Distributed Denial of Service (DDoS) attacks on Web-based services have grown in both number and sophistication with the rise of advanced wireless technology and modern computing paradigms. Detecting these attacks in the sea of communication packets is very important. There were a lot of DDoS attacks that were directed at the network and transport layers at first. During the past few years, attackers have changed their strategies to try to get into the application layer. The application layer attacks could be more harmful and stealthier because the attack traffic and the normal traffic flows cannot be told apart. Distributed attacks are hard to fight because they can affect real computing resources as well as network bandwidth. DDoS attacks can also be made with smart devices that connect to the Internet, which can be infected and used as botnets. They use Deep Learning (D.L.) techniques like Convolutional Neural Network (C.N.N.) and variants of Recurrent Neural Networks (R.N.N.), such as Long Short-Term Memory (L.S.T.M.), Bidirectional L.S.T.M., Stacked L.S.T.M., and the Gat G.R.U.. These techniques have been used to detect (DDoS) attacks. The Portmap.csv file from the most recent DDoS dataset, CICDDoS2019, has been used to test D.L. approaches. Before giving the data to the D.L. approaches, the data is cleaned up. The pre-processed dataset is used to train and test the D.L. approaches. In the paper, we show how the D.L. approach works with multiple models and how they compare to each other.
This study is concerned with the comparison of the results of some tests of passing and dribbling of the basketball of tow different years between teams of chosen young players in Baghdad. Calculative methods were used namely (Arithmetic mean, Value digression and T.test for incompatible specimens). After careful calculative treatments, it has been that there were abstract or no abstract differences in the find results of chestpass, highdribble and cross-over dribble. The clubs were: (Al-Khark, Air defence, Police and Al-Adamiyah) each one separate from the other for the year (2000-2001). After all that many findings were reached such as the lack of objective valuation (periodical tests) between one sport season and the other. In the light
... Show MoreWhile traditional energy sources such as oil, coal, and natural gas drive economic growth, they also seriously affect people’s health and the environment. Renewable energies (RE) are presently seen as an efficient choice for attaining long-term sustainability in development. They provide an adequate response to climate change and supply sufficient electricity. The current situation in Iraq results from a decades-long scarcity of reliable electricity, which has impacted various industries, including agriculture. There are diverse prospects for using renewable energy sources to address the present power crisis. The economic and environmental impacts of renewable energy systems were investigated in this study by using the solar pumpi
... Show MoreThis study aims to determine the reasons for the increase in the frequency of sand and dust storms in the Middle East and to identify their sources and mitigate them. A set of climatic data from 60 years (1960–2022) was analyzed. Sand storms in Iraq are a silty sand mature arkose composed of 72.7% sand, 25.1% silt, and 2.19% clay; the clay fraction in dust storms constitutes 70%, with a small amount of silt (20.6%) and sand (9.4%). Dust and sand storms (%) are composed of quartz (49.2, 67.1), feldspar (4.9, 20.9), calcite (38, 5), gypsum (4.8, 0.4), dolomite (0.8, 1.0), and heavy minerals (3.2, 6.6). Increasing temperatures in Iraq, by an average of 2 °C for sixty years, have contributed to an increase in the number of dust storm
... Show MoreIn recent years, the migration of the computational workload to computational clouds has attracted intruders to target and exploit cloud networks internally and externally. The investigation of such hazardous network attacks in the cloud network requires comprehensive network forensics methods (NFM) to identify the source of the attack. However, cloud computing lacks NFM to identify the network attacks that affect various cloud resources by disseminating through cloud networks. In this paper, the study is motivated by the need to find the applicability of current (C-NFMs) for cloud networks of the cloud computing. The applicability is evaluated based on strengths, weaknesses, opportunities, and threats (SWOT) to outlook the cloud network. T
... Show MoreThis study examines the vibrations produced by hydropower operations to improve embankment dam safety. This study consists of two parts: In the first part, ANSYS-CFX was used to generate a three-dimensional (3-D) finite volume (FV) model to simulate a vertical Francis turbine unit in the Mosul hydropower plant. The pressure pattern result of the turbine model was transformed into the dam body to show how the turbine unit's operation affects the dam's stability. The upstream reservoir conditions, various flow rates, and fully open inlet gates were considered. In the second part of this study, a 3-D FE Mosul dam model was simulated using an ANSYS program. The operational turbine model's water pressure pattern is conveyed t
... Show MoreBackground: The excessive use and abuse of antibiotics contribute to bacterial resistance, raising the risk of complications and treatment failures. This study investigates adherence to antibiotic prescriptions among Iraqi dental patients, highlighting implications for antimicrobial resistance.Objective: To assess adherence levels and identify factors influencing antibiotic therapy compliance among dental patients.Methods: A cross-sectional survey was conducted in which adult dental patients aged 18 and older, who had been prescribed antibiotics within the past year, participated. The modified Morisky Medication Adherence Scale-8 items was used to evaluate adherence, and data were analyzed with IBM SPSS Statistics software V26.Results: Amon
... Show MoreA prey-predator interaction model has been suggested in which the population of a predator consists of a two-stage structure. Modified Holling's disk equation is used to describe the consumption of the prey so that it involves the additional source of food for the predator. The fear function is imposed on prey. It is supposed that the prey exhibits anti-predator behavior and may kill the adult predator due to their struggle against predation. The proposed model is investigated for existence, uniqueness, and boundedness. After determining all feasible equilibrium points, the local stability analyses are performed. In addition, global stability analyses for this model using the Lyapunov method are investigated. The chance of occurrence of loc
... Show MoreThis study is pointed out to estimate the effectiveness of two solvents in the extraction and evaluating the active ingredients and their antioxidant activity as well as anti-cancer efficiency. Therefore, residues from four different Brassica vegetables viz. broccoli, Brussels sprout, cauliflower, and red cherry radish were extracted using two procedures methods: methanolic and water crude extracts. Methanol extracts showed the highest content of total phenolic (TP), total flavonoids (TF), and total tannins (TT) for broccoli and Brussels sprouts residues. Methanolic extract of broccoli and Brussels sprouts residues showed the highest DPPH· scavenging activity (IC50 = 15.39 and 18.64 µg/ml). The methanol and water ex
... Show MoreIn this paper, thermal performance of a zig-zig solar air heater (ZZSAH) with and without using steel wire mesh on the absorber plate of the collector is experimentally investigated. The experimental work includes four inclination angles of the collector 20o, 30o, 45o, and 60o and four air mass flow rates of 0.03, 0.04, 0.06, and 0.08 kg/s under varieties of operating conditions of a geographic location of Baghdad. New correlation equations of Nusselt number are obtained from experimental results for both types of collectors where the effect of varying of the inclination angle of collector taken into consideration in the experiment. The correlations show good agreement wi
... Show More