Distributed Denial of Service (DDoS) attacks on Web-based services have grown in both number and sophistication with the rise of advanced wireless technology and modern computing paradigms. Detecting these attacks in the sea of communication packets is very important. There were a lot of DDoS attacks that were directed at the network and transport layers at first. During the past few years, attackers have changed their strategies to try to get into the application layer. The application layer attacks could be more harmful and stealthier because the attack traffic and the normal traffic flows cannot be told apart. Distributed attacks are hard to fight because they can affect real computing resources as well as network bandwidth. DDoS attacks can also be made with smart devices that connect to the Internet, which can be infected and used as botnets. They use Deep Learning (D.L.) techniques like Convolutional Neural Network (C.N.N.) and variants of Recurrent Neural Networks (R.N.N.), such as Long Short-Term Memory (L.S.T.M.), Bidirectional L.S.T.M., Stacked L.S.T.M., and the Gat G.R.U.. These techniques have been used to detect (DDoS) attacks. The Portmap.csv file from the most recent DDoS dataset, CICDDoS2019, has been used to test D.L. approaches. Before giving the data to the D.L. approaches, the data is cleaned up. The pre-processed dataset is used to train and test the D.L. approaches. In the paper, we show how the D.L. approach works with multiple models and how they compare to each other.
Background: Esthetic correction represents one of the clinical conditions that required the use of laminate veneers in premolars region. Aim of the study: The purpose of this study was to evaluate the fracture strength of the laminate veneers in maxillary first premolars, fabricated from either composite (direct and indirect techniques) or ceramic CAD/CAM blocks. Materials and Methods: Fifty sound human maxillary premolar teeth were used in this in vitro study. Teeth were divided randomly into one control group and four experimental groups of ten teeth each; Group A: Restored with direct composite veneer (Filtek Z250 XT), Group B: Restored with indirect composite veneers (Filtek Z250 XT), Group C: Restored with lithium disilicate ceramic CA
... Show MoreIn this study, a bioadhesive dosage form of eoconazole nitrate for vaginal delivery was designed using a combination of bioadhesive polymers: Carbopol 941 p and sodium carboxymethylcellulose or methylcellulose in different ratios. The bioadhesive strength was evaluated by measuring the force required to detach the tablet from sheep vaginal mucosal membrane. It was found that the bioadhesive force was directly proportional to Carbopol 941 p content in the different formulae. The formulae were tested for their swelling behavior using agar gel plate method. The results showed that formulae containing a combination of Carbopol 941 p and sodium carboxymethylcellulose had greater swelling index
... Show MoreThe fall angle of sun rays on the surface of a photovoltaic PV panel and its temperature is negatively affecting the panel electrical energy produced and efficiency. The fall angle problem was commonly solved by using a dual-axis solar tracker that continually maintains the panel orthogonally positioning to the sun rays all day long. This leads to maximum absorption for solar radiation necessary to produce maximum amount of energy and maintain high level of electrical efficiency. To solve the PV panel temperature problem, a Water-Flow Double Glazing WFDG technique has been introduced as a new cooling tool to reduce the panel temperature. In this paper, an integration design of the water glazing system with a dual-axis tracker has been ac
... Show MoreCryptography algorithms play a critical role in information technology against various attacks witnessed in the digital era. Many studies and algorithms are done to achieve security issues for information systems. The high complexity of computational operations characterizes the traditional cryptography algorithms. On the other hand, lightweight algorithms are the way to solve most of the security issues that encounter applying traditional cryptography in constrained devices. However, a symmetric cipher is widely applied for ensuring the security of data communication in constraint devices. In this study, we proposed a hybrid algorithm based on two cryptography algorithms PRESENT and Salsa20. Also, a 2D logistic map of a chaotic system is a
... Show MoreFinding the shortest route in wireless mesh networks is an important aspect. Many techniques are used to solve this problem like dynamic programming, evolutionary algorithms, weighted-sum techniques, and others. In this paper, we use dynamic programming techniques to find the shortest path in wireless mesh networks due to their generality, reduction of complexity and facilitation of numerical computation, simplicity in incorporating constraints, and their onformity to the stochastic nature of some problems. The routing problem is a multi-objective optimization problem with some constraints such as path capacity and end-to-end delay. Single-constraint routing problems and solutions using Dijkstra, Bellman-Ford, and Floyd-Warshall algorith
... Show MoreA remarkable correlation between chaotic systems and cryptography has been established with sensitivity to initial states, unpredictability, and complex behaviors. In one development, stages of a chaotic stream cipher are applied to a discrete chaotic dynamic system for the generation of pseudorandom bits. Some of these generators are based on 1D chaotic map and others on 2D ones. In the current study, a pseudorandom bit generator (PRBG) based on a new 2D chaotic logistic map is proposed that runs side-by-side and commences from random independent initial states. The structure of the proposed model consists of the three components of a mouse input device, the proposed 2D chaotic system, and an initial permutation (IP) table. Statist
... Show MoreThe field of autonomous robotic systems has advanced tremendously in the last few years, allowing them to perform complicated tasks in various contexts. One of the most important and useful applications of guide robots is the support of the blind. The successful implementation of this study requires a more accurate and powerful self-localization system for guide robots in indoor environments. This paper proposes a self-localization system for guide robots. To successfully implement this study, images were collected from the perspective of a robot inside a room, and a deep learning system such as a convolutional neural network (CNN) was used. An image-based self-localization guide robot image-classification system delivers a more accura
... Show MoreThis research work aims to the determination of molybdenum (VI) ion via the formation of peroxy molybdenum compounds which has red-brown colour with absorbance wave length at 455nm for the system of ammonia solution-hydrogen peroxide-molybdenum (VI) using a completely newly developed microphotometer based on the ON-Line measurement. Variation of responses expressed in millivolt. A correlation coefficient of 0.9925 for the range of 2.5-150 ?g.ml-1 with percentage linearity of 98.50%. A detection limit of 0.25 ?g.ml-1 was obtained. All physical and chemical variable were optimized interferences of cation and anion were studied classical method of measurement were done and compared well with newly on-line measurements. Application for the use
... Show More