Preferred Language
Articles
/
SRepUJEBVTCNdQwC6pT_
Machine Learning Techniques to Detect a DDoS Attack in SDN: A Systematic Review
...Show More Authors

The recent advancements in security approaches have significantly increased the ability to identify and mitigate any type of threat or attack in any network infrastructure, such as a software-defined network (SDN), and protect the internet security architecture against a variety of threats or attacks. Machine learning (ML) and deep learning (DL) are among the most popular techniques for preventing distributed denial-of-service (DDoS) attacks on any kind of network. The objective of this systematic review is to identify, evaluate, and discuss new efforts on ML/DL-based DDoS attack detection strategies in SDN networks. To reach our objective, we conducted a systematic review in which we looked for publications that used ML/DL approaches to identify DDoS attacks in SDN networks between 2018 and the beginning of November 2022. To search the contemporary literature, we have extensively utilized a number of digital libraries (including IEEE, ACM, Springer, and other digital libraries) and one academic search engine (Google Scholar). We have analyzed the relevant studies and categorized the results of the SLR into five areas: (i) The different types of DDoS attack detection in ML/DL approaches; (ii) the methodologies, strengths, and weaknesses of existing ML/DL approaches for DDoS attacks detection; (iii) benchmarked datasets and classes of attacks in datasets used in the existing literature; (iv) the preprocessing strategies, hyperparameter values, experimental setups, and performance metrics used in the existing literature; and (v) current research gaps and promising future directions.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Mar 30 2019
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Using Elastic Properties as a Predictive Tool to Identify Pore-Fluid Type in Carbonate Formations
...Show More Authors

The aim of this study is for testing the applicability of Ramamoorthy and Murphy method for identification of predominant pore fluid type, in Middle Eastern carbonate reservoir, by analyzing the dynamic elastic properties derived from the sonic log. and involving the results of Souder, for testing the same method in chalk reservoir in the North Sea region. Mishrif formation in Garraf oilfield in southern Iraq was handled in this study, utilizing a slightly-deviated well data, these data include open-hole full-set logs, where, the sonic log composed of shear and compression modes, and geologic description to check the results. The Geolog software is used to make the conventional interpretation of porosity, lithology, and saturation. Also,

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Thu Dec 15 2022
Journal Name
Al-academy
Art as a therapy to relieve symptoms of Attention Deficit/Hyperactivity Disorder (ADHD), in children
...Show More Authors

The aim of the present study is to evaluate the effectiveness of using Art as therapy to reduce the symptoms of Attention Deficit Hyper Activity Disorder (ADHD), in primary school children.
A clinical approach was used to test the validity of the hypothesis of our study, conducted on two second and fourth-year primary school pupils from Algiers, aged 7 and 9 years respectively.
In addition to the clinical observation and interview, we made use of the "Conners" scale for a (pre and post intervention) ADHD assessment, consisting of a combination of Art media in the form of mosaic works on purposely prepared panels. After 10 therapy sessions, results revealed the effectiveness of Art therapy in reducing ADHD in primary education

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jan 01 2017
Journal Name
Dissertation/thesis
A Model To Evaluate the Online Training for Global Virtual Teams in Global Software Projects
...Show More Authors

Publication Date
Tue Jan 17 2023
Journal Name
International Journal Of Online And Biomedical Engineering (ijoe)
An Image Feature Extraction to Generate a Key for Encryption in Cyber Security Medical Environments
...Show More Authors

Cyber security is a term utilized for describing a collection of technologies, procedures, and practices that try protecting an online environment of a user or an organization. For medical images among most important and delicate data kinds in computer systems, the medical reasons require that all patient data, including images, be encrypted before being transferred over computer networks by healthcare companies. This paper presents a new direction of the encryption method research by encrypting the image based on the domain of the feature extracted to generate a key for the encryption process. The encryption process is started by applying edges detection. After dividing the bits of the edge image into (3×3) windows, the diffusions

... Show More
View Publication
Scopus (6)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Sat Dec 01 2012
Journal Name
Iraqi Journal Of Physics
A computer experiment to study the charging process of dust grains in negative ion plasma
...Show More Authors

This work presents a computer studying to simulate the charging process of a dust grain immersed in plasma with negative ions. The study based on the discrete charging model. The model was developed to take into account the effect of negative ions on charging process of dust grain.
The model was translated to a numerical calculation by using computer programs. The program of model has been written with FORTRAN programming language to calculate the charging process for a dust particle in plasma with negative ion, the time distribution of a dust charge, number charge equilibrium and charging time for different value of ηe (ratio of number density of electron to number density of positive ion).

View Publication Preview PDF
Publication Date
Wed Aug 01 2018
Journal Name
Collegian
Behaviour change interventions to improve medication adherence in patients with cardiac disease: Protocol for a mixed methods study including a pilot randomised controlled trial
...Show More Authors

View Publication
Scopus (7)
Crossref (6)
Scopus Clarivate Crossref
Publication Date
Mon Apr 18 2022
The modeling techniques of the second‐order correlation function <i>g</i> <sup>(2)</sup> ( <i>τ</i> ) for a quantum emitter
...Show More Authors

View Publication
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Mon Aug 01 2011
Journal Name
International Journal Of Research And Reviews In Computer Science
Detection of the photon number splitting attack by using decoy states quantum key distribution system
...Show More Authors

The goal of this work is to check the presence of PNS (photon number splitting) attack in quantum cryptography system based on BB84 protocol, and to get a maximum secure key length as possible. This was achieved by randomly interleaving decoy states with mean photon numbers of 5.38, 1.588 and 0.48 between the signal states with mean photon numbers of 2.69, 0.794 and 0.24. The average length for a secure key obtained from our system discarding the cases with Eavesdropping was equal to 125 with 20 % decoy states and 82 with 50% decoy states for mean photon number of 0.794 for signal states and 1.588 for decoy states.

Publication Date
Wed Mar 29 2017
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
The Prevalence of Microorganisms in H1N1 Patients Compared to Seasonal Influenza in a Sample of Iraqi Patients
...Show More Authors

This study provides valuable information on secondary microbial infections in H1N1 patients compared to Seasonal Influenza in Iraqi Patients. Nasopharynx  swabs were collected from  (12 ) patients  infected with Seasonal influenza (11  from Baghdad  and 1 Patient from south of Iraq) ,and ( 22 ) samples from patients with 2009 H1N1 ( 20 from Baghdad and  2 from  south of Iraq). The results show that the patients infected with 2009 H1N1 Virus were younger than healthy subjects and those infected with seasonal influenza. And the difference reached to the level of significance     (p< 0.01) compared with healthy subjects.Two cases infected with 2009 H1N1 virus (9.1%) were fro

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Dec 01 2018
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Development means in Iraqi commercial banks to reduce unemployment: A sample of private commercial banks in Iraq
...Show More Authors

Many economists believe that the development and promotion of small and medium-sized enterprises is one of the most important sources of economic and social development in countries in general and in developing countries in particular. This is considered to be an essential starting point for increasing production capacity and contributing to tackling poverty and unemployment. In view of the importance of these projects, most developing countries have concentrated their efforts on them. They have encouraged the establishment of small and medium industries, especially after they have proved their ability and efficiency in dealing with the major problems facing different economies.

The banking system plays an important role by finan

... Show More
View Publication Preview PDF
Crossref (2)
Crossref