Software-defined networks (SDN) have a centralized control architecture that makes them a tempting target for cyber attackers. One of the major threats is distributed denial of service (DDoS) attacks. It aims to exhaust network resources to make its services unavailable to legitimate users. DDoS attack detection based on machine learning algorithms is considered one of the most used techniques in SDN security. In this paper, four machine learning techniques (Random Forest, K-nearest neighbors, Naive Bayes, and Logistic Regression) have been tested to detect DDoS attacks. Also, a mitigation technique has been used to eliminate the attack effect on SDN. RF and KNN were selected because of their high accuracy results. Three types of network topology have been generated to observe the effectiveness of proposed algorithms on different network architectures. The results reveal that RF performs better than KNN in a single topology, and both have close performance in other topologies.
Finding the shortest route in wireless mesh networks is an important aspect. Many techniques are used to solve this problem like dynamic programming, evolutionary algorithms, weighted-sum techniques, and others. In this paper, we use dynamic programming techniques to find the shortest path in wireless mesh networks due to their generality, reduction of complexity and facilitation of numerical computation, simplicity in incorporating constraints, and their onformity to the stochastic nature of some problems. The routing problem is a multi-objective optimization problem with some constraints such as path capacity and end-to-end delay. Single-constraint routing problems and solutions using Dijkstra, Bellman-Ford, and Floyd-Warshall algorith
... Show MoreThere has been a growing interest in the use of chaotic techniques for enabling secure communication in recent years. This need has been motivated by the emergence of a number of wireless services which require the channel to provide low bit error rates (BER) along with information security. The aim of such activity is to steal or distort the information being conveyed. Optical Wireless Systems (basically Free Space Optic Systems, FSO) are no exception to this trend. Thus, there is an urgent necessity to design techniques that can secure privileged information against unauthorized eavesdroppers while simultaneously protecting information against channel-induced perturbations and errors. Conventional cryptographic techniques are not designed
... Show MoreIn this work, solid random gain media were fabricated from laser dye solutions containing nanoparticles as scattering centers. Two different rhodamine dyes (123 and 6G) were used to host the highly-pure titanium dioxide nanoparticles to form the random gain media. The spectroscopic characteristics (mainly fluorescence) of these media were determined and studied. These random gain media showed laser emission in the visible region of electromagnetic spectrum. Fluorescence characteristics can be controlled to few nanometers by adjusting the characteristics of the host and nanoparticles as well as the preparation conditions of the samples. Emission of narrow linewidth (3nm) and high intensity in the visible region (533-537nm) was obtained.
In this work, solid random gain media were fabricated from laser dye solutions containing nanoparticles as scattering centers. Two different rhodamine dyes (123 and 6G) were used to host the highly-pure titanium dioxide nanoparticles to form the random gain media. The spectroscopic characteristics (mainly fluorescence) of these media were determined and studied. These random gain media showed laser emission in the visible region of electromagnetic spectrum. Fluorescence characteristics can be controlled to few nanometers by adjusting the characteristics of the host and nanoparticles as well as the preparation conditions of the samples. Emission of narrow linewidth (3nm) and high intensity in the visible region (533-537nm) was obtained.
An Experimental comparison between the current-voltage
characteristic and the efficiency conversion from solar to electric energy were studied for square and circular single crystal silicon solar
cell of equal area (35.28 cm2) . The results show that the solar shape is
an important factor in calculating the current-voltage characteristics and efficiency of the solar cell. It was shown that the performance effici
... Show MoreSeeds of five cultivars of oats (Avena sativa) were introduced from Italy in 2009. Seeds were propagated on the farm of the Dept. of Field Crops Sci. / Coll. of Agric. / Univ. of Baghdad in the season 2009 – 2010. The cultivars Anatolia, Alguda, Hamel, Pimula and Genzania were planted under 3 irrigation intervals; 3, 4 and 5 weeks to give water depth of 480, 400 and 320 mm, respectively . The depth of water was 80 mm each irrigation. A factorial experiment with RCBD of 4 replicates was conducted in 2 consecutive seasons in 2010 – 2011 and 2011 – 2012. The cultivar Alguda gave highest grain yield (8.07 t/ ha) under 480 mm, and 7.02 t / ha average of 3 water depths. This cultivar was characterized by high growth rate (13.2 g/m2/ d) that
... Show MoreBackground: Health information systems in most countries are inadequate in providing the needed management support and the current health information systems are therefore widely seen as management obstacles rather than as tools,Objectives: the current study is an attempt to assess the behavioral and organizational determinants of health information system performance in Iraq.Methods: A cross-sectional study was conducted by interviewed a total of 189 respondents selected from six Iraqi governorates. The Organizational and Behavioral Assessment Tool was used to measure the behavioral and organizational determinants of health information system performance, it is one of the PRISM package tools that are used to assess the health informatio
... Show More