Preferred Language
Articles
/
TBesUJEBVTCNdQwC_5RQ
Comparison of ML/DL Approaches for Detecting DDoS Attacks in SDN
...Show More Authors

Software-defined networking (SDN) presents novel security and privacy risks, including distributed denial-of-service (DDoS) attacks. In response to these threats, machine learning (ML) and deep learning (DL) have emerged as effective approaches for quickly identifying and mitigating anomalies. To this end, this research employs various classification methods, including support vector machines (SVMs), K-nearest neighbors (KNNs), decision trees (DTs), multiple layer perceptron (MLP), and convolutional neural networks (CNNs), and compares their performance. CNN exhibits the highest train accuracy at 97.808%, yet the lowest prediction accuracy at 90.08%. In contrast, SVM demonstrates the highest prediction accuracy of 95.5%. As such, an SVM-based DDoS detection model shows superior performance. This comparative analysis offers a valuable insight into the development of efficient and accurate techniques for detecting DDoS attacks in SDN environments with less complexity and time.

Scopus Clarivate Crossref
View Publication
Publication Date
Fri Dec 29 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
B(E2), B(Ml) and 8(E2/ Ml) of Pt (A=198 & (Z=78) Isotope Using IBM-1
...Show More Authors

Interacting boson model version one has been used in the present

theoretical calculations. The energy levels & their transitions for dynamical  symmetry  0(6),  SU(3),  U(5),  ground-state  band,  Beta­ band, Gamma  band, B(E2), Ot, B(Ml), ,u,gt and  6(£2/Ml)have been  calculated  to  deduce  the  limit  of  Pt-198,  Z=78.  The  present results  confirmed  the  nuclear  behavior  of  this  isotope  lay  in  the

transitional region 0(6), SU(3) U(5). The calculations of 021 + & 022+

showed that the shape of this isotope is oblate according to Q21+  and pr

... Show More
View Publication Preview PDF
Publication Date
Sun Jun 06 2010
Journal Name
Baghdad Science Journal
New Method for the Determination of DL-Histidine by FIA and Chemiluminometric Detection
...Show More Authors

This paper present a simple and sensitive method for the determination of DL-Histidine using FIA-Chemiluminometric measurement resulted from oxidation of luminol molecule by hydrogen peroxide in alkaline medium in the presence of DL-Histidine. Using 70?l. sample linear plot with a coefficient of determination 95.79% for (5-60) mmol.L-1 while for a quadratic relation C.O.D = 96.44% for (5-80) mmol.L-1 and found that guadratic plot in more representative. Limit of detection was 31.93 ?g DL-Histidine (S/N = 3), repeatability of measurement was less that 5% (n=6). Positive and negative ion interferances was removed by using minicolume containing ion exchange resin located after injection valve position.

View Publication Preview PDF
Crossref
Publication Date
Thu Jan 04 2018
Journal Name
Journal Of Electrical Engineering And Technology
An efficient selective method for audio watermarking against de-synchronization attacks
...Show More Authors

View Publication
Scopus (6)
Scopus
Publication Date
Tue Feb 28 2023
Journal Name
Iraqi Journal Of Science
Comparison of Performance Metrics Level of Restricted Boltzmann Machine and Backpropagation Algorithms in Detecting Diabetes Mellitus Disease
...Show More Authors

Diabetes is a disease caused by high sugar levels. Currently, diabetes is one of the most common diseases in the number of people with diabetes worldwide. The increase in diabetes is caused by the delay in establishing the diagnosis of the disease. Therefore, an initial action is needed as a solution that requires the most appropriate and accurate data mining to manage diabetes mellitus. The algorithms used are artificial neural network algorithms, namely Restricted Boltzmann Machine and Backpropagation. This research aims to compare the two algorithms to find which algorithm can produce high accuracy, and determine which algorithm is more accurate in detecting diabetes mellitus. Several stages were involved in this research, including d

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Tue Jan 01 2019
Journal Name
Journal Of Communications
SDN Implementation in Data Center Network
...Show More Authors

