Distributed Denial of Service (DDoS) attacks on Web-based services have grown in both number and sophistication with the rise of advanced wireless technology and modern computing paradigms. Detecting these attacks in the sea of communication packets is very important. There were a lot of DDoS attacks that were directed at the network and transport layers at first. During the past few years, attackers have changed their strategies to try to get into the application layer. The application layer attacks could be more harmful and stealthier because the attack traffic and the normal traffic flows cannot be told apart. Distributed attacks are hard to fight because they can affect real computing resources as well as network bandwidth. DDoS attacks can also be made with smart devices that connect to the Internet, which can be infected and used as botnets. They use Deep Learning (D.L.) techniques like Convolutional Neural Network (C.N.N.) and variants of Recurrent Neural Networks (R.N.N.), such as Long Short-Term Memory (L.S.T.M.), Bidirectional L.S.T.M., Stacked L.S.T.M., and the Gat G.R.U.. These techniques have been used to detect (DDoS) attacks. The Portmap.csv file from the most recent DDoS dataset, CICDDoS2019, has been used to test D.L. approaches. Before giving the data to the D.L. approaches, the data is cleaned up. The pre-processed dataset is used to train and test the D.L. approaches. In the paper, we show how the D.L. approach works with multiple models and how they compare to each other.
تم استخدام خرائط ضبط الجودة الإحصائية لتقييم جودة الخدمة التعليمية في جامعة الباحة، ويهدف هذا البحث إلى استخدام خرائط ضبط الجودة الإحصائية لقياس مستوى الجودة وفجوة الجودة بين توقعات الطلبة وإدراكاتهم لمستوى الخدمة الذي تقدمه جامعة الباحة. حيث تم اختيار عينة من 200 طالب وطالبة عشوائيا باستخدام العشوائية العنقودية من 4 كليات خلال الفترة 01 – 30/2015م، وجمعت البيانات من خلال استبيان جودة الخدمة الذي يقيس ت
... Show MoreWith the growth of mobile phones, short message service (SMS) became an essential text communication service. However, the low cost and ease use of SMS led to an increase in SMS Spam. In this paper, the characteristics of SMS spam has studied and a set of features has introduced to get rid of SMS spam. In addition, the problem of SMS spam detection was addressed as a clustering analysis that requires a metaheuristic algorithm to find the clustering structures. Three differential evolution variants viz DE/rand/1, jDE/rand/1, jDE/best/1, are adopted for solving the SMS spam problem. Experimental results illustrate that the jDE/best/1 produces best results over other variants in terms of accuracy, false-positive rate and false-negative
... Show MoreIntroduction and Aim: Pseudomonas aeruginosa is a nosocomial infection with an ability to develop high levels of antibiotic resistance. The efflux pump system is one of the mechanisms that is linked to multidrug resistance in P. aeruginosa. In this study, we employed siRNA loaded on gold nanoparticles against the MexA efflux pump gene to decrease the MexA gene expression in P. aeruginosa and estimated antibiotic resistance after gene silencing. Materials and Methods: This study examined four strains of P. aeruginosa isolated from patients in various hospitals in Baghdad. Bacteria isolated were identified by biochemical tests and Vitek compact 2 system. Single-stranded siRNA (33bp) designed in this study was loaded onto gold
... Show MoreThe investigation of signature validation is crucial to the field of personal authenticity. The biometrics-based system has been developed to support some information security features.Aperson’s signature, an essential biometric trait of a human being, can be used to verify their identification. In this study, a mechanism for automatically verifying signatures has been suggested. The offline properties of handwritten signatures are highlighted in this study which aims to verify the authenticity of handwritten signatures whether they are real or forged using computer-based machine learning techniques. The main goal of developing such systems is to verify people through the validity of their signatures. In this research, images of a group o
... Show MoreBackground: Educational environment is one of the most important determinants of an effective curriculum. Students' perceptions of their educational environment have a significant impact on their behavior and academic progress. Objective: 1. To identify students’ perception to the educational environment.2. To identify any gender or class level differences in the students’ perception.Type of the study: This is a descriptive cross-sectional studyMethodology: The study was carried out on convenient sample of 150 students of 2nd and 5th grade. This study was done in Al Kindy Medical College, Baghdad, Iraq and conducted during the period from the 1st of October 2013 till the end of March 2014, by using DREEM questionnaire a validated uni
... Show MoreBuildings begin to deteriorate gradually over time due to several factors, including environmental influences, improper use of the building, and neglected repairs for damages during the building's life span. Effective maintenance practices can minimize operational costs, extend the life of building systems and components, improve energy efficiency, and maintain property value. This paper aims to review articles related to building maintenance to identify factors affecting maintenance practices. After conducting the review, the result was that there were 33 factors affecting building maintenance categorized into six groups: management-related factors, manpower-related factors, technical-related factors, financial-
... Show MoreVariation in DNA, and genes to a lesser or greater extent, can play an important role in most diseases; that is because this variation in will reflect and affect the function of DNA, and genes (combined genes and DNA or separately). This can be affected by environment, life style, as well as the inheriting from parents and previous generations. All these factors can contribute in human diseases. There are different alterations in genes, like imbalance and inequality in chromosomes, disorder in gene (deficiency in gene, which could be complex or single disorder), and cancer. In the last decades, scientists were focus on medicine and genetics; they pay an extensive attention to reach better understanding about diseases and their cause
... Show MorePulsatile drug delivery systems (PDDS) are developed to deliver drug according to circadian behavior of diseases. They deliver the drug at the right time, action and in the right amount, which provides more benefit than conventional dosages and increased patient compliance. The drug is released rapidly and completely as a pulse after a lag time. These systems are beneficial for drugs with chrono-pharmacological behavior, where nighttime dosing is required and for the drugs having a high first-pass effect and having specific site of absorption in the gastrointestinal tract. This article covers methods and marketed technologies that have been developed to achieve pulsatile delivery. Diseases wherein PDDS are promising include asthma, peptic u
... Show MoreThe study aimed at identifying the domains of abuse of the elderly (each field separately) of the research sample. The study sample consisted of (100) senior citizens residing in nursing homes in Baghdad and Kirkuk cities. They were selected in a simple random way. In order to achieve the research objectives, two scales were developed to measure the abuse of the elderly consisted of six domains: Neglection abuse, emotional abuse, physical abuse, social abuse, financial abuse, sexual abuse), and the other to measure the life review. The results showed that the level of abuse of older people in the sample is higher than the average in the society they belong to, the level of life review was higher than the average they belong to, and the a
... Show MoreThis research aims at identifying the commitment of satellite news channels in Arabic to the set of important standards that reflect their credibility in dealing with the media material, and considering that these channels give special importance to events in Iraq, as well as the Arab region and the world, decide to choose them and study them with a problem The research was a question about the level of credibility of Iraqi media. This research is descriptive research, which used the survey method on an objective sample of 245 items, while the questionnaire was used as a data collection tool. Seven channels were selected in Arabic for the study. The three most watched channels were chosen. These channels included the channels of Russia t
... Show More