The recent advancements in security approaches have significantly increased the ability to identify and mitigate any type of threat or attack in any network infrastructure, such as a software-defined network (SDN), and protect the internet security architecture against a variety of threats or attacks. Machine learning (ML) and deep learning (DL) are among the most popular techniques for preventing distributed denial-of-service (DDoS) attacks on any kind of network. The objective of this systematic review is to identify, evaluate, and discuss new efforts on ML/DL-based DDoS attack detection strategies in SDN networks. To reach our objective, we conducted a systematic review in which we looked for publications that used ML/DL approaches to identify DDoS attacks in SDN networks between 2018 and the beginning of November 2022. To search the contemporary literature, we have extensively utilized a number of digital libraries (including IEEE, ACM, Springer, and other digital libraries) and one academic search engine (Google Scholar). We have analyzed the relevant studies and categorized the results of the SLR into five areas: (i) The different types of DDoS attack detection in ML/DL approaches; (ii) the methodologies, strengths, and weaknesses of existing ML/DL approaches for DDoS attacks detection; (iii) benchmarked datasets and classes of attacks in datasets used in the existing literature; (iv) the preprocessing strategies, hyperparameter values, experimental setups, and performance metrics used in the existing literature; and (v) current research gaps and promising future directions.
Abstract: In this research, nanofibers have been prepared by using an electrospinning method. Three types of polymer (PVA, VC, PMMA) have been used with different concentration. The applied voltage and the gap length were changed. It was observed that VC is the best polymer than the other types of polymers.
Speech is the essential way to interact between humans or between human and machine. However, it is always contaminated with different types of environment noise. Therefore, speech enhancement algorithms (SEA) have appeared as a significant approach in speech processing filed to suppress background noise and return back the original speech signal. In this paper, a new efficient two-stage SEA with low distortion is proposed based on minimum mean square error sense. The estimation of clean signal is performed by taking the advantages of Laplacian speech and noise modeling based on orthogonal transform (Discrete Krawtchouk-Tchebichef transform) coefficients distribution. The Discrete Kra
Purpose/objective:
1 - To explain the financial impact of the activities and areas of human resources management and the adoption of the methodology for estimating costs on the basis of conduct and statement of how to assess costs and benefits of human resource activities.
2 - Measuring human capital, and its impact on the financial statements.
Design/methodology/approach:
Concentrated dimensions of the research paper's lack of financial statements prepared by the organizations for information mandated human resource its components of the three (attraction - development
... Show MoreA simple, environmentally benign, cost-effective, and sensitive colorimetric determination for the pharmaceutical drug dexamethasone sodium phosphate (DXP) has been developed by the formation of a colored complex with fluoranil. The process was sensitive and linear over the range 1 to 40 μg/mL, excellent correlation coefficient 0.9989, recovery% 99.80 ± 1.3, limit of detection (LOD) and limit of quantification (LOQ) were 0.23 and 0.9 μg/mL, respectively, and good RSD ~1.63%. The experimental conditions were optimized after an intensive study. The approach was validated statistically for the quantification of the analyte in its pure and/or pharmaceutical form. Despite the proposed approach is selective, it still can be applied for
... Show MoreThe antimicrobial activity of two naphthoquinone semicarbazone derivatives (Two newly synthesized compounds) have been studied by using tube — diluation and disc plate technique. The effect of those derivatives upon pathogenic microorganism iso-lated from specimen(urine iwounds,stool, swabs, throat ....etc) have been studied also in comparison with the antibiotics (amikacin,ampicillin, carbencillin, cephalothin, cefoxitin,clindamycin ,erythromycin,gentamycin,penicillin,tetracylin and tri-methoprim. It was shown that derivative(1) had more effective against micro organ-ism than derivative(11).
In this paper we present the theoretical foundation of forward error analysis of numerical algorithms under;• Approximations in "built-in" functions.• Rounding errors in arithmetic floating-point operations.• Perturbations of data.The error analysis is based on linearization method. The fundamental tools of the forward error analysis are system of linear absolute and relative a prior and a posteriori error equations and associated condition numbers constituting optimal of possible cumulative round – off errors. The condition numbers enable simple general, quantitative bounds definitions of numerical stability. The theoretical results have been applied a Gaussian elimination, and have proved to be very effective means of both a prior
... Show MoreSpergularia iraqensis sp. nov. is described as a new species from Iraq. This species has been collected from Diyala Province in the central east of Iraq; it is closely related to Spergularia rubra (L.) J. Presl & C. Presl, 1819 and Spergularia bocconei (Scheele) Graebn., 1919.
The distinguishing of the morphological characteristics of the new species alongside the two similar species are discussed with photographs, and an identification key is given for Spergularia iraqensis and other closely related species.
In today's world, most business, regardless of size, believe that access to Internet is imperative if they are going to complete effectively. Yet connecting a private computer (or a network) to the Internet can expose critical or confidential data to malicious attack from anywhere in the world since unprotected connections to the Internet (or any network topology) leaves the user computer vulnerable to hacker attacks and other Internet threats. Therefore, to provide high degree of protection to the network and network's user, Firewall need to be used.
Firewall provides a barrier between the user computer and the Internet (i.e. it prevents unauthor
... Show MoreDuring the two last decades ago, audio compression becomes the topic of many types of research due to the importance of this field which reflecting on the storage capacity and the transmission requirement. The rapid development of the computer industry increases the demand for audio data with high quality and accordingly, there is great importance for the development of audio compression technologies, lossy and lossless are the two categories of compression. This paper aims to review the techniques of the lossy audio compression methods, summarize the importance and the uses of each method.
 
        