Distributed Denial of Service (DDoS) attacks on Web-based services have grown in both number and sophistication with the rise of advanced wireless technology and modern computing paradigms. Detecting these attacks in the sea of communication packets is very important. There were a lot of DDoS attacks that were directed at the network and transport layers at first. During the past few years, attackers have changed their strategies to try to get into the application layer. The application layer attacks could be more harmful and stealthier because the attack traffic and the normal traffic flows cannot be told apart. Distributed attacks are hard to fight because they can affect real computing resources as well as network bandwidth. DDoS attacks can also be made with smart devices that connect to the Internet, which can be infected and used as botnets. They use Deep Learning (D.L.) techniques like Convolutional Neural Network (C.N.N.) and variants of Recurrent Neural Networks (R.N.N.), such as Long Short-Term Memory (L.S.T.M.), Bidirectional L.S.T.M., Stacked L.S.T.M., and the Gat G.R.U.. These techniques have been used to detect (DDoS) attacks. The Portmap.csv file from the most recent DDoS dataset, CICDDoS2019, has been used to test D.L. approaches. Before giving the data to the D.L. approaches, the data is cleaned up. The pre-processed dataset is used to train and test the D.L. approaches. In the paper, we show how the D.L. approach works with multiple models and how they compare to each other.
COVID-19 is a disease that has abnormal over 170 nations worldwide. The number of infected people (either sick or dead) has been growing at a worrying ratio in virtually all the affected countries. Forecasting procedures can be instructed so helping in scheming well plans and in captivating creative conclusions. These procedures measure the conditions of the previous thus allowing well forecasts around the state to arise in the future. These predictions strength helps to make contradiction of likely pressures and significances. Forecasting procedures production a very main character in elastic precise predictions. In this case study used two models in order to diagnose optimal approach by compared the outputs. This study was introduce
... Show MoreSeawater might serve as a fresh‐water supply for future generations to help meet the growing need for clean drinking water. Desalination and waste management using newer and more energy intensive processes are not viable options in the long term. Thus, an integrated and sustainable strategy is required to accomplish cost‐effective desalination via wastewater treatment. A microbial desalination cell (MDC) is a new technology that can treat wastewater, desalinate saltwater, and produce green energy simultaneously. Bio‐electrochemical oxidation of wastewater organics creates power using this method. Desalination and the creation of value‐added by‐products are expected because of this ionic mov
AA wahid, journal mustansiriyah of sports science, 2023
Abstract
This study aims to evaluated the user satisfaction of retrieval services
concerning to universities thesis and dissertations in university dissertation
unit of Baghdad Library for achieving the following objectives:
1- Evaluating the performance of this unit (thesis unit of Baghdad University
Library) regarding to users opinion.
2- Recognizing the reasons in this unit behind the case of non satisfaction of
its users and trying to find the suitable solutions.
To achieve those two objectives, the questionnaire tool was performed
and determined the user's satisfaction level by using a sample survey. 1118
graduated students were subjected to this experiment. The following main
results were appeared:<
The aim the research that definition on the impact a lot of Analysis and evaluation jobs impact in support the employees performance the property that are Analysis and evaluation jobs is one of the jobs however of the human resource management on organization and the impact footpace big on the chractericties and performance of the people and the impact that success of the organization , And here problem stool of the research in the omission the role for the Analysis and evaluation jobs impact in support the employees performance from the upward management in the organization , Polls were adopted as tools for obtaining data and the Depart
... Show MoreAir pollution evaluation of the operational processes in the East Baghdad oil field was carried out. The analysis was carried out by ICP-MS technique. Total Suspended Particles (TSP) air load was higher than Iraqi Standards and world international allowable limits of World Health Organization. The mean concentrations of gases carbon monoxide, carbon dioxide, sulfur dioxide, in the air were within national and world standards, while the mean concentration of nitrogen dioxide was higher than standard limits. The air of the study area is considered a good quality for CO, CO2 and NO2 with no health effect, while it is hazardous for TSP that have serious risk for people with respiratory disease. The mean concentrations of Cd, Cr, Cu and
... Show MoreThis research is based on interaction of two most important variables to the business organizations in the current era , these two variables are (marketing orientation and quality of service), this research is trying to urge the service organizations to reconsider the mechanisms adopted in the formulation of its plans, It was the application of research in Korek Telecom and Asia Cell Telecom as a sector of service active and important in the business sector in Iraq, the information was obtained through the design of the Likert questionnaire , it was distributed (92) questionnaire , (50) for the company Korek Telecom and (42) of the Asia-Cell and represent research population sample
... Show MoreThe prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices
... Show MoreThe prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices
... Show MoreBackground: Prostatic adenocarcinoma is the most widely recognized malignancy in men and the second cause of cancer-related mortality encountered in male patients after lung cancer.
Aim of the study: To assess the diagnostic value of diffusion weighted imaging (DWI) and its quantitative measurement, apparent diffusion coefficient (ADC), in the identification and localization of prostatic cancer compared with T2 weighted image sequence (T2WI).
Type of the study: a prospective analytic study
Patients and methods: forty-one male patients with suspected prostatic cancer were examined by pelvic MRI at the MRI department of the Oncology Teaching Hospital/Medical City in Baghdad
... Show More