The recent advancements in security approaches have significantly increased the ability to identify and mitigate any type of threat or attack in any network infrastructure, such as a software-defined network (SDN), and protect the internet security architecture against a variety of threats or attacks. Machine learning (ML) and deep learning (DL) are among the most popular techniques for preventing distributed denial-of-service (DDoS) attacks on any kind of network. The objective of this systematic review is to identify, evaluate, and discuss new efforts on ML/DL-based DDoS attack detection strategies in SDN networks. To reach our objective, we conducted a systematic review in which we looked for publications that used ML/DL approaches to identify DDoS attacks in SDN networks between 2018 and the beginning of November 2022. To search the contemporary literature, we have extensively utilized a number of digital libraries (including IEEE, ACM, Springer, and other digital libraries) and one academic search engine (Google Scholar). We have analyzed the relevant studies and categorized the results of the SLR into five areas: (i) The different types of DDoS attack detection in ML/DL approaches; (ii) the methodologies, strengths, and weaknesses of existing ML/DL approaches for DDoS attacks detection; (iii) benchmarked datasets and classes of attacks in datasets used in the existing literature; (iv) the preprocessing strategies, hyperparameter values, experimental setups, and performance metrics used in the existing literature; and (v) current research gaps and promising future directions.
Background: Salivary tumors are uncommon, being of low incidence worldwide. This study aimed to assess cases collected in this series of salivary gland tumors in regard to histopathological typing, in relation to age, site and gender. Materials and methods: This is a retrospective study; cases were collected from public and private laboratories. A total number of 171 cases were collected. The slides were reviewed and reclassified for histopathological typing according to WHO classification 2005. Results: Benign tumors were more common than malignant tumors. The most common histological type was benign mixed tumor, followed by Warthin’s tumor. The most common malignant tumor was adenoid cystic carcinoma. One hundred twenty three cases ou
... Show MoreABSTRACT: Oxadiazole ring is a heterocyclic molecule with an oxygen and two nitrogen atoms spread throughout its five-membered structure. There are four different isomers that have been discovered, Because of their wide applications in a range of sectors, including medications . Some of these biological activity are; anticonvulsant capacity, anticancer as well, antibacterial, antiviral, antifungal, antimalarial, antitubercular, anti-asthmatic, antidepressant, antidiabetic, antioxidant, antiparkinsonian, analgesic and anti-inflammatory, are just some of the therapeutic uses that have drawn attention to drug candidates containing an oxadiazole moiety. This review, we will examine the various methods of oxadiazole synthesis. The mo
... Show MoreInefficient wastewater disposal and wastewater discharge problems in water bodies have led to increasing pollution in water bodies. Pollutants in the river contribute to increasing the biological oxygen demand (BOD), total suspended solids (SS), total dissolved solids (TDS), chemical oxygen demand (COD), and toxic metals render this water unsuitable for consumption and even pose a significant risk to human health. Over the last few years, water conservation has been the subject of growing awareness and concern throughout the world, so this research focused on review studies of researches that studied the importance of water quality of wastewater treated disposal in water bodies and modern technology to management w
... Show MoreHistorically, medicinal herbs have been utilized as an important origin of chemicals with particular therapeutic potentials, and they continue to be a great place to find new medication candidates. Parthenocissus quinquefolia L. is a member of the grape-growing family Vitaceae. It is indigenous to Central and North America. It is widely dispersed in Iraqi gardens and plant houses from north to south. Traditionally, it has many uses, like relieving constipation, treating jaundice, expectorant, emetic, and others. At the same time, its proven activities include antioxidant activity, antimicrobial, anti-diabetic, thrombin inhibitor effect, and medicine for treating eyelid eczema. Parthenocissus quinquefolia contains valuable phytochemicals lik
... Show MoreOne of the main causes for concern is the widespread presence of pharmaceuticals in the environment, which may be harmful to living things. They are often referred to as emerging chemical pollutants in water bodies because they are either still unregulated or undergoing regulation. Pharmaceutical pollution of the environment may have detrimental effects on ecosystem viability, human health, and water quality. In this study, the amount of remaining pharmaceutical compounds in environmental waters was determined using a straightforward review. Pharmaceutical production and consumption have increased due to medical advancements, leading to concerns about their environmental impact and potential harm to living things due to their increa
... Show MoreMultilayer reservoirs are currently modeled as a single zone system by averaging the reservoir parameters associated with each reservoir zone. However, this type of modeling is rarely accurate because a single zone system does not account for the fact that each zone's pressure decreases independently. Pressure drop for each zone has an effect on the total output and would result in inter-flow and the premature depletion of one of the zones. Understanding reservoir performance requires a precise estimation of each layer's permeability and skin factor. The Multilayer Transient Analysis is a well-testing technique designed to determine formation properties in more than one layer, and its effectiveness over the past two decades has been
... Show MoreMobile ad hoc network security is a new area for research that it has been faced many difficulties to implement. These difficulties are due to the absence of central authentication server, the dynamically movement of the nodes (mobility), limited capacity of the wireless medium and the various types of vulnerability attacks. All these factor combine to make mobile ad hoc a great challenge to the researcher. Mobile ad hoc has been used in different applications networks range from military operations and emergency disaster relief to community networking and interaction among meeting attendees or students during a lecture. In these and other ad hoc networking applications, security in the routing protocol is necessary to protect against malic
... Show More