Distributed Denial of Service (DDoS) attacks on Web-based services have grown in both number and sophistication with the rise of advanced wireless technology and modern computing paradigms. Detecting these attacks in the sea of communication packets is very important. There were a lot of DDoS attacks that were directed at the network and transport layers at first. During the past few years, attackers have changed their strategies to try to get into the application layer. The application layer attacks could be more harmful and stealthier because the attack traffic and the normal traffic flows cannot be told apart. Distributed attacks are hard to fight because they can affect real computing resources as well as network bandwidth. DDoS attacks can also be made with smart devices that connect to the Internet, which can be infected and used as botnets. They use Deep Learning (D.L.) techniques like Convolutional Neural Network (C.N.N.) and variants of Recurrent Neural Networks (R.N.N.), such as Long Short-Term Memory (L.S.T.M.), Bidirectional L.S.T.M., Stacked L.S.T.M., and the Gat G.R.U.. These techniques have been used to detect (DDoS) attacks. The Portmap.csv file from the most recent DDoS dataset, CICDDoS2019, has been used to test D.L. approaches. Before giving the data to the D.L. approaches, the data is cleaned up. The pre-processed dataset is used to train and test the D.L. approaches. In the paper, we show how the D.L. approach works with multiple models and how they compare to each other.
Geotechnical engineering like any other engineering field has to develop and cope with new technologies. This article intends to investigate the spatial relationships between soil’s liquid limit (LL), plasticity index (PI) and Liquidity index (LI) for particular zones of Sulaymaniyah City. The main objective is to study the ability to produce digital soil maps for the study area and determine regions of high expansive soil. Inverse Distance Weighting (IDW) interpolation tool within the GIS (Geographic Information System) program was used to produce the maps. Data from 592 boreholes for LL and PI and 245 boreholes for LI were used for this study. Layers were allocated into three depth ranges (1 to 2, 2 to 4 and 4 to 6)
... Show MoreYouTube is not just a platform that individuals share, upload, comment on videos; teachers and educators can utilize it to the best maximum so that students can have benefits. This study aims at investigating how active and influential YouTube can be in the educational process and how it is beneficial for language teachers to enhance the skills of students. The study demonstrates different theoretical frameworks that tackle the employment of technology to enhance the learning/teaching process. It relies on the strategies of Berk (2009) for using multimedia media, video clips in particular to develop the abilities of teachers for using technology in classrooms. To achieve the objective of the study, the researchers develop a questionnair
... Show MoreThis research is aimed at identifying the communicative habits and the impact of the content on the communicative process, especially the youth audience, which is one of the most important categories to which the advertisement is directed, as young people face life with passion and aspiration that make then responsive to all the influences used by the media in designing advertisements which use all the techniques and methocls to attract young people, such as relying on drama , artistic tricks, musical phrases and advertising slogans that respond to the desire of young people in entertainment.
The research aims to identify the reflection of television advertising and its impact on the development of the cognitive abilities of universi
Aim of the Study: The paper aims at identifying the extent of the role of strategic leadership represented by its four dimensions (administrative, transformational, political, moral) in fulfilling the requirements of university governance (Context, message and Goal, Management orientation, Independence, Issue, Sharing)
Methodology: A survey is applied to (107) members of the teaching staff at the college of Administration and Economics/ University of Mosul. To achieve the goals of the study, the researcher makes use of a number of tools such as: questionnaire, statistical tools and methods (repetitions, perce
... Show MoreThe development of information systems in recent years has contributed to various methods of gathering information to evaluate IS performance. The most common approach used to collect information is called the survey system. This method, however, suffers one major drawback. The decision makers consume considerable time to transform data from survey sheets to analytical programs. As such, this paper proposes a method called ‘survey algorithm based on R programming language’ or SABR, for data transformation from the survey sheets inside R environments by treating the arrangement of data as a relational format. R and Relational data format provide excellent opportunity to manage and analyse the accumulated data. Moreover, a survey syste
... Show MoreThe survey and checklist of invasive species of the insects in some different localities of Iraq are revised; 24 invasive species were documented until December 2018 during the current investigations. The species distributions, common names and synonyms are given.
The current investigation included all of exotic species in Iraq, which are not collected during this study.
The concept of strong soft pre-open set was initiated by Biswas and Parsanann.We utilize this notion to study several characterizations and properties of this set. We investigate the relationships between this set and other types of soft open sets. Moreover, the properties of the strong soft pre-interior and closure are discussed. Furthermore, we define a new concept by using strong soft pre-closed that we denote as locally strong soft pre-closed, in which several results are obtained. We establish a new type of soft pre-open set, namely soft pre-open. Also, we continue to study pre- soft open set and discuss the relationships among all these sets. Some counter examples are given to show some relations
... Show MoreThis research is a modest effort to talk about the great world of ancient lineage, Imam Majd al-Din Abu Saadat, known as Ibn al-Atheer island, through the statement of his name, surname, nickname, family, elders and his pupils and his most important works.
It also deals with the modern research on his famous book in the field of modern science called (the end in the strange talk and impact), which is one of the most wonderful books of modern and especially the strange talk, through the scientific effort of the Imam and the importance of the book and methodology, and the most prominent aspects of the service and care of Ibn Al Atheer For the modern stranger, which boils down to two aspects:
First: the linguistic rooting of the stran