The recent advancements in security approaches have significantly increased the ability to identify and mitigate any type of threat or attack in any network infrastructure, such as a software-defined network (SDN), and protect the internet security architecture against a variety of threats or attacks. Machine learning (ML) and deep learning (DL) are among the most popular techniques for preventing distributed denial-of-service (DDoS) attacks on any kind of network. The objective of this systematic review is to identify, evaluate, and discuss new efforts on ML/DL-based DDoS attack detection strategies in SDN networks. To reach our objective, we conducted a systematic review in which we looked for publications that used ML/DL approaches to identify DDoS attacks in SDN networks between 2018 and the beginning of November 2022. To search the contemporary literature, we have extensively utilized a number of digital libraries (including IEEE, ACM, Springer, and other digital libraries) and one academic search engine (Google Scholar). We have analyzed the relevant studies and categorized the results of the SLR into five areas: (i) The different types of DDoS attack detection in ML/DL approaches; (ii) the methodologies, strengths, and weaknesses of existing ML/DL approaches for DDoS attacks detection; (iii) benchmarked datasets and classes of attacks in datasets used in the existing literature; (iv) the preprocessing strategies, hyperparameter values, experimental setups, and performance metrics used in the existing literature; and (v) current research gaps and promising future directions.
This paper presents a robust algorithm for the assessment of risk priority for medical equipment based on the calculation of static and dynamic risk factors and Kohnen Self Organization Maps (SOM). Four risk parameters have been calculated for 345 medical devices in two general hospitals in Baghdad. Static risk factor components (equipment function and physical risk) and dynamics risk components (maintenance requirements and risk points) have been calculated. These risk components are used as an input to the unsupervised Kohonen self organization maps. The accuracy of the network was found to be equal to 98% for the proposed system. We conclude that the proposed model gives fast and accurate assessment for risk priority and it works as p
... Show MoreBackground: Pleomorphic adenoma of the minor salivary gland is a rare benign tumor. It commonly occurs in the hard and soft palates. Treatment by surgical excision achieved success in improving the patient’s health. Objective: To evaluate the recurrence rate after surgical treatment of pleomorphic adenoma in minor salivary glands. Methods: This retrospective study included patients who attended the Maxillofacial Surgery Unit in Ghazi Al-Hariri Hospital, Baghdad, from 2019 to 2021, complaining of soft tissue lumps involving the soft and hard palate, buccal mucosa, and upper lip. After the provisional diagnosis of these lesions, a total surgical excision of the tumor with a safe margin of 1 mm was performed, and the biopsy was sent
... Show MoreThe present study investigates the relation between the biliteral and triliteral roots which is the introduction to comprehend the nature of the Semitic roots during its early stage of development being unconfirmed to a single pattern. The present research is not meant to decide on the question of the biliteral roots in the Semitic languages, rather it is meant to confirm the predominance of the triliteral roots on these languages which refers, partially, to analogy adopted by the majority of linguists. This tendency is frequently seen in the languages which incline to over generalize the triliteral phenomenon, i. e., to transfer the biliteral roots to the triliteral room, that is, to subject it to the predominant pattern regarding the r
... Show MoreThe objective of the conventional well testing technique is to evaluate well- reservoir interaction through determining the flow capacity and well potential on a short-term basis by relying on the transient pressure response methodology. The well testing analysis is a major input to the reservoir simulation model to validate the near wellbore characteristics and update the variables that are normally function of time such as skin, permeability and productivity multipliers.
Well test analysis models are normally built on analytical approaches with fundamental physical of homogenous media with line source solution. Many developments in the last decade were made to increase the resolution of transient response derivation to meet the
... Show MoreThis study unveils the ideologies of women empowerment encoded in the Mona Lisa Smile movie (2003). It reveals how the stereotypical image of women born only to be wives and do the duties of upbringing and housework is challenged. Katherine Ann Watson (Julia Roberts), the main character in the movie, wants to make a difference in the next generation of women. She rejects the imposed traditional ideologies. Linguistically, she opposes conventional thinking and seeks to persuade her students that life is about more than getting married. The primary focus of this study is to examine and clarify how the characters’ linguistic choices convey their ideologies concerning the notion of women empowerment. To do this, the researchers apply
... Show More