The recent advancements in security approaches have significantly increased the ability to identify and mitigate any type of threat or attack in any network infrastructure, such as a software-defined network (SDN), and protect the internet security architecture against a variety of threats or attacks. Machine learning (ML) and deep learning (DL) are among the most popular techniques for preventing distributed denial-of-service (DDoS) attacks on any kind of network. The objective of this systematic review is to identify, evaluate, and discuss new efforts on ML/DL-based DDoS attack detection strategies in SDN networks. To reach our objective, we conducted a systematic review in which we looked for publications that used ML/DL approaches to identify DDoS attacks in SDN networks between 2018 and the beginning of November 2022. To search the contemporary literature, we have extensively utilized a number of digital libraries (including IEEE, ACM, Springer, and other digital libraries) and one academic search engine (Google Scholar). We have analyzed the relevant studies and categorized the results of the SLR into five areas: (i) The different types of DDoS attack detection in ML/DL approaches; (ii) the methodologies, strengths, and weaknesses of existing ML/DL approaches for DDoS attacks detection; (iii) benchmarked datasets and classes of attacks in datasets used in the existing literature; (iv) the preprocessing strategies, hyperparameter values, experimental setups, and performance metrics used in the existing literature; and (v) current research gaps and promising future directions.
The tight gas is one of the main types of the unconventional gas. Typically the tight gas reservoirs consist of highly heterogeneous low permeability reservoir. The economic evaluation for the production from tight gas production is very challenging task because of prevailing uncertainties associated with key reservoir properties, such as porosity, permeability as well as drainage boundary. However one of the important parameters requiring in this economic evaluation is the equivalent drainage area of the well, which relates the actual volume of fluids (e.g gas) produced or withdrawn from the reservoir at a certain moment that changes with time. It is difficult to predict this equival
Brain Fingerprinting (BF) is one of the modern technologies that rely on artificial intelligence in the field of criminal evidence law. Brain information can be obtained accurately and reliably in criminal procedures without resorting to complex and multiple procedures or questions. It is not embarrassing for a person or even violates his human dignity, as well as gives immediate and accurate results. BF is considered one of the advanced techniques related to neuroscientific evidence that relies heavily on artificial intelligence, through which it is possible to recognize whether the suspect or criminal has information about the crime or not. This is done through Magnetic Resonance Imaging (EEG) of the brain and examining
... Show MoreThis research deals with the hadiths of intimidation. An analytical study of the serious effects of intimidation in society. Intimidation and intimidation of a Muslim is a serious matter, because of the anxiety, intimidation, and dispossession of others ’rights, but some consider it easy, and others intimidate jokingly or seriously, which may lead to such intimidation to have effects Serious.
For intimidation entails the death of the individual, the disappearance of his mind, or the loss of his money, etc., from here the need was urgent; to show the vision of the prophetic Sunnah in denouncing intimidation, so we had this humble research tagged with (hadiths prohibiting the intimidation of a Muslim in the books The six are an analyt
A comparison between the resistance capacity of a single pile excited by two opposite rotary machines embedded in dry and saturated sandy soil was considered experimentally. A small-scale physical model was manufactured to accomplish the experimental work in the laboratory. The physical model consists of: two small motors supplied with eccentric mass 0·012 kg and eccentric distance 20 mm representing the two opposite rotary machines, an aluminum shaft with 20 mm in diameter as the pile, and a steel plate with dimensions of (160 × 160 × 20 mm) as a pile cap. The experimental work was achieved taking the following parameters into consideration, pile embedment depth ratio (L/d; length to diameter) and operating freq
... Show MoreUser confidentiality protection is concerning a topic in control and monitoring spaces. In image, user's faces security in concerning with compound information, abused situations, participation on global transmission media and real-world experiences are extremely significant. For minifying the counting needs for vast size of image info and for minifying the size of time needful for the image to be address computationally. consequently, partial encryption user-face is picked. This study focuses on a large technique that is designed to encrypt the user's face slightly. Primarily, dlib is utilizing for user-face detection. Susan is one of the top edge detectors with valuable localization characteristics marked edges, is used to extract
... Show MoreDouble drum dryer is operated for producing pregelatinized maize starches using feed starch slurries of different
solids(7, 10 and13 g/100 g )content . Steam pressure (2,3,and 4 bar), the level of pool between the drums (4,7,and 10
cm) , and speed of drums rotation (3,4,and 6 rpm) are varied together with the feed solids content in a practical range of
values. The response of the dryer is registered by measuring several output variables, i.e. external drum temperature,
product moisture content, mass flow rate.
The lower Cretaceous sandstones of Zubair and Nahr Umr formations are the main producing reservoirs in Subba oilfield in southern Iraq. Key differences in their petrophysical and depositional attributes exist affecting their reservoir characteristics. The evaluation of well logs and core porosity-permeability data show better reservoir properties in Nahr Formation. The Litho-saturation logs indicate greater thickness of oil-saturated reservoir units for Nahr Unr Formation associated with lower values of shale volume, and higher values of effective porosity. In addition, higher values of permeability for Nahr Umr Formation is suggested by applying porosity-irreducible water saturation cross plot. The reducing reservoir quality of Zub
... Show MoreEmotional blackmail is generally defined as manipulating others' emotions for personal gain. It is a type of manipulation that damages healthy relationships among people and turns them into toxic relations leaving the victim in a state of depression and under stress of losing something s/he holds dear. This study aims to identify the pragmatic techniques of emotional blackmail used by both blackmailers and victims in "No One Would Tell" (2018). To do so, the researchers developed an eclectic model comprising Forward and Frazier's (1997) emotional blackmail, Searle’s speech acts (1979), Brown and Levinson’s politeness strategies (1987), Culpeper’s impoliteness strategies (1996, 2005), and Mayfield's taxonomy of fallacy (2007)
... Show More