Preferred Language
Articles
/
uhcUP48BVTCNdQwCW2US
Survey on distributed denial of service attack detection using deep learning: A review
...Show More Authors

Distributed Denial of Service (DDoS) attacks on Web-based services have grown in both number and sophistication with the rise of advanced wireless technology and modern computing paradigms. Detecting these attacks in the sea of communication packets is very important. There were a lot of DDoS attacks that were directed at the network and transport layers at first. During the past few years, attackers have changed their strategies to try to get into the application layer. The application layer attacks could be more harmful and stealthier because the attack traffic and the normal traffic flows cannot be told apart. Distributed attacks are hard to fight because they can affect real computing resources as well as network bandwidth. DDoS attacks can also be made with smart devices that connect to the Internet, which can be infected and used as botnets. They use Deep Learning (D.L.) techniques like Convolutional Neural Network (C.N.N.) and variants of Recurrent Neural Networks (R.N.N.), such as Long Short-Term Memory (L.S.T.M.), Bidirectional L.S.T.M., Stacked L.S.T.M., and the Gat G.R.U.. These techniques have been used to detect (DDoS) attacks. The Portmap.csv file from the most recent DDoS dataset, CICDDoS2019, has been used to test D.L. approaches. Before giving the data to the D.L. approaches, the data is cleaned up. The pre-processed dataset is used to train and test the D.L. approaches. In the paper, we show how the D.L. approach works with multiple models and how they compare to each other.

View Publication
Publication Date
Thu May 20 2021
Journal Name
International Journal Of Research In Social Sciences And Humanities
SUBJECT REVIEW: ACCULTURATION AND SECOND LANGUAGE ACQUISITION
...Show More Authors

This paper aims to give an overview of acculturation in the literature by means of its explicit definitions, main characteristics, and categorical process. It also foreshadows the significance of acquiring novice culture with particular connection to second language acquisition. Schumann and John Berry underscored acculturation each with its own model of acculturation. In the case of this review, you will realize that Schumann's two main aspects are firmly rooted in berry's model of acculturation as an exclusive description in relation to second language acquisition. Steven Krashen outlined acquiring language from the intellectual and linguistic view of learning, whereas Micheal Long demanded for communication in social perspective. It has

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Tue Oct 25 2022
Journal Name
Minar Congress 6
HANDWRITTEN DIGITS CLASSIFICATION BASED ON DISCRETE WAVELET TRANSFORM AND SPIKE NEURAL NETWORK
...Show More Authors

In this paper, a handwritten digit classification system is proposed based on the Discrete Wavelet Transform and Spike Neural Network. The system consists of three stages. The first stage is for preprocessing the data and the second stage is for feature extraction, which is based on Discrete Wavelet Transform (DWT). The third stage is for classification and is based on a Spiking Neural Network (SNN). To evaluate the system, two standard databases are used: the MADBase database and the MNIST database. The proposed system achieved a high classification accuracy rate with 99.1% for the MADBase database and 99.9% for the MNIST database

View Publication Preview PDF
Publication Date
Mon Jul 01 2024
Journal Name
Journal Of Engineering
Efficient Intrusion Detection Through the Fusion of AI Algorithms and Feature Selection Methods
...Show More Authors

With the proliferation of both Internet access and data traffic, recent breaches have brought into sharp focus the need for Network Intrusion Detection Systems (NIDS) to protect networks from more complex cyberattacks. To differentiate between normal network processes and possible attacks, Intrusion Detection Systems (IDS) often employ pattern recognition and data mining techniques. Network and host system intrusions, assaults, and policy violations can be automatically detected and classified by an Intrusion Detection System (IDS). Using Python Scikit-Learn the results of this study show that Machine Learning (ML) techniques like Decision Tree (DT), Naïve Bayes (NB), and K-Nearest Neighbor (KNN) can enhance the effectiveness of an Intrusi

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sun Jan 01 2023
Journal Name
Revista Iberoamericana De PsicologÍa Del Ejercicio Y El Deporte Vol. 18 No 1 Pp. 117-121
THE EFFECT OF SPECIAL EXERCISES ACCORDING TO THE DIFFERENTIATED TEACHING METHOD ON MENTAL MOTIVATION AND LEARNING THE SKILLS OF BASKETBALL AND SHOOTING FOR FEMALE STUDENTS
...Show More Authors

