Software-defined networking (SDN) presents novel security and privacy risks, including distributed denial-of-service (DDoS) attacks. In response to these threats, machine learning (ML) and deep learning (DL) have emerged as effective approaches for quickly identifying and mitigating anomalies. To this end, this research employs various classification methods, including support vector machines (SVMs), K-nearest neighbors (KNNs), decision trees (DTs), multiple layer perceptron (MLP), and convolutional neural networks (CNNs), and compares their performance. CNN exhibits the highest train accuracy at 97.808%, yet the lowest prediction accuracy at 90.08%. In contrast, SVM demonstrates the highest prediction accuracy of 95.5%. As such, an SVM-based DDoS detection model shows superior performance. This comparative analysis offers a valuable insight into the development of efficient and accurate techniques for detecting DDoS attacks in SDN environments with less complexity and time.
Artificial Neural Networks (ANN) is one of the important statistical methods that are widely used in a range of applications in various fields, which simulates the work of the human brain in terms of receiving a signal, processing data in a human cell and sending to the next cell. It is a system consisting of a number of modules (layers) linked together (input, hidden, output). A comparison was made between three types of neural networks (Feed Forward Neural Network (FFNN), Back propagation network (BPL), Recurrent Neural Network (RNN). he study found that the lowest false prediction rate was for the recurrentt network architecture and using the Data on graduate students at the College of Administration and Economics, Univer
... Show MoreImage compression is one of the data compression types applied to digital images in order to reduce their high cost for storage and/or transmission. Image compression algorithms may take the benefit of visual sensitivity and statistical properties of image data to deliver superior results in comparison with generic data compression schemes, which are used for other digital data. In the first approach, the input image is divided into blocks, each of which is 16 x 16, 32 x 32, or 64 x 64 pixels. The blocks are converted first into a string; then, encoded by using a lossless and dictionary-based algorithm known as arithmetic coding. The more occurrence of the pixels values is codded in few bits compare with pixel values of less occurre
... Show MoreThe entrance process re-engineering one of the main entrances of administrative and technology appropriate to keep pace with scientific progress and the continuing changes in business environment and for the purpose of achieving the goal sought by the organizations in the pursuit of rapid developments and renewable energy in the market competition by changing its operations and activities of the radical change which contributes to an effective contribution to reducing the cost of product or service taking into account the quality improvement in the management of change to keep the increase value and speed of placing on the market to meet customer needs and desires to achieve a
... Show MoreThe issue of the development of Qur'anic studies for the tasks, and the first thought of minds and multiple understandings, and the most precious ideas, and the alternatives were floated, and varied visions, especially as we live in an era exploding knowledge, and complicate secretions, and scramble his ideas, and to devise intellectual approaches To achieve the witnesses of civilization in the words of the Almighty (to be martyrs on the people) Surat Al - Baqarah / 143 attendance and participation in the achievement and a positive interaction with the participants of humanity and civilization in the light of the meaning (to know) rooms / 13.
Therefore, we must emerge from the one-dimensional view of the Koran to the complex mindset t
Everybody is connected with social media like (Facebook, Twitter, LinkedIn, Instagram…etc.) that generate a large quantity of data and which traditional applications are inadequate to process. Social media are regarded as an important platform for sharing information, opinion, and knowledge of many subscribers. These basic media attribute Big data also to many issues, such as data collection, storage, moving, updating, reviewing, posting, scanning, visualization, Data protection, etc. To deal with all these problems, this is a need for an adequate system that not just prepares the details, but also provides meaningful analysis to take advantage of the difficult situations, relevant to business, proper decision, Health, social media, sc
... Show MoreThe Artificial Neural Network methodology is a very important & new subjects that build's the models for Analyzing, Data Evaluation, Forecasting & Controlling without depending on an old model or classic statistic method that describe the behavior of statistic phenomenon, the methodology works by simulating the data to reach a robust optimum model that represent the statistic phenomenon & we can use the model in any time & states, we used the Box-Jenkins (ARMAX) approach for comparing, in this paper depends on the received power to build a robust model for forecasting, analyzing & controlling in the sod power, the received power come from
... Show MoreObjective(s): To assess mothers’ knowledge about their children with sickle cell anemia and non-Pharmacological approaches to pain management and found some relationship between mothers knowledge and their demographic data of age, level of education, and occupation.
Methodology: A descriptive design used in the present study established was for a period from September 19th, 2020 to March 30th, 2021. The study was conducted on a non-probability (purposive) sample of (30) mother their children with sickle cell anemia was chosen. The data were analyzed through the application of descriptive and inferential statistical approaches which are applied by using SPSS version 22.0.
Results: The findings of the study indicated that moderate
In this study, NAC-capped CdTe/CdS/ZnS core/double shell QDs were synthesized in an aqueous medium to investigate their utility in distinguishing normal DNA from mutated DNA extracted from biological samples. Following the interaction between the synthesized QDs with DNA extracted from leukemia cases (represents damaged DNA) and that of healthy donors (represents undamaged DNA), differential fluorescent emission maxima and intensities were observed. It was found that damaged DNA from leukemic cells DNA-QDs conjugates at 585 nm while intact DNA (from healthy subjects) DNA–QDs conjugates at 574 nm. The obtained results from the optical analyses indicate that the prepared QDs could be utilized as probe for detecting disrupted DNA th
... Show More