Preferred Language
Articles
/
SRepUJEBVTCNdQwC6pT_
Machine Learning Techniques to Detect a DDoS Attack in SDN: A Systematic Review
...Show More Authors

The recent advancements in security approaches have significantly increased the ability to identify and mitigate any type of threat or attack in any network infrastructure, such as a software-defined network (SDN), and protect the internet security architecture against a variety of threats or attacks. Machine learning (ML) and deep learning (DL) are among the most popular techniques for preventing distributed denial-of-service (DDoS) attacks on any kind of network. The objective of this systematic review is to identify, evaluate, and discuss new efforts on ML/DL-based DDoS attack detection strategies in SDN networks. To reach our objective, we conducted a systematic review in which we looked for publications that used ML/DL approaches to identify DDoS attacks in SDN networks between 2018 and the beginning of November 2022. To search the contemporary literature, we have extensively utilized a number of digital libraries (including IEEE, ACM, Springer, and other digital libraries) and one academic search engine (Google Scholar). We have analyzed the relevant studies and categorized the results of the SLR into five areas: (i) The different types of DDoS attack detection in ML/DL approaches; (ii) the methodologies, strengths, and weaknesses of existing ML/DL approaches for DDoS attacks detection; (iii) benchmarked datasets and classes of attacks in datasets used in the existing literature; (iv) the preprocessing strategies, hyperparameter values, experimental setups, and performance metrics used in the existing literature; and (v) current research gaps and promising future directions.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Jun 06 2020
Journal Name
Journal Of The College Of Education For Women
A Critical Pragmatic Study of Racism as Conceptualized in the Glorious Quran
...Show More Authors

Racism changes its meaning, shape, purpose or function according to various factors such as time, place, motives, and backgrounds; among others. It seems, however, to have deep roots back in the history of mankind. Such a concept stems from a perceived difference with the other. It is fed by the feeling of being hierarchically superior in opposition to another party that is depicted as inferior. Since ancient times, racism is disguised in different forms and manifests itself on various levels. It is a truism that this ideology can be best presented via language.

Due to its negative implication, racism lends itself to a critical kind of research.  As such, this paper is a critical pragmatic investigation for this phenomenon a

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Fri Apr 30 2021
Journal Name
Iraqi Journal Of Science
A Genetic Algorithm for Task Allocation Problem in the Internet of Things
...Show More Authors

In the last few years, the Internet of Things (IoT) is gaining remarkable attention in both academic and industrial worlds. The main goal of the IoT is laying on describing everyday objects with different capabilities in an interconnected fashion to the Internet to share resources and to carry out the assigned tasks. Most of the IoT objects are heterogeneous in terms of the amount of energy, processing ability, memory storage, etc. However, one of the most important challenges facing the IoT networks is the energy-efficient task allocation. An efficient task allocation protocol in the IoT network should ensure the fair and efficient distribution of resources for all objects to collaborate dynamically with limited energy. The canonic

... Show More
Scopus (4)
Crossref (5)
Scopus Crossref
Publication Date
Fri Dec 01 2023
Journal Name
Al-khwarizmi Engineering Journal
Working Memory Classification Enhancement of EEG Activity in Dementia: A Comparative Study
...Show More Authors

The purpose of the current investigation is to distinguish between working memory ( ) in five patients with vascular dementia ( ), fifteen post-stroke patients with mild cognitive impairment ( ), and fifteen healthy control individuals ( ) based on background electroencephalography (EEG) activity. The elimination of EEG artifacts using wavelet (WT) pre-processing denoising is demonstrated in this study. In the current study, spectral entropy ( ), permutation entropy ( ), and approximation entropy ( ) were all explored. To improve the  classification using the k-nearest neighbors ( NN) classifier scheme, a comparative study of using fuzzy neighbourhood preserving analysis with -decomposition ( ) as a dimensionality reduction technique an

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (2)
Scopus Crossref
Publication Date
Mon Jul 31 2023
Journal Name
Iraqi Geological Journal
Building of a Static Model for Jeribe Formation in Jambour Oil Field
...Show More Authors

The Jeribe Formation, the Jambour oil field, is the major carbonate reservoir from the tertiary reservoirs of the Jambour field in northern Iraq, including faults. Engineers have difficulty organizing carbonate reserves since they are commonly tight and heterogeneous. This research presents a geological model of the Jeribe reservoir based on its facies and reservoir characterization data (Permeability, Porosity, Water Saturation, and Net to Gross). This research studied four wells. The geological model was constructed with the Petrel 2020.3 software. The structural maps were developed using a structural contour map of the top of the Jeribe Formation. A pillar grid model with horizons and layering was designed for each zone. Followin

... Show More
View Publication
Scopus (5)
Crossref (1)
Scopus Crossref
Publication Date
Sun Oct 01 2023
Journal Name
Baghdad Science Journal
Ghrelin and Obestatin Levels as a Novel Marker in Iraqi Obese Children
...Show More Authors

