Distributed Denial of Service (DDoS) attacks on Web-based services have grown in both number and sophistication with the rise of advanced wireless technology and modern computing paradigms. Detecting these attacks in the sea of communication packets is very important. There were a lot of DDoS attacks that were directed at the network and transport layers at first. During the past few years, attackers have changed their strategies to try to get into the application layer. The application layer attacks could be more harmful and stealthier because the attack traffic and the normal traffic flows cannot be told apart. Distributed attacks are hard to fight because they can affect real computing resources as well as network bandwidth. DDoS attacks can also be made with smart devices that connect to the Internet, which can be infected and used as botnets. They use Deep Learning (D.L.) techniques like Convolutional Neural Network (C.N.N.) and variants of Recurrent Neural Networks (R.N.N.), such as Long Short-Term Memory (L.S.T.M.), Bidirectional L.S.T.M., Stacked L.S.T.M., and the Gat G.R.U.. These techniques have been used to detect (DDoS) attacks. The Portmap.csv file from the most recent DDoS dataset, CICDDoS2019, has been used to test D.L. approaches. Before giving the data to the D.L. approaches, the data is cleaned up. The pre-processed dataset is used to train and test the D.L. approaches. In the paper, we show how the D.L. approach works with multiple models and how they compare to each other.
Plagiarism is becoming more of a problem in academics. It’s made worse by the ease with which a wide range of resources can be found on the internet, as well as the ease with which they can be copied and pasted. It is academic theft since the perpetrator has ”taken” and presented the work of others as his or her own. Manual detection of plagiarism by a human being is difficult, imprecise, and time-consuming because it is difficult for anyone to compare their work to current data. Plagiarism is a big problem in higher education, and it can happen on any topic. Plagiarism detection has been studied in many scientific articles, and methods for recognition have been created utilizing the Plagiarism analysis, Authorship identification, and
... Show MoreLately great interests have emerged to find educational alternatives to teach and improve motor skills according to modern educational methods that take into account individual differences and speed in learning for the learner through individual learning that the learner adopts by teaching himself by passing through various educational situations to acquire skills and information in the way he is The learner is the focus of the educational process and among these alternatives the interactive video, the researchers noted through the educational training units at the Model Squash School of the Central Union, and that most of the methods and methods used in learning basic skills take a lot of time in the educational program and do not involve
... Show MoreMost intrusion detection systems are signature based that work similar to anti-virus but they are unable to detect the zero-day attacks. The importance of the anomaly based IDS has raised because of its ability to deal with the unknown attacks. However smart attacks are appeared to compromise the detection ability of the anomaly based IDS. By considering these weak points the proposed
system is developed to overcome them. The proposed system is a development to the well-known payload anomaly detector (PAYL). By
combining two stages with the PAYL detector, it gives good detection ability and acceptable ratio of false positive. The proposed system improve the models recognition ability in the PAYL detector, for a filtered unencrypt
Background: Sprite coding is a very effective technique for clarifying the background video object. The sprite generation is an open issue because of the foreground objects which prevent the precision of camera motion estimation and blurs the created sprite. Objective: In this paper, a quick and basic static method for sprite area detection in video data is presented. Two statistical methods are applied; the mean and standard deviation of every pixel (over all group of video frame) to determine whether the pixel is a piece of the selected static sprite range or not. A binary map array is built for demonstrating the allocated sprite (as 1) while the non-sprite (as 0) pixels valued. Likewise, holes and gaps filling strategy was utilized to re
... Show MoreThe aim of the research is to clarify the role of service quality through its dimensions represented by (tangibility, reliability, safety, response, empathy) in tax compliance with taxpayers, i.e. performance of the duties and obligations of the taxpayer through its dimensions (registration, accounting, payment of the amount of tax), and to know For this role, a sample was taken from the taxpayers of the branches of the General Authority for Taxes spread in the governorate of Baghdad and its affiliated districts, which amount to (15) tax branches, as (215) questionnaires were distributed to know the impressions and reactions of the taxpayers regarding the level of service quality through the aforementioned dimensions. Using the statistic
... Show MoreThe water supply network inside the building is of high importance due to direct contact with the user that must be optimally designed to meet the water needs of users. This work aims to review previous research and scientific theories that deal with the design of water networks inside buildings, from calculating the amount of consumption and the optimal distribution of the network, as well as ways to rationalize the use of water by the consumer. The process of pumping domestic water starts from water treatment plants to be fed to the public distribution networks, then reaching a distribution network inside the building till it is provided to the user. The design of the water supply network inside the building is
... Show MoreRadiation measuring devices need to process calibration which
lose their sensitivity and the extent of the response and the amount of
stability under a changing conditions from time to time and this
period depends on the nature and use of field in which used devices.
A comparison study was done to a (451P) (ionization chamber
survey meter) and this showed the variation of calibration factor in
five different years. This study also displayed the concept of
radiation instrument calibration and necessity of every year
calibration of them.
In this project we used the five years calibration data for ionization
chamber survey meter model Inspector (451P) to get that the values
of Calibration Factor (CF) and Res
This is a survey study that presents recent researches concerning factional controllers. It presents several types of fractional order controllers, which are extensions to their integer order counterparts. The fractional order PID controller has a dominant importance, so thirty-one paper are presented for this controller. The remaining types of controllers are presented according to the number of papers that handle them; they are fractional order sliding mode controller (nine papers), fuzzy fractional order sliding mode controller (five papers), fractional order lag-lead compensator (three papers), fractional order state feedback controller (three papers), fractional order fuzzy logic controller (three papers). Finally,
... Show More