The recent advancements in security approaches have significantly increased the ability to identify and mitigate any type of threat or attack in any network infrastructure, such as a software-defined network (SDN), and protect the internet security architecture against a variety of threats or attacks. Machine learning (ML) and deep learning (DL) are among the most popular techniques for preventing distributed denial-of-service (DDoS) attacks on any kind of network. The objective of this systematic review is to identify, evaluate, and discuss new efforts on ML/DL-based DDoS attack detection strategies in SDN networks. To reach our objective, we conducted a systematic review in which we looked for publications that used ML/DL approaches to identify DDoS attacks in SDN networks between 2018 and the beginning of November 2022. To search the contemporary literature, we have extensively utilized a number of digital libraries (including IEEE, ACM, Springer, and other digital libraries) and one academic search engine (Google Scholar). We have analyzed the relevant studies and categorized the results of the SLR into five areas: (i) The different types of DDoS attack detection in ML/DL approaches; (ii) the methodologies, strengths, and weaknesses of existing ML/DL approaches for DDoS attacks detection; (iii) benchmarked datasets and classes of attacks in datasets used in the existing literature; (iv) the preprocessing strategies, hyperparameter values, experimental setups, and performance metrics used in the existing literature; and (v) current research gaps and promising future directions.
Since the time it emerged, stylistics, as a field of knowledge which combines both linguistics and literature, acquired a special status in the linguistic arena. Its significance in complementing the meaning delivered by linguistic means has been proven and acknowledged through numerous stylistic analytic attempts of different literary works and in different languages. The question put forward in this paper is whether or not the stylistic analysis can work as effectively on translated texts as it does on the original ones without having the results reached by the analysis distorting the meaning of the original text. An attempt to investigate this question is made herein by conducting a lexical stylistic analysi
... Show MoreBackground: Painful elbow joint over the lateral epicondyle especially with resisted wrist extension are common signs of lateral epicondyle tendinopathy, also called tennis elbow. Objective: To evaluate the clinical outcome of local platelet rich plasma (PRP) injection in patients with chronic tennis elbow compared with a steroid (Depomedrol 40 mg) injection. Methods: A total of 88 patients with chronic tennis elbow were treated at Al-Kindy Teaching Hospital and private clinics. All patients had chronic pain for about 24 weeks or more and had failed first line treatment. The patients dividing into two groups, Group A injected with PRP (n = 44), and group B injected with depomedrol 40 mg (n = 44). A good clinical result w
... Show MoreThe increasing availability of computing power in the past two decades has been use to develop new techniques for optimizing solution of estimation problem. Today's computational capacity and the widespread availability of computers have enabled development of new generation of intelligent computing techniques, such as our interest algorithm, this paper presents one of new class of stochastic search algorithm (known as Canonical Genetic' Algorithm ‘CGA’) for optimizing the maximum likelihood function strategy is composed of three main steps: recombination, mutation, and selection. The experimental design is based on simulating the CGA with different values of are compared with those of moment method. Based on MSE value obtained from bot
... Show MoreClassical cryptography systems exhibit major vulnerabilities because of the rapid development of quan tum computing algorithms and devices. These vulnerabilities were mitigated utilizing quantum key distribution (QKD), which is based on a quantum no-cloning algorithm that assures the safe generation and transmission of the encryption keys. A quantum computing platform, named Qiskit, was utilized by many recent researchers to analyze the security of several QKD protocols, such as BB84 and B92. In this paper, we demonstrate the simulation and implementation of a modified multistage QKD protocol by Qiskit. The simulation and implementation studies were based on the “local_qasm” simulator and the “FakeVigo” backend, respectively. T
... Show MoreBackground: Selenium-73 with half- life of 7.15 hour emits β+ in nature and has six stable isotopes which are ( 74Se,76Se,77Se,78Se,80Se and 82Se ). Selenium-73 has many applications in technology and radioselenium compounds of metallic have found various applications in medicine. Objective: To make a comparison between different reactions that produced cross sections of Se-73 radioisotopes. Subjects and methods: The feasibility of the production of Selenium -73 via various nuclear reactions was investigated. Excitation functions of 73Se production by the reactions of 75As (p,3n), 169Tm( d,x), 74Se, natSe, natBr (p,x) , 75As (d,4n), natGe (3He,x), 70Ge (α, n), and 72Ge (α, 3n) and neutron capture were calculated using the avail
... Show Morebeen taken at room temperature down to liquid nitrogen temperature (77K). Polar and nonpolar solvents have been used to study the solvent effect on the absorption and fluorescence spectra of solute molecules. Some of the spectroscopic parameters have been determined as functions of solvent polarity and temperature. The results indicate that the band width FWHM increases with increasing the solvent polarity and temperature, while the peak emission cross section decreases with increasing of solvent polarity and decreases with increasing the temperatures. Clear vibrational structure spectra of benzoanthracene molecules have been observed in Nonane and Hexane solvents at 77K.
Background. Aneurysms of the distal anterior cerebral artery (DACA) are uncommon; they often form near the pericallosal-callosomarginal junction and are typically small. To our knowledge, giant DACA aneurysms developing from the more distant parts of the anterior cerebral artery (ACA), A4-5, have been described only once in the literature. Case description. A 66-year-old gentleman reported with a brief loss of consciousness followed by weakness in his right lower leg. The patient was admitted with a Glasgow Coma Score (GCS) of 15. A computed tomography (CT) scan of the head revealed a left hyperdense mass in the frontal parasagittal supracallosal region. Contrast MRI revealed a heterogeneously enhancing mass measuring 35x30x25 mm. C
... Show MoreIn the current analysis, the effects of circumferential scratches along the inner surface of a 170ᵒ -arc partial journal bearing has been numerically investigated. Their impact on the thermo-elasto-hydrodynamic performance characteristics, including maximum pressure, temperature, deformation, and stress, has been examined thoroughly. The ANSYS Fluent CFD commercial code was employed to tackle the iterative solution of flow and heat transfer patterns in the fluid film domain. They are then applied to the ANSYS Static Structure solver to compute the deformation and stress resulted in the solid bearing zone. A wide range of operating conditions has been considered, including the eccentricity ratio ( ) and scratch depth (
... Show More