Scopus (1)
Scopus
Publication Date
Wed Oct 02 2024
Journal Name
International Development Planning Review
DESIGNING AN AUXILIARY DEVICE AND ITS IMPACT ON LEARNING THE SKILLS OF ANGULAR SUPPORT AND OPEN SUPPORT FOR HANDSTAND PUSH-UPS ON THE PARALLEL APPARATUS IN ARTISTIC GYMNASTICS FOR BUDS
...Show More Authors

Publication Date
Fri Dec 26 2025
Journal Name
Journal Of Administration And Economics
Using the Maximum Likelihood Method with a Suggested Weight to Estimate the Effect of Some Pollutants on the Tigris River- City of Kut
...Show More Authors

The aim of this research is to use robust technique by trimming, as the analysis of maximum likelihood (ML) often fails in the case of outliers in the studied phenomenon. Where the (MLE) will lose its advantages because of the bad influence caused by the Outliers. In order to address this problem, new statistical methods have been developed so as not to be affected by the outliers. These methods have robustness or resistance. Therefore, maximum trimmed likelihood: (MTL) is a good alternative to achieve more results. Acceptability and analogies, but weights can be used to increase the efficiency of the resulting capacities and to increase the strength of the estimate using the maximum weighted trimmed likelihood (MWTL). In order to perform t

... Show More
View Publication Preview PDF
Publication Date
Tue Jun 01 2021
Journal Name
Iop Conference Series: Earth And Environmental Science
Evaluating the effects of reservoir level and foundation depth on the dynamic behaviour of a rockfill dam using three-dimensional finite elements modelling
...Show More Authors
Abstract<p>This paper presents a three-dimensional Dynamic analysis of a rockfill dam with different foundation depths by considering the dam connection with both the reservoir bed and water. ANSYS was used to develop the three-dimensional Finite Element (FE) model of the rockfill dam. The essential objective of this study is the discussion of the effects of different foundation depths on the Dynamic behaviour of an embanked dam. Four foundation depths were investigated. They are the dam without foundation (fixed base), and three different depths of the foundation. Taking into consideration the changing of upstream water level, the empty, minimum, and maximum water levels, the results of the three-dimensional F</p> ... Show More
View Publication
Scopus (1)
Scopus Crossref
Publication Date
Fri Dec 26 2025
Journal Name
Journal Of Baghdad College Of Dentistry
Early and delayed effect of 2% chlorhexidine on the shear bond strength of composite restorative material to dentin using a total etch adhesive
...Show More Authors

Background: Lack of durability of the bond of the dental adhesive systems to tooth structure is one of the most important problems in tooth colored restorative work. This in vitro study was performed to evaluate the effect of 2% chlorhexidine gluconate(CHX) on dentin bond strength by using total etch adhesive system at twenty-four hours and three months of water storage. Material and methods:A flat dentin surface was prepared for forty sound human maxillary premolar teeth which were acid etched with 36% phosphoric acid gel after being divided randomly into four groups of ten teeth each according to storage time and CHX application, theCHX was applied for 60 seconds before adhesive application for groups I and III which were tested after twe

... Show More
View Publication Preview PDF
Publication Date
Tue Dec 05 2023
Journal Name
Baghdad Science Journal
Recognizing Different Foot Deformities Using FSR Sensors by Static Classification of Neural Networks
...Show More Authors

Sensing insole systems are a promising technology for various applications in healthcare and sports. They can provide valuable information about the foot pressure distribution and gait patterns of different individuals. However, designing and implementing such systems poses several challenges, such as sensor selection, calibration, data processing, and interpretation. This paper proposes a sensing insole system that uses force-sensitive resistors (FSRs) to measure the pressure exerted by the foot on different regions of the insole. This system classifies four types of foot deformities: normal, flat, over-pronation, and excessive supination. The classification stage uses the differential values of pressure points as input for a feedforwar

... Show More
View Publication Preview PDF
Scopus (5)
Crossref (4)
Scopus Crossref
Publication Date
Sat Jul 01 2017
Journal Name
2017 Computing Conference
Protecting a sensitive dataset using a time based password in big data
...Show More Authors

View Publication
Crossref (1)
Crossref