The recent advancements in security approaches have significantly increased the ability to identify and mitigate any type of threat or attack in any network infrastructure, such as a software-defined network (SDN), and protect the internet security architecture against a variety of threats or attacks. Machine learning (ML) and deep learning (DL) are among the most popular techniques for preventing distributed denial-of-service (DDoS) attacks on any kind of network. The objective of this systematic review is to identify, evaluate, and discuss new efforts on ML/DL-based DDoS attack detection strategies in SDN networks. To reach our objective, we conducted a systematic review in which we looked for publications that used ML/DL approach
... Show MoreThe multi-dentate Schiff base ligand (H2L), where H2L=2,2'-(((1,3,5,6)-1-(3-((l1-oxidaneyl)-l5-methyl)-4-hydroxyphenyl)-7-(4-hydroxy-3-methoxyphenyl)hepta-1,6-di ene-3,5-diylidene)bis(azaneylylidene))bis(3-(4-hydroxyphenyl)propanoic acid), has been prepared from curcumin and L- Tyrosine amino acid. The synthesized Schiff base ligand (H2L) and the second ligand 1,10-phenanthroline (phen) are used to prepare the new complexes [Al(L)(phen)]Cl, K[Ag(L)(phen)] and [Pb(L)(phen)]. The synthesized compounds are characterized by magnetic susceptibility measurements, micro elemental analysis (C.H.N), mass spectrometry, molar conductance, FT-infrared, UV-visible, atomic absorption (AA), 13C-NMR, and 1H-NMR spectral studies. The characterization of the
... Show MoreBackground: The purpose of this study was to evaluate and compare centering ability and canal transportation of simulated S-shaped canals instrumented with four different types of rotary nickel-titanium systems. Materials and Methods: Forty simulated S-shaped canals in resin blocks were divided into four groups of ten each and were instrumented to an apical size 25 by different instrumentation technique using ProTaper Universal files (group A), ProTaperNext (group B), Reciproc (group C) and WaveOne (group D).Centering ability and canal transportation was measured at (11) measuring points from D0 to D10 bysuperimposion of the pre- and post-operative images obtained by using digital camera in standardized manner. An assessment of the canals
... Show MoreMixed ligand metal complexes are synthesized from oxalic acid with Schiff base, and the Schiff base was obtained from trimethoprim and acetylacetone. The synthesized complexes were of the type [M(L1)(L2)], where the metal, M, is Ni(II), Cu(II), Cr(III), and Zn(II), L1 corresponds to the trimethoprim ((Z)-4-((4-amino-5-(3,4,5- trimethoxybenzyl)pyrimidine-2-yl)imino)pentane-2-one) as the first ligand and L2 represent the oxalate anion (𝐶𝑂 ) as a second ligand. Characterization of the prepared compounds was performed by elemental analysis, molar conductivity, magnetic measurements, 1H-NMR, 13C-NMR, FT-IR, and Ultraviolet-visible (UV-Vis) spectral studies. The recorded infrared data is reinforced with density functional th
... Show MoreMixed ligand metal complexes are synthesized from oxalic acid with Schiff base, and the Schiff base was obtained from trimethoprim and acetylacetone. The synthesized complexes were of the type [M(L1)(L2)], where the metal, M, is Ni(II), Cu(II), Cr(III), and Zn(II), L1 corresponds to the trimethoprim ((Z)-4-((4-amino-5-(3,4,5-trimethoxybenzyl)pyrimidine-2-yl)imino)pentane-2-one) as the first ligand and L2 represent the oxalate anion ( ) as a second ligand. Characterization of the prepared compounds was performed by elemental analysis, molar conductivity, magnetic measurements, 1H-NMR, 13C-NMR, FT-IR, and Ultraviolet-visible (UV-Vis) spectral studies. The recorded infrared data is reinforced with density functional theory (DFT) calcul
... Show MoreTested effective Alttafaria some materials used for different purposes, system a bacterial mutagenesis component of three bacterial isolates belonging to different races and materials tested included drug Briaktin
This paper presents a fuzzy logic controller for a two-tank level control system, which is a process with a dead time. The fuzzy controller is a proportional-integral (PI-like) fuzzy controller which is suitable for steady state behavior of the system. Transient behavior of the system was improved without the need for a derivative action by suitable change in the rule base of the controller. Simulation results showed the step response of the two-tank level control system when this controller was used to control this plant and the effect of the dead time on the response of the system.
In most Reinforced Concrete (RC) buildings, the cross-section size of rectangular columns that conventionally used in these structures is larger than the thickness of their partitions. Consequently, a part of the column is protruded out of the wall which has some architectural disadvantages. Reducing the column size by using high strength concrete will result in slender column, thus the stability problem may be occurred. The stability problem is difficult to be overcome with rectangular columns. This paper study the effectiveness of using new types of columns called Specially Shaped Reinforced Concrete (SSRC) columns. Besides, the use of SSRC columns provides many structural advantage
This study aims to characterize traumatic spinal cord injury (TSCI) neurophysiologically using an intramuscular fine-wire electromyography (EMG) electrode pair. EMG data were collected from an agonist-antagonist pair of tail muscles of Macaca fasicularis, pre- and post-lesion, and for a treatment and control group. The EMG signals were decomposed into multi-resolution subsets using wavelet transforms (WT), then the relative power (RP) was calculated for each individual reconstructed EMG sub-band. Linear mixed models were developed to test three hypotheses: (i) asymmetrical volitional activity of left and right side tail muscles (ii) the effect of the experimental TSCI on the frequency content of the EMG signal, (iii) and the effect
... Show MoreCryptography algorithms play a critical role in information technology against various attacks witnessed in the digital era. Many studies and algorithms are done to achieve security issues for information systems. The high complexity of computational operations characterizes the traditional cryptography algorithms. On the other hand, lightweight algorithms are the way to solve most of the security issues that encounter applying traditional cryptography in constrained devices. However, a symmetric cipher is widely applied for ensuring the security of data communication in constraint devices. In this study, we proposed a hybrid algorithm based on two cryptography algorithms PRESENT and Salsa20. Also, a 2D logistic map of a chaotic system is a
... Show More