Obesity is an escalating health problem in developing countries. One to ten children worldwide are overweight in a report showed by the International Obesity Task Force. Ghrelin, orexigenic peptide, has 28 amino acids, it is considered the greatest remarkable promotion in the last two decades for understanding the physiological changes of action regu­lating food intake and hunger. Obestatin is a 23-amino acid peptide nearly connected to ghrelin that secures from substitutio

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (3)
Scopus Crossref
Publication Date
Thu Feb 25 2021
Journal Name
Iraqi Journal Of Agricultural Sciences
ROSEMARY VOLATILE OIL AS A PRESERVATIVE AGENT IN SOME CANNED MEAT FOODS
...Show More Authors

This research was aimed to evaluate activity of Rosemary volatile oil and Nisin A in vivo and on B. cereus isolated from some canned meat products in vitro. The results showed that the activity of Rosemary volatile oil (2000 µg/ml) and Nisin A (350 µg\ml) attained to 27 and 19 mm inhibitory zone diameter respectively in well diffusion method. The viable plate count from samples of canned meat treated with effective concentration of Rosemary volatile oil and Nisin A were examined. The samples with Rosemary volatile oil was not showed any CFU/g after 9 days of preservation while sample with Nisin A and control observed 49 and 45 CFU/g respectively. In vivo experiment on mice, two weeks after oral dose of Rosemary volatile oil (2000

... Show More
Scopus (21)
Crossref (11)
Scopus Clarivate Crossref
Publication Date
Tue Jul 11 2023
Journal Name
Laser Physics
Tunneling induced swapping of orbital angular momentum in a quantum dot molecule
...Show More Authors
Abstract<p>In this paper, we have examined the effectiveness exchange of optical vorticity via three-wave mixing (TWM) technique in a four-level quantum dot (QD) molecule by means of the electron tunneling effect. Our analytical analysis demonstrates that the TWM procedure can result in the production of a new weak signal beam that may be absorbed or amplified within the QD molecule. We have taken into account the electron tunneling as well as the relative phase of the applied lights to assess the absorption and dispersion characteristics of the newly generated light. We have discovered that the slow light propagation and signal amplification can be achieved. Our results show that the exchange o</p> ... Show More
View Publication
Scopus (3)
Scopus Clarivate Crossref
Publication Date
Wed Aug 28 2019
Journal Name
Journal Of Engineering
Predicting Wetting Patterns in Soil from a Single Subsurface Drip Irrigation System
...Show More Authors

Soil wetted pattern from a subsurface drip plays great importance in the design of subsurface drip irrigation (SDI) system for delivering the required water directly to the roots of the plant. An equation to estimate the dimensions of the wetted area in soil are taking into account water uptake by roots is simulated numerically using HYDRUS (2D/3D) software. In this paper, three soil textures namely loamy sand, sandy loam, and loam soil were used with three different types of crops tomato, pepper, and cucumber, respectively, and different values of drip discharge, drip depth, and initial soil moisture content were proposed. The soil wetting patterns were obtained at every thirty minutes for a total time of irrigation equ

... Show More
View Publication Preview PDF
Crossref (10)
Crossref
Publication Date
Thu Aug 07 2025
Journal Name
Journal Of Image And Graphics
Analysis Evolution of Image Caption Techniques: Combining Conventional and Modern Methods for Improvement
...Show More Authors

This study explores the challenges in Artificial Intelligence (AI) systems in generating image captions, a task that requires effective integration of computer vision and natural language processing techniques. A comparative analysis between traditional approaches such as retrieval- based methods and linguistic templates) and modern approaches based on deep learning such as encoder-decoder models, attention mechanisms, and transformers). Theoretical results show that modern models perform better for the accuracy and the ability to generate more complex descriptions, while traditional methods outperform speed and simplicity. The paper proposes a hybrid framework that combines the advantages of both approaches, where conventional methods prod

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Sat Dec 01 2012
Journal Name
2012 International Conference On Radar, Communication And Computing (icrcc)
BER performance improvement for secure wireless communication systems based on CSK- STBC techniques
...Show More Authors

There has been a growing interest in the use of chaotic techniques for enabling secure communication in recent years. This need has been motivated by the emergence of a number of wireless services which require the channel to provide very low bit error rates (BER) along with information security. This paper investigates the feasibility of using chaotic communications over Multiple-Input Multiple-Output (MIMO) channels by combining chaos modulation with a suitable Space Time Block Code (STBC). It is well known that the use of Chaotic Modulation techniques can enhance communication security. However, the performance of systems using Chaos modulation has been observed to be inferior in BER performance as compared to conventional communication

... Show More
View Publication
Scopus (3)
Crossref (3)
Scopus Crossref