Distributed Denial of Service (DDoS) attacks on Web-based services have grown in both number and sophistication with the rise of advanced wireless technology and modern computing paradigms. Detecting these attacks in the sea of communication packets is very important. There were a lot of DDoS attacks that were directed at the network and transport layers at first. During the past few years, attackers have changed their strategies to try to get into the application layer. The application layer attacks could be more harmful and stealthier because the attack traffic and the normal traffic flows cannot be told apart. Distributed attacks are hard to fight because they can affect real computing resources as well as network bandwidth. DDoS attacks can also be made with smart devices that connect to the Internet, which can be infected and used as botnets. They use Deep Learning (D.L.) techniques like Convolutional Neural Network (C.N.N.) and variants of Recurrent Neural Networks (R.N.N.), such as Long Short-Term Memory (L.S.T.M.), Bidirectional L.S.T.M., Stacked L.S.T.M., and the Gat G.R.U.. These techniques have been used to detect (DDoS) attacks. The Portmap.csv file from the most recent DDoS dataset, CICDDoS2019, has been used to test D.L. approaches. Before giving the data to the D.L. approaches, the data is cleaned up. The pre-processed dataset is used to train and test the D.L. approaches. In the paper, we show how the D.L. approach works with multiple models and how they compare to each other.
Sheet piles are necessary with hydraulic structures as seepage cut-off to reduce the seepage. In this research, the computational work methodology was followed by building a numerical model using Geo-Studio program to check the efficiency of using concrete sheet piles as a cut-off or reducer for seepage with time if the sheet piles facing the drawdown technique. Al-Kifil regulator was chosen as a case study, an accurate model was built with a help of observed reading of the measuring devices, which was satisfactory and helped in checking the sheet piles efficiency. Through the study, three scenarios were adopted (with and without) drawdown technique, it was found that at the short time there's no effect of the drawdown technique on
... Show MoreThis study aims to know how and what is the media processing presented by the television talk shows for the religious extremism topics in terms of topics, hosted personalities, and ways to address this global phenomenon.
The study is based on descriptive research, and the researcher used the analytical-survey method, analyzing the episodes of (Awkar Al Dhalam) T.V Show which was presented on Al-Iraqiya News Channel, and (Islam Hur) T.V Show which was presented on Al-Hurra in 2019 with 25 episodes from each Show, The sample and research community was chosen with the intent to cover the research problem and its
The study reached several conclusions, including:
- The various dialogs in the episo
Theauthor addressed politeness discourse in “Surat Ghafir”. Quran texts include many rhetorical utterances which are considered pragmatic mechanismsconcerned with finding polite discourse. examining these texts allow to determine the effectiveness degree in the discourse, and to find the effect level that leads to interaction between the speaker and the listener. Graduation is considered an effect and a mechanism of discourse escalation.
The author reached a common definition of the graduation effectiveness term, due to its importance in finding polite discourse that is constructed by lingual manifestations some of which are escalation and graduation. Escalation is a mechanism to show the level of discourse graduation, it is a mea
One of the main environmental problems which affect extensively the areas in the world is soil salinity. Traditional data collection methods are neither enough for considering this important environmental problem nor accurate for soil studies. Remote sensing data could overcome most of these problems. Although satellite images are commonly used for these studies, however there are still needs to find the best calibration between the data and real situations in each specified area. Landsat satellite (TM & ETM+) images have been analyzed to study soil pollution (Exacerbation of salinity in the soil without the use of abandoned agricultural for a long time) at west of Baghdad city of Iraqi country for the years 1990, 2001 & 2007. All of the th
... Show MoreThe contractual imbalance is perceived today by the majority of the doctrine as being one of the pitfalls to the execution of the contracts. As a result, most legislations grant judges the power to intervene to restore it. Granting the judge the power to complete the contract raises the question of the extent to which the judge can obtain such power. Is it an absolute authority that is not limited? If so, is it a broad discretion in which the judge operates in his conscience, or is it a power of limited scope by specific legal texts and conventions? This is what we will try to answer in this research.
This article discusses how women have significant abilities to cope with the difficulties of war times. They are not the weak and vulnerable victims who are thought to be. On the contrary, they have the power to control over many-sided fronts, like participating in the battlefield as nurses or activists for peace, or even fighters, as well as through the tasks and responsibilities assigned to them to protect and support their families during wartime. The researcher will examine the impact of war upon women. Like men, women suffer during wartime. They are being injured, tortured and killed. Yet, they are able to give examples of love and courage even in the difficult times of war. Hana is one of those women who lived during wartimes,
... Show MoreDeception is an inseparable facet of political discourse in attaining strategic political gains though compromising public opinion. However, the employment of discursive deception strategies by the policy-making institutions of think tanks has not received due attention in the literature. The current study aims at exploring how the ideologizing deception strategies are utilized by the conservative American think tank of the Washington Institute to reproduce socio-political realities and re-shape public opinion. To fulfill this task, van Dijk’s (2000) notion of ideological polarization which shows positive self-representation and negative other representation is adopted to conduct a critical discourse analysis of four Arabic texts relea
... Show MoreRap songs often feature artists who utilize explicit language to convey feelings such as happiness, sorrow, and anger, reflecting audience expectations and trends within the music industry. This study intends to conduct a socio-pragmatic analysis of explicit, derogatory, and offensive language in the songs of the American artist Doja Cat, employing Hughes’ (1996) Swearing Word Theory, Jay’s (1996) Taboo Words Theory, Luhr’s (2002) classification of social factors for sociolinguistic examination, Salager’s (1997) categories of hedges for pragmatic assessment, and Austin’s (1965, 1989) theory of speech acts. The researchers collected the data using the AntConc corpus analysis tool. The data shows the singer’s frequent use
... Show MoreInformation security contributes directly to increase the level of trust between the government’s departments by providing an assurance of confidentiality, integrity, and availability of sensitive governmental information. Many threats that are caused mainly by malicious acts can shutdown the egovernment services. Therefore the governments are urged to implement security in e-government projects.
Some modifications were proposed to the security assessment multi-layer model (Sabri model) to be more comprehensive model and more convenient for the Iraqi government. The proposed model can be used as a tool to assess the level of security readiness of government departments, a checklist for the required security measures and as a commo
