Distributed Denial of Service (DDoS) attacks on Web-based services have grown in both number and sophistication with the rise of advanced wireless technology and modern computing paradigms. Detecting these attacks in the sea of communication packets is very important. There were a lot of DDoS attacks that were directed at the network and transport layers at first. During the past few years, attackers have changed their strategies to try to get into the application layer. The application layer attacks could be more harmful and stealthier because the attack traffic and the normal traffic flows cannot be told apart. Distributed attacks are hard to fight because they can affect real computing resources as well as network bandwidth. DDoS attacks can also be made with smart devices that connect to the Internet, which can be infected and used as botnets. They use Deep Learning (D.L.) techniques like Convolutional Neural Network (C.N.N.) and variants of Recurrent Neural Networks (R.N.N.), such as Long Short-Term Memory (L.S.T.M.), Bidirectional L.S.T.M., Stacked L.S.T.M., and the Gat G.R.U.. These techniques have been used to detect (DDoS) attacks. The Portmap.csv file from the most recent DDoS dataset, CICDDoS2019, has been used to test D.L. approaches. Before giving the data to the D.L. approaches, the data is cleaned up. The pre-processed dataset is used to train and test the D.L. approaches. In the paper, we show how the D.L. approach works with multiple models and how they compare to each other.
Extracorporeal Shock Wave Lithotripsy (ESWL) is the most commonplace remedy for kidney stone. Shock waves from outside the body frame are centered at a kidney stone inflicting the stone to fragment. The success of the (ESWL) treatment is based on some variables such as age, sex, stone quantity stone period and so on. Thus, the prediction the success of remedy by this method is so important for professionals to make a decision to continue using (ESWL) or tousing another remedy technique. In this study, a prediction system for (ESWL) treatment by used three techniques of mixing classifiers, which is Product Rule (PR), Neural Network (NN) and the proposed classifier called Nested Combined Classi
... Show MoreThe research aims to find approximate solutions for two dimensions Fredholm linear integral equation. Using the two-variables of the Bernstein polynomials we find a solution to the approximate linear integral equation of the type two dimensions. Two examples have been discussed in detail.
The subject of the provisions of prayer on the chairs of the important topics in the jurisprudence they fall under the door of the people of excuses, and this section of the important doors in Islamic jurisprudence because it permeates scourge, as prayer is one of the pillars of this religion, and the first thing to be held accountable on the Day of Resurrection prayer If the peace reconciled the rest of his work and spoil corrupted all his work, the street wise was interested in this matter and put him provisions overlooked by many people these days became insulted him and do not pardon him, and do not know the rules and provisions approved by Shara, and the omission of one of these provisions is possible To lead to the invalidity of hi
... Show Morethe research was exposed to a study the importance of the role of the supportive entities in providing the useful information to the tax administration and their ability to extend the level of the tax base of taxpayers, through the improvement of the tax payers determination and their tax settle for the purpose of increasing the tax revenue, and shed light on the legal evidence through which these entities become officially assigned to perform a supplementary task to the General Committee for Taxes GCT, to help it to perform its task efficiently, and to study the reasons of the weak cooperation of the supportive entities and their reluctance to provide useful information which leads to limiting the tax base.
The research data hav
... Show MoreThere are two ways that the contract might be formed with (contracting between persons who are attended and contracting between absence persons).the need for determining the precise moment of the contract , is so clear because there is a specify period separate between the declaration of acceptance and the knowledge with it .and it is clear from the four theories known for jurisprudence (theory of the declaration of the acceptance, theory of exporting the acceptance , theory of the arrival of the acceptance , theory of the knowledge with the acceptance ) . It is difficult to promote one theory on another one if we look at each one and the justification of its supporters and what the opponents of each theory expose. Legal background and diff
... Show MoreAbstract Diabetic nephropathy (DN) is a prevalent chronic microvascular diabetic complication. As inflammation plays a vital role in the development and progress of DN the macrophages migration inhibitory factor (MIF), a proinflammatory multifunctional cytokine approved to play a critical function in inflammatory responses in various pathologic situations like DN. This study aimed To assess serum levels of MIF in a sample of Iraqi diabetic patients with nephropathy supporting its validity as a marker for predicting nephropathy in T2DM patients. In addition, to evaluate the nephroprotective effect of angiotensin-converting enzyme (ACE) inhibitors in terms of their influence on MIF levels. This is a case-control study involving ninety
... Show MoreThis paper discusses the method for determining the permeability values of Tertiary Reservoir in Ajeel field (Jeribe, dhiban, Euphrates) units and this study is very important to determine the permeability values that it is needed to detect the economic value of oil in Tertiary Formation. This study based on core data from nine wells and log data from twelve wells. The wells are AJ-1, AJ-4, AJ-6, AJ-7, AJ-10, AJ-12, AJ-13, AJ-14, AJ-15, AJ-22, AJ-25, and AJ-54, but we have chosen three wells (AJ4, AJ6, and AJ10) to study in this paper. Three methods are used for this work and this study indicates that one of the best way of obtaining permeability is the Neural network method because the values of permeability obtained be
... Show MoreSeeking pharmacist advice about minor ailments is a common practice among Iraqi patients because such advice is free and quick. Unfortunately, the assessment and management of minor ailments by Iraqi pharmacists were inappropriate. Therefore, this study aimed to develop a model for a mobile application that can assist community pharmacists in the diagnosis and management of minor ailments.
The scientific content of the application was based on the information in the symptoms in the pharmacy and British Nati
A systematic approach is presented to achieve the stable grasping of objects through a two-finger robotic hand, in which each finger cavity was filled with granular media. The compaction of the latter, controlled by vacuum pressure, was used to adjust the structural and contact stiffness of the finger. The grasping stability was studied under the concurrent effect of an external torque and applied vacuum pressure. Stable grasping was defined as the no slippage condition between the grasped object and the two fingers. Three control schemes were adopted and applied experimentally to ensure the effectiveness of the grasping process. The results showed that stable and unstable grasping regions exist for each combination of applied torqu
... Show More