Distributed Denial of Service (DDoS) attacks on Web-based services have grown in both number and sophistication with the rise of advanced wireless technology and modern computing paradigms. Detecting these attacks in the sea of communication packets is very important. There were a lot of DDoS attacks that were directed at the network and transport layers at first. During the past few years, attackers have changed their strategies to try to get into the application layer. The application layer attacks could be more harmful and stealthier because the attack traffic and the normal traffic flows cannot be told apart. Distributed attacks are hard to fight because they can affect real computing resources as well as network bandwidth. DDoS attacks can also be made with smart devices that connect to the Internet, which can be infected and used as botnets. They use Deep Learning (D.L.) techniques like Convolutional Neural Network (C.N.N.) and variants of Recurrent Neural Networks (R.N.N.), such as Long Short-Term Memory (L.S.T.M.), Bidirectional L.S.T.M., Stacked L.S.T.M., and the Gat G.R.U.. These techniques have been used to detect (DDoS) attacks. The Portmap.csv file from the most recent DDoS dataset, CICDDoS2019, has been used to test D.L. approaches. Before giving the data to the D.L. approaches, the data is cleaned up. The pre-processed dataset is used to train and test the D.L. approaches. In the paper, we show how the D.L. approach works with multiple models and how they compare to each other.
Polymeric hollow fiber membrane is produced by a physical process called wet or dry/wet phase inversion; a technique includes many steps and depends on different factors (starting from selecting materials, end with post-treatment of hollow fiber membrane locally manufactured). This review highlights the most significant factors that affect and control the characterization and structure of ultrafiltration hollow fiber membranes used in different applications.
Three different types of polymers (polysulfone PSF, polyethersulfone PES or polyvinyl chloride PVC) were considered to study morphology change and structure of hollow fiber membranes in this review. These hollow fiber membranes were manufactured with different pro
... Show MoreFace recognition and identity verification are now critical components of current security and verification technology. The main objective of this review is to identify the most important deep learning techniques that have contributed to the improvement in the accuracy and reliability of facial recognition systems, as well as highlighting existing problems and potential future research areas. An extensive literature review was conducted with the assistance of leading scientific databases such as IEEE Xplore, ScienceDirect, and SpringerLink and covered studies from the period 2015 to 2024. The studies of interest were related to the application of deep neural networks, i.e., CNN, Siamese, and Transformer-based models, in face recogni
... Show MoreThe rapid advancements in wireless technology and digital electronics have led to the widespread adoption of compact, intelligent devices in various aspects of daily life. These advanced systems possess the capability to sense environmental changes, process data, and communicate seamlessly within interconnected networks. Typically, such devices integrate low-power radio transmitters and multiple smart sensors, hence enabling efficient functionality across wide ranges of applications. Alongside these technological developments, the concept of the IoT has emerged as a transformative paradigm, facilitating the interconnection of uniquely identifiable devices through internet-based networks. This paper aims to provide a comprehensive ex
... Show MoreThe aims of research is to identify the role of strategic human resource management Practices in organizational performance improvement in the Baghdad soft drinks company, as well as the implications of the results for both managers and practitioners.
In order to achieve the objectives of the research, the researcher designed questionnaire included (40) items to collect the initial data from the research sample consisting of (53) Single. In light of that has been collecting and analyzing data and test hypotheses using the statistical package for Social Sciences (SPSS21), and use a number of statistical methods to achieve the goal of the research, including the means, standard deviations and simple correla
... Show MoreThe present study aims at empirically investigating the effect of vocabulary learning strategies on Iraqi intermediate school students’vocabulary performance and reading comprehension. The population of the present study includes all the 1st year male students of Al-Wark’a intermediate school of Al-Risafa 1/ General Directorate of Education for the first course of the academic year (2015-2016). To achieve the aim of the study ,a pre-test and post-test after (5) weeks of experiment are administrated .The sample of the present study consists of (100) subjects :(50) students as an experimental group and other (50) students as a control group . The subj
... Show MoreThe organizations and institutions of the developed countries have given attention to the subject of the knowledge economy by using advanced technology in the function of tax examination because of the important and effective role in ensuring the accuracy of the tax accounting process procedures, But the General Commission of taxes is still using traditional methods in the field of tax examination which affects the performance of its work. This research aims to explain the level of effect on introducing advanced methods of Economics and knowledge represented by advanced communication technology in the field of practicing tax examination function in the General Commission of taxes, A questionnaire has been used as a mea
... Show MoreAround 65 million individuals suffer from epilepsy worldwide, and when it is not properly treated, it is linked to higher rates of physical harm and mortality. Due to the requirement for long‐term therapy and the side effects of many medications, medication compliance is a significant issue. The purpose of this review was to summarize the findings of previous studies examining the quality of life (QOL), adherence, patient education, and medication knowledge, as well as the impact of a pharmacist‐led educational intervention. Additionally, to find out if these studies benefit epileptic patients, to find the appropriate method used to help them in all aspects of their lives, and to use these in future studies. A systematic and comprehensi
... Show MoreCurrent research aims to find out:
- Effect of using the active learning in the achievement of third grade intermediate students in mathematics.
- Effect of using of active learning in the tendency towards the study of mathematics for students of third grade intermediate.
In order to achieve the goals of the research, the researcher formulated the following two hypotheses null:
- There is no difference statistically significant at the level of significance (0.05) between two average of degrees to achievement
The main objective of this work is to propose a new routing protocol for wireless sensor network employed to serve IoT systems. The routing protocol has to adapt with different requirements in order to enhance the performance of IoT applications. The link quality, node depth and energy are used as metrics to make routing decisions. Comparison with other protocols is essential to show the improvements achieved by this work, thus protocols designed to serve the same purpose such as AODV, REL and LABILE are chosen to compare the proposed routing protocol with. To add integrative and holistic, some of important features are added and tested such as actuating and mobility. These features are greatly required by some of IoT applications and im
... Show MoreUntil recently, researchers have utilized and applied various techniques for intrusion detection system (IDS), including DNA encoding and clustering that are widely used for this purpose. In addition to the other two major techniques for detection are anomaly and misuse detection, where anomaly detection is done based on user behavior, while misuse detection is done based on known attacks signatures. However, both techniques have some drawbacks, such as a high false alarm rate. Therefore, hybrid IDS takes advantage of combining the strength of both techniques to overcome their limitations. In this paper, a hybrid IDS is proposed based on the DNA encoding and clustering method. The proposed DNA encoding is done based on the UNSW-NB15
... Show More