhaust network resources to make its services unavailable to legitimate users. DDoS attack detection based on machine learning algorithms is considered one of the most used techniques in SDN security. In this paper, four machine learning techniques (Random Forest, K-nearest neighbors, Naive Bayes, and Logistic Regression) have been tested to detect DDoS attacks. Also, a mitigation technique has been used to eliminate the attack effect on SDN. RF and KNN were selected because of their high accuracy results. Three types of network topology have been generated to observe the effectiveness of proposed algorithms on different network architectures. The results reveal that RF performs better than KNN in a single topology, and both have close performance in other topologies.
Smart systems are the trend for modern organizations and should meet the quality of services that expect to produce. Internet of Everything (IoE) helped smart systems to adopt microcontrollers for improving the performance. Analyzing and controlling data in such a system are critical issues. In this study, a survey of IoE systems conducted to show how to apply a suitable model that meets such system requirements. The analysis of some microcontroller boards is explored based on known features. Factors for applying IoE devices have been defined such as connectivity, power consumption, compatibility, and cost. Different methods have been explained as an overview of applying IoE systems. Further, different approaches for applying IoE technology
... Show MoreTo determine the relationship between herpes simplex virus 1, 2 and neurological disorders, sixty samples from patients with neurological diseases were collected (40 patients with Multiple sclerosis and 20 patients with Parkinson’s disease) all of whom attended both the Neurological science Hospital as well as the Neuropathology consultation Department in Baghdad Hospital In Iraq. The samples were collected in the time frame between November 2017 and April 2018. The ages of the patients that were investigated were between (17-76) years and compared to a control group consisting of 25 samples collected from apparently healthy individuals. All the studied groups were subjected to the measurement of anti-HSV 1, 2 IgG antibodies by the means
... Show MoreThe study aims to identify the level of cognitive beliefs, as well as to identify the level of self-organized learning strategies among intermediate school students. The study also aims to identify the differences in the level of self-organized learning strategies among intermediate school students in term of gender, branch (scientific, literary). In order to achieve the research objectives, the researcher designed a scale to measure the cognitive beliefs. As for the scale of self-organized learning strategies, the researcher adopted a scale of (Pintrich et al. 1991), which was translated by (Izzat Abdelhamid, 1999) , For self-organized learning strategies, the sample consisted of (400) students from the research population, whic
... Show MoreIncorporating modern technology into education is becoming imperative. Numerous pharmacy institutions are incorporating virtual reality (VR) technology training into their curricula to enhance educational experience. This review examines the current state, historical evolution, and application of VR programs in pharmacy education and training. The review also provides details about the main challenges and limitations associated with the use of this technology. The VR technology, including virtual laboratories and simulations, significantly improves clinical training and educational outcomes. The utilization of VR in clinical teaching encounters numerous barriers, including ethical concerns and technological constraints, as well as other res
... Show MoreWith the aim of developing potential antimicrobials, a series of new 5-fluoroisatin derivatives incorporated with different secondary amines (piperidine, morpholine, pyrrolidine, dimethylamine, and diphenylamine) for monomer, and (piperazine) in case of dimer Mannich bases, separately in presence of formaldehyde to obtain Mannich bases of 5-fluoroisatin derivatives, which then each Mannich derivatives reacts with phenylhydrazine to form Schiff bases as final products. The resulting compounds were characterized by two spectroscopic analyses; (Fourier- transform infrared) FT-IR and proton nuclear magnetic resonance spectroscopy (¹H-NMR). In addition, the in vitro antibacterial and antifungal activities were tested against some human pathogen
... Show MoreThe aim of present study was to develop solid and liquid self-microemulsifying drug delivery system of poorly water soluble drug mebendazole using Aerosil 200 as solid carrier. Microemulsions are clear, stable, isotropic liquid mixtures of oil, water and surfactant, frequently in combination with a co-surfactant having droplet size range usually in the range of 20-250 nm. Oleic acid, tween 80 and polypropylene glycol were selected as oil, surfactant and co-surfactant respectively and for preparation of stable SMEDDS, micro emulsion region was identified by constructing pseudo ternary phase diagram containing different proportion of surfactant: co-surfactant (1:1, 2:1 and 3:1), oil and water. In brief S/ CoS mix means su
... Show MoreThe financial markets are one of the sectors whose data is characterized by continuous movement in most of the times and it is constantly changing, so it is difficult to predict its trends , and this leads to the need of methods , means and techniques for making decisions, and that pushes investors and analysts in the financial markets to use various and different methods in order to reach at predicting the movement of the direction of the financial markets. In order to reach the goal of making decisions in different investments, where the algorithm of the support vector machine and the CART regression tree algorithm are used to classify the stock data in order to determine
... Show MoreHuman herpes virus-8 (HHV-8) infection has increased recently in Arabic countries. HHV-8 in healthy persons does not necessarily cause life-threatening infection, and however, it causes a more severe infection among immunocompromised patients. The distribution of HHV-8 genotypes varies according to ethnicity and depends on the geographic region prior rapid development of global travel. A cross sectional prospective study included a hundred healthy blood donor samples with a mean age of (36.60±10.381), 81% were positive for molecular detection of HHV-8 DNA. PCR results for HHV-8 were strongly related with risk factors such as the number of sexual relations, previous surgeries, blood transfusion, dental operation, and the number of b
... Show MoreAt the last two decades , The environment has witnessed tremendous changes in many fields with the huge competition , various technological development and customer satisfaction , that are reflected in economic units a doption for lean production system.
Lean accounting that has appeared as a response for change occurred of economic units adoption for changes occurred of economic units adoption for lean production instead of wide production system , has devised new performance measures suitable for economic units adoption for lean ideas: and helping in providing suitable information about evaluating economic unit performance , these measures are divided into three levels , cell level,value flow level , a
... Show MoreNon-orthogonal Multiple Access (NOMA) is a multiple-access technique allowing multiusers to share the same communication resources, increasing spectral efficiency and throughput. NOMA has been shown to provide significant performance gains over orthogonal multiple access (OMA) regarding spectral efficiency and throughput. In this paper, two scenarios of NOMA are analyzed and simulated, involving two users and multiple users (four users) to evaluate NOMA's performance. The simulated results indicate that the achievable sum rate for the two users’ scenarios is 16.7 (bps/Hz), while for the multi-users scenario is 20.69 (bps/Hz) at transmitted power of 25 dBm. The BER for two users’ scenarios is 0.004202 and 0.001564 for
... Show More