Distributed Denial of Service (DDoS) attacks on Web-based services have grown in both number and sophistication with the rise of advanced wireless technology and modern computing paradigms. Detecting these attacks in the sea of communication packets is very important. There were a lot of DDoS attacks that were directed at the network and transport layers at first. During the past few years, attackers have changed their strategies to try to get into the application layer. The application layer attacks could be more harmful and stealthier because the attack traffic and the normal traffic flows cannot be told apart. Distributed attacks are hard to fight because they can affect real computing resources as well as network bandwidth. DDoS attacks can also be made with smart devices that connect to the Internet, which can be infected and used as botnets. They use Deep Learning (D.L.) techniques like Convolutional Neural Network (C.N.N.) and variants of Recurrent Neural Networks (R.N.N.), such as Long Short-Term Memory (L.S.T.M.), Bidirectional L.S.T.M., Stacked L.S.T.M., and the Gat G.R.U.. These techniques have been used to detect (DDoS) attacks. The Portmap.csv file from the most recent DDoS dataset, CICDDoS2019, has been used to test D.L. approaches. Before giving the data to the D.L. approaches, the data is cleaned up. The pre-processed dataset is used to train and test the D.L. approaches. In the paper, we show how the D.L. approach works with multiple models and how they compare to each other.
تشهد بیئة الأعمال المعاصرة جملة من التغیرات والتطورات التكنولوجیة وتزایداً في حدةالمنافسة، وأتساع الفجوة بین العاملین والإدارة ، وقدرة الإدارة على التمییز بین الموظفین، والمشاركة فيإتخاذ القرارات، الامر الذي یلقي على عاتق شركة التأمین إجراء التغییر التنظیمي لتحقیق تطور فيالخدمات التأمینیة التي تقدمها للجمهور من تنوع التغطیات التأمینیة )الوثائق( والسرعة في تسویةالتعویضات وغیرها من الانشطة التي تمارسه
... Show MoreThe aim of this research is to identify the level of health services provided in the health centers operating in the family medicine system in Baghdad, and to determine the extent to which these health centers are applied to the internationally recognized standards , "Defining the quality of service gap between health care centers operating in the family medicine system and the standards adopted by the corresponding international centers (Al-Shabab Model Family Medicine Center, Al-Jahad Family Health Center, Al-Adhamiya Family Health Center, Al-Zawiya Family Health Center), and in view of what our health institutions are facing. The family of primary health care centers has difficulties, obstacles and challenges such as the diffi
... Show MoreThis research was conduct to evaluate the cytotoxic effect of exotoxin A (ETA) produced by Pseudomonas aeruginosa on mice in comparison with (phosphate buffer saline (PBS) as a negative control. The effect of the toxin was measured by employing the cytogenetic analysis which included (the mitotic index (MI), chromosomal aberrations (CAs), micronucleus (MN) and sperm abnormalities) parameters. In order to specify the cytotoxic effect of the toxin, three doses of ETA (125, 250 and 500 ng/ml) were used. Results showed that ETA was found to cause a significant decrease in mitotic index (MI) percentage, while significant increase in micronucleus (MN), chromosomal aberrations (CAs) and sperm abnormalities parameters in compression with control wa
... Show MoreWith its rapid spread, the coronavirus infection shocked the world and had a huge effect on billions of peoples' lives. The problem is to find a safe method to diagnose the infections with fewer casualties. It has been shown that X-Ray images are an important method for the identification, quantification, and monitoring of diseases. Deep learning algorithms can be utilized to help analyze potentially huge numbers of X-Ray examinations. This research conducted a retrospective multi-test analysis system to detect suspicious COVID-19 performance, and use of chest X-Ray features to assess the progress of the illness in each patient, resulting in a "corona score." where the results were satisfactory compared to the benchmarked techniques. T
... Show More
The aim of this research is to determine the most important and main factors that lead to Preeclampsia. It is also about finding suitable solutions to eradicate these factors and avoid them in order to prevent getting Preeclampsia. To achieve this, a case study sample of (40) patients from Medical City - Oncology Teaching Hospital was used to collect data by a questionnaire which contained (17) reasons to be investigated. The statistical package (SPSS) was used to compare the results of the data analysis through two methods (Radial Bases Function Network) and (Factorial Analysis). Important results were obtained, the two methods determined the same factors that could represent the direct reason which causes Preecla
... Show MorePalm vein recognition is a one of the most efficient biometric technologies, each individual can be identified through its veins unique characteristics, palm vein acquisition techniques is either contact based or contactless based, as the individual's hand contact or not the peg of the palm imaging device, the needs a contactless palm vein system in modern applications rise tow problems, the pose variations (rotation, scaling and translation transformations) since the imaging device cannot aligned correctly with the surface of the palm, and a delay of matching process especially for large systems, trying to solve these problems. This paper proposed a pose invariant identification system for contactless palm vein which include three main
... Show MoreDust is a frequent contributor to health risks and changes in the climate, one of the most dangerous issues facing people today. Desertification, drought, agricultural practices, and sand and dust storms from neighboring regions bring on this issue. Deep learning (DL) long short-term memory (LSTM) based regression was a proposed solution to increase the forecasting accuracy of dust and monitoring. The proposed system has two parts to detect and monitor the dust; at the first step, the LSTM and dense layers are used to build a system using to detect the dust, while at the second step, the proposed Wireless Sensor Networks (WSN) and Internet of Things (IoT) model is used as a forecasting and monitoring model. The experiment DL system
... Show More