The recent advancements in security approaches have significantly increased the ability to identify and mitigate any type of threat or attack in any network infrastructure, such as a software-defined network (SDN), and protect the internet security architecture against a variety of threats or attacks. Machine learning (ML) and deep learning (DL) are among the most popular techniques for preventing distributed denial-of-service (DDoS) attacks on any kind of network. The objective of this systematic review is to identify, evaluate, and discuss new efforts on ML/DL-based DDoS attack detection strategies in SDN networks. To reach our objective, we conducted a systematic review in which we looked for publications that used ML/DL approach
... Show MoreIn this search, a new bioluminescent technique was proved for pyrophosphate which was employed to single- nucleotide polymorphism (SNP) diagnosis using one-base extension reaction. Four Mycobacterium tuberculosis genes were chosen (Rpob, InhA, KatG, GyrA) genes. Fifty-four specimens were used in this study fifty-three proved as drug-resistant specimens by The Iraqi Institute of Chest and Respiratory Diseases in Baghdad., also one specimen was used as a negative control. The procedure of this assay was as follows. A specific primer within each aliquot owning a short 3-OH end of the base of the target gene was hybridized to the single-stranded DNA template. Then, (exo-) Klenow DNA polymerase and one of either ?-thio-dATP, dTTP, dGTP, or dCTP
... Show MoreA food chain model in which the top predator growing logistically has been proposed and studied. Two types of Holling’s functional responses type IV and type II have been used in the first trophic level and second trophic level respectively, in addition to Leslie-Gower in the third level. The properties of the solution are discussed. Since the boundary dynamics are affecting the dynamical behavior of the whole dynamical system, the linearization technique is used to study the stability of the subsystem of the proposed model. The persistence conditions of the obtained subsystem of the food chain are established. Finally, the model is simulated numerically to understand the global dynamics of the food chain un
... Show MoreThe problem of the study and its significance:
Due to the increasing pressures of life continually, and constant quest behind materialism necessary and frustrations that confront us daily in general, the greater the emergence of a number of cases of disease organic roots psychological causing them because of severity of a lack of response to conventional treatments (drugs), and this is creating in patients a number of emotional disorders resulting from concern the risk of disease
That is interested psychologists and doctors searchin
... Show MoreField trial was conducted during the growing season of 2011-2012 at the Research
Field, Department of Biology, College of Science, Baghdad University to test the
performance of wheat cv Rabyaa, Latifiya, Al-Iraq, Tummose 2, Abu-Graib 3, IPA
99 and Sham 6 grown under different soil water deficit stresses. Several agronomic
and physiological traits and yield and yield components of the test cultivars were
determined. The experiment was conducted in split plot design with five replications
for each treatment. The cultivars were kept in the sub plot while water stress
treatment was assigned as main plot. Water stress was applied by irrigated the plots
to the soil field capacity (FC) then withheld next irrigation until
Five bread wheat cultivars was selected namely, IPA99, Tamouz 2, Rasheed, Abu-ghraib And Iraq, were selected for susceptibility to green bug, Schizaphis graminum R.(Aphididae: Homoptera) infestation. Experiments done in under laboratory temperature 20±2C˚, humidity 65±5 % at 12h light. Results have indicated that IPA99 was highly preferred by in S. graminum and no significant of differences with Rasheed and Abu-ghraib, while Iraq and Tamouz2 came second. Although all wheat cultivars were infested by S. graminum except Iraq cultivar which showed some tolerance when exposed to three densities of 5, 10, ap plant during the time of test was 4 weeks. the development time of nymphs were 8, 8, 9, 9.3and 8.3 days for cultivars IPA99, Tamoz2,
... Show MoreIn this paper ,we introduce a concept of Max– module as follows: M is called a Max- module if ann N R is a maximal ideal of R, for each non– zero submodule N of M; In other words, M is a Max– module iff (0) is a *- submodule, where a proper submodule N of M is called a *- submodule if [ ] : N K R is a maximal ideal of R, for each submodule K contains N properly. In this paper, some properties and characterizations of max– modules and *- submodules are given. Also, various basic results a bout Max– modules are considered. Moreover, some relations between max- modules and other types of modules are considered.
... Show MoreImam Ibn Abi Shaybah counted in his book classified twenty-five and a hundred recent and impact claimed that Abu Hanifa has violated the provisions required by apparent, and these conversations and effects including with regard to worship and transactions, including with regard to personal status, including with regard to borders and felonies, and collected by Sheikh Muhammad Zahid Al-Kothari in his book funny jokes in talking about the responses of Ibn Abu Shaybah on Abu Hanifa, and these issues we will study in our research.
The aim of this paper is to shed the light on the concepts of agency theory by measuring one of the problems that arise from it, which is represented by earnings management (EM) practices. The research problem is demonstrated by the failure of some Iraqi banks and their subsequent placement under the supervision of the Central Bank of Iraq, which was attributed, in part, to the inadequacy of the agency model in protecting stakeholders in shareholding institutions, as well as EM, pushed professional institutions to adopt the corporate governance model as a method to regulate the problem of accounting information asymmetry between the parties to the agency. We are using the Beneish M-score model and the financial analysis equations in
... Show More