Distributed Denial of Service (DDoS) attacks on Web-based services have grown in both number and sophistication with the rise of advanced wireless technology and modern computing paradigms. Detecting these attacks in the sea of communication packets is very important. There were a lot of DDoS attacks that were directed at the network and transport layers at first. During the past few years, attackers have changed their strategies to try to get into the application layer. The application layer attacks could be more harmful and stealthier because the attack traffic and the normal traffic flows cannot be told apart. Distributed attacks are hard to fight because they can affect real computing resources as well as network bandwidth. DDoS attacks can also be made with smart devices that connect to the Internet, which can be infected and used as botnets. They use Deep Learning (D.L.) techniques like Convolutional Neural Network (C.N.N.) and variants of Recurrent Neural Networks (R.N.N.), such as Long Short-Term Memory (L.S.T.M.), Bidirectional L.S.T.M., Stacked L.S.T.M., and the Gat G.R.U.. These techniques have been used to detect (DDoS) attacks. The Portmap.csv file from the most recent DDoS dataset, CICDDoS2019, has been used to test D.L. approaches. Before giving the data to the D.L. approaches, the data is cleaned up. The pre-processed dataset is used to train and test the D.L. approaches. In the paper, we show how the D.L. approach works with multiple models and how they compare to each other.
The H-Point Standard Addition Method (H-PSAM) has been applied for spectrophotometric simultaneous determination of Cimetidine and Erythromycin ethylsuccinate using Bromothymol Blue (BTB) as a chromogenic complexing agent in a buffer solution at pH 5.5.
KE Sharquie, AA Noaimi, GA Ibrahim, AS Al-Husseiny, Our Dermatology Online, 2016 - Cited by 3
The growth of developments in machine learning, the image processing methods along with availability of the medical imaging data are taking a big increase in the utilization of machine learning strategies in the medical area. The utilization of neural networks, mainly, in recent days, the convolutional neural networks (CNN), have powerful descriptors for computer added diagnosis systems. Even so, there are several issues when work with medical images in which many of medical images possess a low-quality noise-to-signal (NSR) ratio compared to scenes obtained with a digital camera, that generally qualified a confusingly low spatial resolution and tends to make the contrast between different tissues of body are very low and it difficult to co
... Show MoreBiomass has been extensively investigated, because of its presence as clean energy source. Tars and particulates formation problems are still the major challenges in development especially in the implementation of gasification technologies into nowadays energy supply systems. Laser Induced Fluorescence spectroscopy (LIF) method is incorporated for determining aromatic and Polycyclic Aromatic Hydrocarbons (PAH) produced at high temperature gasification technology. The effect of tars deposition when the gases are cooled has been highly reduced by introducing a new concept of measurement cell. The samples of PAH components have been prepared with the standard constrictions of measured PAHs by using gas chromatograph (GC). OPO laser with tun
... Show MoreThis paper reports test results and describes a numerical investigation of the effectiveness of using carbon fibre reinforced polymer (CFRP) fabrics for strengthening concrete cylinders that have been undamaged and damaged due to heating under preload. The purpose of this research was to investigate whether there is any difference in the performance of CFRP-wrapped cylinders if the wrapping is done under preload, and those for which neither heating, cooling nor wrapping was done under preload. The cylinders were exposed to 30% of maximum load at ambient temperature during heating and cooling before being wrapped under preload. Of 18 Ø 100 × 200 mm identical cylinders, 6 were left as control samples without heating, 12 were exposed t
... Show MoreInformation security in data storage and transmission is increasingly important. On the other hand, images are used in many procedures. Therefore, preventing unauthorized access to image data is crucial by encrypting images to protect sensitive data or privacy. The methods and algorithms for masking or encoding images vary from simple spatial-domain methods to frequency-domain methods, which are the most complex and reliable. In this paper, a new cryptographic system based on the random key generator hybridization methodology by taking advantage of the properties of Discrete Cosine Transform (DCT) to generate an indefinite set of random keys and taking advantage of the low-frequency region coefficients after the DCT stage to pass them to
... Show MoreThe present research was conducted to investigate the effectiveness of a training program to improve some aspects of sensory integration disorder and its effect on self-direction among a sample of children with intellectual disabilities. The study sample consists of (10 subjects as an experimental group) were exposed to the training program، and the control group consists of (10 subjects as a control group) were not exposed to the training program. The study included the following tools: A scale of self-direction for intellectual disability (prepared by the researcher). Training program (prepared by the researcher). The Results of the study showed the following: There are no statistically significant differences between the means ranks
... Show MoreIn recent years, the migration of the computational workload to computational clouds has attracted intruders to target and exploit cloud networks internally and externally. The investigation of such hazardous network attacks in the cloud network requires comprehensive network forensics methods (NFM) to identify the source of the attack. However, cloud computing lacks NFM to identify the network attacks that affect various cloud resources by disseminating through cloud networks. In this paper, the study is motivated by the need to find the applicability of current (C-NFMs) for cloud networks of the cloud computing. The applicability is evaluated based on strengths, weaknesses, opportunities, and threats (SWOT) to outlook the cloud network. T
... Show More