Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreIn the current study, new derivatives were synthesized by reaction of N-hydroxyphthalimide with chloro acetyl chloride in the presence of Et3N as a base to form 1,3-dioxoisoindolin-2-yl 2-chloroacetate (B1), which in turn enters several reactions with different amines where it interacts with primary amines to give 1,3-dioxoisoindolin-2-yl acetate derivatives (B2-B4) in basic medium, in the same way it interacts with these amines but with adding KNCS to form thiourea derivatives (B5-B7). It also reacts with diamines to give bis(azanediyl) derivatives (compounds B8-B10). The prepared derivatives were diagnosed using infrared FTIR and 1HNMR,13CNMR for some derivatives. Compounds B4, B5 and B9 were measured as corrosion inhibitors the inhibitio
... Show MoreVictorian age is known as a time of perpetual change. It is a time of new industrialization, increased urbanization and new technology. Therefore, one of the strongest undercurrents of this is the position of women. Woman at that time was viewed as “an angel in the house” especially this who belongs to the upper-middle class. She is described in such term because she spends much time in her domestic domain. Therefore, she should be passive, obedient and dependent. Despite the Victorian society contains several classes; women are defined under two labels: the angel and the demon or the whore. The angel woman can be any woman from the lower middle class to the aristocracy, while the whore refers to any working class woman. The differen
... Show MoreThe article considers the main reason for A. I. Herzen's address to obsolete words, which is their ability to acquire a stylistic coloring in the context of speech, as well as the possibility of combining, in some cases, with neutral lexemes of various functional styles. A certain stylistic effect of such characteristics of this type of vocabulary is represented, as a result of which their stylistic coloring in syntagmatic terms does not coincide with stylistic coloring in terms of paradigmatics, that is, in speech they have a completely stylistic meaning. Attention is focused on the role of outdated vocabulary, which consists in the fact that they serve to implement such features of the artistic style as imagery, emotionality, and their
... Show MoreThe upbringing of Yehuda Amichai and the conditions he lived in had a great influence on his deep sense of pain, which made him think of death and suicide. Especially after the Nazis came to power in Germany, and his emigration with his family. Amichai searched for love throughout his life, and his failure was one of the most important factors affecting his psyche, which is A deep influence that made him live in harsh and painful pains that broke him, and prevented her from achieving his ambitions in life.Dramatic texts are characterized by repetition in writing and presentation. It is a textual discourse that has two advantages, first, that it can be read as a literary text like all other literary texts, and second, that it can be consider
... Show MoreSami Michael and Eli Amir - two Israeli writers born in Iraq and of the same generation (Sami Makhail was born in Baghdad in 1926 and Eli Amir in 1937). They wrote in their novels, among other things, about Orientalism , love and femininity. They both lived wild, extroverted lives. They did not shy away from experiencing anything new that came their way, rebelled against conventions and acted provocatively; they enjoyed the shock and amazement that evoked around them. While trying to find their place in different family settings, they chose to present two Arab Christian heroines. The narrator in Jasmine is the speaker Noori-Eli himself. While the narrator of “Trumpet in the Wadi” is Huda the heroine herself. Both are independent and bot
... Show MoreThe new ligand [N1,N4-bis((1H-benzo[d]Glyoxalin-2-yl)carbamothioyl)Butanedi amide] (NCB) derived from Butanedioyl diisothiocyanate with 2-aminobenz imidazole was used to prepare a chain of new metal complexes of Cr(III), Mn(II), Co(II), Ni(II), Cu(II), Pd(II), Ag(I), Cd(II) by general formula [M(NCB)]Xn ,Where M= Cr(III), n=3, X=Cl; Mn(II), Co(II), Ni(II), Cu(II), Pd(II), Cd(II) ,n=2 , X=Cl; Ag(I), n=1, X=NO3. Characterized compounds on the basis of 1H, 13CNMR (for (NCB), FT-IR and U.V spectrum, melting point, molar conduct, %C, %H, %N and %S, the percentage of the metal in complexes %M, Magnetic susceptibility, thermal studies (TGA),while its corrosion inhibition for mild steel in Ca(OH)2 solution is studied by weight loss. These measureme
... Show MoreA New ligand, N-(2-oxo-1,2- Dihydropyrimidin-4- ylcarbamothioyl) Acetamide (DPA) was prepared by reaction of iso thiosyanate derivative with Cytosine. The ligand has been characterized through elemental analysis, H1 NMR, C13NMR, FT-IR, and UV Visible spectra, such ligand’s transition metal complexes have been characterized through conductivity measurement, FT-IR, UV Visible spectra and magnetic susceptibility, all the complexes of this ligand are solid crystal and molar ratio (2:1) (ligand: metal). The form of molecular for these complexes octa hedral. The general formula [M(DPA)2Cl2], where M+2 = (Mn, Co, Ni, Cu, Zn, Cd, Hg).
Density functional theory (DFT) with B3LYP level and 6-311G[Formula: see text] basis sets for light atoms like N and O and SDD basis sets for heavy atoms like Sn is used to examine the interaction of tin dioxide nanocrystals with nitrogen dioxide as a function of temperature from 273[Formula: see text]K to 373[Formula: see text]K through a Gaussian 09W software program. Gibbs free energy, enthalpy, and entropy of activation and reaction are calculated. The situation of transition of SnO2 clusters toward nitrogen dioxide is investigated. According to the findings, the activation energy of SnO2 clusters with nitrogen dioxide increases as the temperature rises (in negative value). Gauss view 0
... Show More