Distributed Denial of Service (DDoS) attacks on Web-based services have grown in both number and sophistication with the rise of advanced wireless technology and modern computing paradigms. Detecting these attacks in the sea of communication packets is very important. There were a lot of DDoS attacks that were directed at the network and transport layers at first. During the past few years, attackers have changed their strategies to try to get into the application layer. The application layer attacks could be more harmful and stealthier because the attack traffic and the normal traffic flows cannot be told apart. Distributed attacks are hard to fight because they can affect real computing resources as well as network bandwidth. DDoS attacks can also be made with smart devices that connect to the Internet, which can be infected and used as botnets. They use Deep Learning (D.L.) techniques like Convolutional Neural Network (C.N.N.) and variants of Recurrent Neural Networks (R.N.N.), such as Long Short-Term Memory (L.S.T.M.), Bidirectional L.S.T.M., Stacked L.S.T.M., and the Gat G.R.U.. These techniques have been used to detect (DDoS) attacks. The Portmap.csv file from the most recent DDoS dataset, CICDDoS2019, has been used to test D.L. approaches. Before giving the data to the D.L. approaches, the data is cleaned up. The pre-processed dataset is used to train and test the D.L. approaches. In the paper, we show how the D.L. approach works with multiple models and how they compare to each other.
Objectives: To review the failure rates of molar tubes and the effect of molar tube base design, adhesive type, and bonding technique on the failure rates of molar tubes. Data: The revolution of molar bonding greatly impacted fixed orthodontic appliance treatment by reducing chair-side time and improving patient comfort. Even with the many advantages of molar bonding, clinicians sometimes hesitate to use molar tubes due to their failure rates. Sources: Internet sources, such as Pubmed and Google Scholar. Study selection: studies testing the bond failure rate of molar tubes. Conclusions: The failure rate of the molar tubes can be reduced and the bond strength of the molar tubes can be improved by changing the design of the molar tube base
... Show MoreThis paper explores VANET topics: architecture, characteristics, security, routing protocols, applications, simulators, and 5G integration. We update, edit, and summarize some of the published data as we analyze each notion. For ease of comprehension and clarity, we give part of the data as tables and figures. This survey also raises issues for potential future research topics, such as how to integrate VANET with a 5G cellular network and how to use trust mechanisms to enhance security, scalability, effectiveness, and other VANET features and services. In short, this review may aid academics and developers in choosing the key VANET characteristics for their objectives in a single document.
Plagiarism is becoming more of a problem in academics. It’s made worse by the ease with which a wide range of resources can be found on the internet, as well as the ease with which they can be copied and pasted. It is academic theft since the perpetrator has ”taken” and presented the work of others as his or her own. Manual detection of plagiarism by a human being is difficult, imprecise, and time-consuming because it is difficult for anyone to compare their work to current data. Plagiarism is a big problem in higher education, and it can happen on any topic. Plagiarism detection has been studied in many scientific articles, and methods for recognition have been created utilizing the Plagiarism analysis, Authorship identification, and
... Show MoreImitation learning is an effective method for training an autonomous agent to accomplish a task by imitating expert behaviors in their demonstrations. However, traditional imitation learning methods require a large number of expert demonstrations in order to learn a complex behavior. Such a disadvantage has limited the potential of imitation learning in complex tasks where the expert demonstrations are not sufficient. In order to address the problem, we propose a Generative Adversarial Network-based model which is designed to learn optimal policies using only a single demonstration. The proposed model is evaluated on two simulated tasks in comparison with other methods. The results show that our proposed model is capable of completing co
... Show MoreThis research aims to:
1 – Make a proposed module for (aesthetics) for the second stage - Department of Art Education under education theories.
2 - Verification from the effect of the proposed module on student achievement and motivation towards learning aesthetics material.
To verification the second goal we wording these two hypotheses:
1- There are no individual differences with statistically significant at level (0.05) between the student's scores average. (Experimental group ) who studied according to the proposed module and the average student's scores (control group) who studied in the usual way for the achievement test for the Aesthetics material.
2- There are no individual differences with statistically signifi
Exploring the antibacterial potential of neem oil (Azadirachta indica) in combination with gentamicin (GEN) against pathogenic molds, especially Pseudomonas aeruginosa, has drawn concern due to the quest for natural treatment options against incurable diseases. Prospective research directions include looking for natural cures for many of the currently incurable diseases available now. microbial identification system, were used to identify the isolates. The research utilized a range of methods, such as the diffusion agar well (AWD) assays, TEM (transmission electron microscopy) analysis, minimum inhibitory concentration (MIC) assays, and real-time PCR (RT-qPCR) to analyze bacterial expression and the antibacterial action of neem oil (Azadira
... Show MoreThis study was conducted at the College of Education for Pure Sciences (Ibn Al-Haitham), University of Baghdad. The aim of this study was to isolate and diagnose fungi from fish feedstuff samples, and also detection of aflatoxin B1 and ochratoxin A in fish muscles and feedstuffs. Randomly, the samples were collected from some fish farms from Baghdad, Babil, Wasit, Anbar, and Salah al-Din provinces. This study included the collection of 35 feedstuff samples and 70 fish muscle samples, and each of the two fish samples fed on one sample of the feedstuff. The results showed the presence of several genera of different fungi including Aspergillus spp, Mucor spp., Penicillium spp., Yeast spp., Fusarium spp., Rhizopus spp., Scopiolariopsis spp., Ep
... Show MoreA strong sign language recognition system can break down the barriers that separate hearing and speaking members of society from speechless members. A novel fast recognition system with low computational cost for digital American Sign Language (ASL) is introduced in this research. Different image processing techniques are used to optimize and extract the shape of the hand fingers in each sign. The feature extraction stage includes a determination of the optimal threshold based on statistical bases and then recognizing the gap area in the zero sign and calculating the heights of each finger in the other digits. The classification stage depends on the gap area in the zero signs and the number of opened fingers in the other signs as well as
... Show MoreChange detection is a technology ascertaining the changes of
specific features within a certain time Interval. The use of remotely
sensed image to detect changes in land use and land cover is widely
preferred over other conventional survey techniques because this
method is very efficient for assessing the change or degrading trends
of a region. In this research two remotely sensed image of Baghdad
city gathered by landsat -7and landsat -8 ETM+ for two time period
2000 and 2014 have been used to detect the most important changes.
Registration and rectification the two original images are the first
preprocessing steps was applied in this paper. Change detection using
NDVI subtractive has been computed, subtrac