The recent advancements in security approaches have significantly increased the ability to identify and mitigate any type of threat or attack in any network infrastructure, such as a software-defined network (SDN), and protect the internet security architecture against a variety of threats or attacks. Machine learning (ML) and deep learning (DL) are among the most popular techniques for preventing distributed denial-of-service (DDoS) attacks on any kind of network. The objective of this systematic review is to identify, evaluate, and discuss new efforts on ML/DL-based DDoS attack detection strategies in SDN networks. To reach our objective, we conducted a systematic review in which we looked for publications that used ML/DL approaches to identify DDoS attacks in SDN networks between 2018 and the beginning of November 2022. To search the contemporary literature, we have extensively utilized a number of digital libraries (including IEEE, ACM, Springer, and other digital libraries) and one academic search engine (Google Scholar). We have analyzed the relevant studies and categorized the results of the SLR into five areas: (i) The different types of DDoS attack detection in ML/DL approaches; (ii) the methodologies, strengths, and weaknesses of existing ML/DL approaches for DDoS attacks detection; (iii) benchmarked datasets and classes of attacks in datasets used in the existing literature; (iv) the preprocessing strategies, hyperparameter values, experimental setups, and performance metrics used in the existing literature; and (v) current research gaps and promising future directions.
The Machine learning methods, which are one of the most important branches of promising artificial intelligence, have great importance in all sciences such as engineering, medical, and also recently involved widely in statistical sciences and its various branches, including analysis of survival, as it can be considered a new branch used to estimate the survival and was parallel with parametric, nonparametric and semi-parametric methods that are widely used to estimate survival in statistical research. In this paper, the estimate of survival based on medical images of patients with breast cancer who receive their treatment in Iraqi hospitals was discussed. Three algorithms for feature extraction were explained: The first principal compone
... Show MoreBackground: Rheumatoid arthritis (RA) is a chronic and systemic autoimmune disease that is characterized by severe synovial inflammation, cartilage erosion, bone loss, and generalized vasculopathy. Although the immunologic mechanism of RA is still unclear, it is now thought to be a primarily Th17-driven disease. Along with other factors, IL-23 stimulates the expansion of Th17 cells from naive CD4+ T cells.
Objective: The objective of this study is to assess the circulating levels of interleukin (IL)-23 in rheumatoid arthritis (RA) and determine the correlation between plasma/serum IL-23 levels and disease activity. So, we performed a systematic review with meta-analysis comparing
... Show MoreInterface bonding between asphalt layers has been a topic of international investigation over the last thirty years. In this condition, a number of researchers have made their own techniques and used them to examine the characteristics of pavement interfaces. It is obvious that test findings won't always be comparable to the lack of a globally standard methodology for interface bonding. Also, several kinds of research have shown that factors like temperature, loading conditions, materials, and others have an impact on surface qualities. This study aims to solve this problem by thoroughly investigating interface bond testing that might serve as a basis for a uniform strategy. First, a general explanation of how
... Show MoreInterface bonding between asphalt layers has been a topic of international investigation over the last thirty years. In this condition, a number of researchers have made their own techniques and used them to examine the characteristics of pavement interfaces. It is obvious that test findings won't always be comparable to the lack of a globally standard methodology for interface bonding. Also, several kinds of research have shown that factors like temperature, loading conditions, materials, and others have an impact on surface qualities. This study aims to solve this problem by thoroughly investigating interface bond testing that might serve as a basis for a uniform strategy. First, a general explanation of how the bonding strength
... Show MorePurpose: To explore whether baseline matrix metalloproteinase (MMP)-8 level in gingival crevicular fluid (GCF) (exposure) can predict the outcome (reduction in probing pocket depth (PPD) (outcome)) of nonsurgical periodontal therapy (NSPT) (manual or ultrasonic or both) in patients with periodontitis (population/problem) after 3 months. Methods: Six databases (PubMed, Cochrane library, ProQuest, Ovid, Scopus, EBSCO) were searched for relevant articles published until 30 July 2021. Retrieved articles were passed through a three-phase filtration process on the basis of the eligibility criteria. The primary outcome was the change in PPD after 3 months. Quality of the selected articles was assessed using Cochrane Risk of Bias tool (RoB2
... Show MoreBreast cancer is the second deadliest disease infected women worldwide. For this
reason the early detection is one of the most essential stop to overcomeit dependingon
automatic devices like artificial intelligent. Medical applications of machine learning
algorithmsare mostly based on their ability to handle classification problems,
including classifications of illnesses or to estimate prognosis. Before machine
learningis applied for diagnosis, it must be trained first. The research methodology
which isdetermines differentofmachine learning algorithms,such as Random tree,
ID3, CART, SMO, C4.5 and Naive Bayesto finds the best training algorithm result.
The contribution of this research is test the data set with mis
Corona virus sickness has become a big public health issue in 2019. Because of its contact-transparent characteristics, it is rapidly spreading. The use of a face mask is among the most efficient methods for preventing the transmission of the Covid-19 virus. Wearing the face mask alone can cut the chance of catching the virus by over 70\%. Consequently, World Health Organization (WHO) advised wearing masks in crowded places as precautionary measures. Because of the incorrect use of facial masks, illnesses have spread rapidly in some locations. To solve this challenge, we needed a reliable mask monitoring system. Numerous government entities are attempting to make wearing a face mask mandatory; this process can be facilitated by using face m
... Show MoreFruits sorting, recognizing, and classifying are essential post-harvest operations, as they contribute to the quality of food industry, thereby increasing the exported quantity of food. Today, an automated system for fruit classification and recognition is very important, especially when exporting to markets where quality of fruit must be high. In this study, the advantages and disadvantages of the various shape-based feature extraction algorithms and technologies that are used in sorting, classifying, and grading of fruits, as well as fruits quality estimation, are discussed in order to provide a good understanding of the use of shape-based feature extraction techniques.
Precision irrigation applications are used to optimize the use of water resources, by controlling plant water requirements through using different systems according to soil moisture and plant growth periods. In precision irrigation, different rates of irrigation water are applied to different places of the land in comparison with traditional irrigation methods. Thus the cost of irrigation water is reduced. As a result of the fact that precise irrigation can be used and applied in all irrigation systems, it spreads rapidly in all irrigation systems. The purpose of the Precision Agriculture Technology System (precision irrigation) , is to apply the required level of irrigation according to agricultural inputs to the specified location , by us
... Show More