The recent advancements in security approaches have significantly increased the ability to identify and mitigate any type of threat or attack in any network infrastructure, such as a software-defined network (SDN), and protect the internet security architecture against a variety of threats or attacks. Machine learning (ML) and deep learning (DL) are among the most popular techniques for preventing distributed denial-of-service (DDoS) attacks on any kind of network. The objective of this systematic review is to identify, evaluate, and discuss new efforts on ML/DL-based DDoS attack detection strategies in SDN networks. To reach our objective, we conducted a systematic review in which we looked for publications that used ML/DL approaches to identify DDoS attacks in SDN networks between 2018 and the beginning of November 2022. To search the contemporary literature, we have extensively utilized a number of digital libraries (including IEEE, ACM, Springer, and other digital libraries) and one academic search engine (Google Scholar). We have analyzed the relevant studies and categorized the results of the SLR into five areas: (i) The different types of DDoS attack detection in ML/DL approaches; (ii) the methodologies, strengths, and weaknesses of existing ML/DL approaches for DDoS attacks detection; (iii) benchmarked datasets and classes of attacks in datasets used in the existing literature; (iv) the preprocessing strategies, hyperparameter values, experimental setups, and performance metrics used in the existing literature; and (v) current research gaps and promising future directions.
Rheumatoid arthritis is a chronic, progressive, inflammatory autoimmune disease of unidentified etiology, associated with articular, extra-articular and systemic manifestation that require long-standing treatment. Taking patient’s beliefs about the prescribed medication in consideration had been shown to be an essential factor that affects adherence of the patient in whom having positive beliefs is an essential for better adherence. The purpose of the current study was to measure beliefs about medicines among a sample of Iraqi patients with Rheumatoid arthritis and to determine possible association between this belief and some patient-certain factors. This study is a cross-sectional study carried out on 250 already diagnosed rheumatoid
... Show MoreUnderstanding, promoting, and teaching media literacy is an important societal challenge. STEM educators are increasingly looking to incorporate 21st century skills such as media literacy into core subject education. In this paper we investigate how undergraduate Computer Science (CS) students can learn media literacy as a by-product of collaborative video tutorial production. The paper presents a study of 34 third-year CS undergraduates who, as part of their learning, were each asked to produce three video tutorials on Raspberry Pi programming, using a collaborative video production tool for mobile phones (Bootlegger). We provide results of both quantitative and qualitative analysis of the production process and resulting video tutorials,
... Show Moreplanning is among the most significant in the field of robotics research. As it is linked to finding a safe and efficient route in a cluttered environment for wheeled mobile robots and is considered a significant prerequisite for any such mobile robot project to be a success. This paper proposes the optimal path planning of the wheeled mobile robot with collision avoidance by using an algorithm called grey wolf optimization (GWO) as a method for finding the shortest and safe. The research goals in this study for identify the best path while taking into account the effect of the number of obstacles and design parameters on performance for the algorithm to find the best path. The simulations are run in the MATLAB environment to test the
... Show MoreHomomorphic encryption became popular and powerful cryptographic primitive for various cloud computing applications. In the recent decades several developments has been made. Few schemes based on coding theory have been proposed but none of them support unlimited operations with security. We propose a modified Reed-Muller Code based symmetric key fully homomorphic encryption to improve its security by using message expansion technique. Message expansion with prepended random fixed length string provides one-to-many mapping between message and codeword, thus one-to many mapping between plaintext and ciphertext. The proposed scheme supports both (MOD 2) additive and multiplication operations unlimitedly. We make an effort to prove
... Show MoreThis work involved the successful synthesis of three new Schiff base complexes, including Ni(II), Mn(II), and Cu(II) complexes. The Schiff base ligand was created by reacting the malonyldihydrazide molecule with naphthaldehyde, and the final step involved reacting the ligand with the corresponding metallic chloride yielding pure target complexes. FTIR, 1 H NMR, 13 C NMR, mass, and UV/Vis spectroscopies were used to comprehensively characterize the produced complexes. These substances have been employed in this study to photo-stabilize polystyrene (PS) and lessen the photo-degradation of its polymeric chains. Several methods, including FTIR, weight loss, viscosity average molecular weight, light and atomic force microscopy, and energy disper
... Show MoreSoil water retention curves (SWRCs) are crucial for characterizing soil moisture dynamics and are particularly relevant in the context of irrigation management. A study was carried out to obtain the SWRC, inflection point, S index, pore size distribution curve, macro porosity, and air capacity from samples submitted to saturation and re-saturation processes. Five different-texture disturbed soil samples Sandy Loam, Loam, Sandy Clay Loam, Silt Loam, and Clay were collected. After obtaining SWRC, each air-dried soil samples were submitted to particle size distribution and clay dispersed in water analyses to verify the soil lost clay. The experimental design was completely randomized with three replications using two processes of SWRC (saturat
... Show MoreDespite extensive investigation as biocompatible drug carriers, gelatin nanoparticles (GNPs) have not been thoroughly assessed for carrying chemically distinct cationic molecules such as acriflavine (ACF) and triethylenetetramine (TETA). In this study, we hypothesize that GNPs can effectively encapsulate ACF and TETA, forming stable delivery systems with distinct antibacterial and cytotoxic activities. ACF encapsulated in gelatin was prepared adapting desolvation technique. The procedure involved stirring of an aqueous solution of gelatin and ACF at room temperature, the pH was titrated to eight using NaOH followed by addition of ethanol. The resulting nanopart
This paper numerically and theoretically investigates the optical and thermal performance of a parabolic trough collector PTC system. Many numerical simulations and theoretical analyses are conducted to demonstrate the influence of the receiver geometry and shifting from the focal position on the optical performance. The examined receiver geometries are circular, square, triangular, elliptical, and the new circular–square combined geometry is named as channel receiver. The thermal performance of PTC is examined for different volume flow rates theoretically in the range of (0.36 to 2.4 lpm). The results show that the best optical design is the channel receiver with an intercept factor of 84%, while the worst is the elliptical receiver with
... Show More