View Publication
Scopus (14)
Crossref (10)
Scopus Crossref
Publication Date
Sun Jun 30 2024
Journal Name
Iraqi Journal Of Science
Some Games Via (D, DL) Compact Topological Groups
...Show More Authors

    The aim of our work is to develop a new type of games which are related to (D, WD, LD) compactness of topological groups. We used an infinite game that corresponds to our work. Also, we used an alternating game in which the response of the second player depends on the choice of the first one. Many results of winning and losing strategies have been studied, consistent with the nature of the topological groups. As well as, we presented some topological groups, which fail to have winning strategies and we give some illustrated examples. Finally, the effect of functions on the aforementioned compactness strategies was studied.  

Preview PDF
Scopus Crossref
Publication Date
Mon Jan 30 2023
Journal Name
Iraqi Journal Of Science
Techniques and Challenges for Generation and Detection Face Morphing Attacks: A Survey
...Show More Authors

      Face recognition system is the most widely used application in the field of security and especially in border control. This system may be exposed to direct or indirect attacks through the use of face morphing attacks (FMAs). Face morphing attacks is the process of producing a passport photo resulting from a mixture of two images, one of which is for an ordinary person and the other is a judicially required. In this case, a face recognition system may allow travel of  persons not permitted to travel through face morphing image in a Machine-Readable Electronic Travel Document (eMRTD) or electronic passport at Automatic Border Control (ABC) gates. In creating an electronic passport, most countries rely on applicant to submit ima

... Show More
View Publication Preview PDF
Scopus (5)
Crossref (2)
Scopus Crossref
Publication Date
Mon Oct 01 2018
Journal Name
International Journal Of Electrical And Computer Engineering
Load balance in data center SDN networks
...Show More Authors

In the last two decades, networks had been changed according to the rapid changing in its requirements. The current Data Center Networks have large number of hosts (tens or thousands) with special needs of bandwidth as the cloud network and the multimedia content computing is increased. The conventional Data Center Networks (DCNs) are highlighted by the increased number of users and bandwidth requirements which in turn have many implementation limitations. The current networking devices with its control and forwarding planes coupling result in network architectures are not suitable for dynamic computing and storage needs. Software Defined networking (SDN) is introduced to change this notion of traditional networks by decoupling control and

... Show More
Publication Date
Wed Oct 28 2020
Journal Name
Iraqi Journal Of Science
Robust Blind Watermarking Technique Against Geometric Attacks for Fingerprint Image Using DTCWT-DCT
...Show More Authors

In this research paper, a new blind and robust fingerprint image watermarking scheme based on a combination of dual-tree complex wavelet transform (DTCWT) and discrete cosine transform (DCT) domains is demonstrated. The major concern is to afford a solution in reducing the consequence of geometric attacks. It is due to the fingerprint features that may be impacted by the incorporated watermark, fingerprint rotations, and displacements that result in multiple feature sets. To integrate the bits of the watermark sequence into a differential process, two DCT-transformed sub-vectors are implemented. The initial sub-vectors were obtained by sub-sampling in the host fingerprint image of both real and imaginary parts of the DTCWT wavelet coeffi

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (1)
Scopus Crossref
Publication Date
Wed Jan 30 2019
Journal Name
Journal Of The College Of Education For Women
Detecting the effectiveness of two tools for detecting the talented from their teachers' points of view
...Show More Authors

Education specialists have differed about determining the best ways to detect the
talented. Since the appearance of the mental and psychological measurement movement, some
scholars adopted intelligence ratios as a criterion to identify the talented and others went to
rely on the degree of academic achievement. Each of these two methods has its own flaws and
mistakes and a large number of talented children were victims of these two methods.
Therefore the need to use other scales for the purpose of detection of talented children
appeared because they provide valuable information which may not be obtained easily
through objective tests and these scales are derived from consecutive studies of gifted andtalented children

... Show More
View Publication Preview PDF