<span>Distributed denial-of-service (DDoS) attack is bluster to network security that purpose at exhausted the networks with malicious traffic. Although several techniques have been designed for DDoS attack detection, intrusion detection system (IDS) It has a great role in protecting the network system and has the ability to collect and analyze data from various network sources to discover any unauthorized access. The goal of IDS is to detect malicious traffic and defend the system against any fraudulent activity or illegal traffic. Therefore, IDS monitors outgoing and incoming network traffic. This paper contains a based intrusion detection system for DDoS attack, and has the ability to detect the attack intelligently, dynamically and periodically by evaluating the set of attackers of the current node with its neighbors. We use dataset named CICDDoS2019 that contains on binary classes benign and DDoS. Performance has evaluated by applying data mining algorithms as well as applying the best features to discover potential attack classes.</span>
The development in the presentation and presentation of the service in order to distinguish them from the same, was one of the most important reasons to choose the current issue to upgrade the level of service, especially in the Iraqi restaurant sector, which has become today of the important sectors successful. The problem of research was to try to answer a range of questions: to what extent are Iraqi restaurants interested in physical service factors? Do Iraqi restaurants apply physical factors in a way that leads to customer satisfaction? Are Iraqi restaurants interested in the satisfaction of their customers? The objective of the current research is to try to determine the extent to which the
... Show MoreThe security of message information has drawn more attention nowadays, so; cryptography has been used extensively. This research aims to generate secured cipher keys from retina information to increase the level of security. The proposed technique utilizes cryptography based on retina information. The main contribution is the original procedure used to generate three types of keys in one system from the retina vessel's end position and improve the technique of three systems, each with one key. The distances between the center of the diagonals of the retina image and the retina vessel's end (diagonal center-end (DCE)) represent the first key. The distances between the center of the radius of the retina and the retina vessel's end (ra
... Show Moret:
The most famous thing a person does is talk. He loves and hates, and continues with it confirming relationships, and with it, too, comes out of disbelief into faith. Marry a word and separate with a word. He reaches the top of the heavens with a kind word, with which he will gain the pleasure of God, and the Lord of a word that the servant speaks to which God writes with our pleasure or throws him on his face in the fire. Emotions are inflamed, the United Nations is intensified with a word, and relations between states and war continue with a word.
What comes out of a person’s mouth is a translator that expresses the repository of his conscience and reveals the place of his bed, for it is evidence of
... Show MoreThere is a relationship between the sizes of urban centers and regional
development, concerning the role that these centers are playing in
developmental process.
The research assume that the urban system in the governorate, has
been affected by the external environment due to the religious dominance of
Kerbla city.
The research is composed of three sections, the first is a theoretical
background, which focus upon the general directions of the models and
theories that have a relationship with the subject. The second is a practical
part aims at determination the characteristics of the sizes of the cities in the
governorate. Depending upon of previous part, i.e., the practical part section three deals with
Among many problems that reduced the performance of the network, especially Wide Area Network, congestion is one of these, which is caused when traffic request reaches or exceeds the available capacity of a route, resulting in blocking and less throughput per unit time. Congestion management attributes try to manage such cases. The work presented in this paper deals with an important issue that is the Quality of Service (QoS) techniques. QoS is the combination effect on service level, which locates the user's degree of contentment of the service. In this paper, packet schedulers (FIFO, WFQ, CQ and PQ) were implemented and evaluated under different applications with different priorities. The results show that WFQ scheduler gives acceptable r
... Show MoreAs a consequence of a terrorist attack, people may experience posttraumatic stress disorder (PTSD) and lack of feeling secure in relationships. This longitudinal study aimed to examine the prevalence of PTSD symptoms over time, the relationship between adult attachment styles and PTSD, as well as their association with degree of exposure, and finally to consider the distribution and the trajectory of attachment styles. The sample consisted of 235 students (M=125, F=110) who were exposed to different levels of trauma intensity in response to a bombing attack. Participants were recruited and assessed approximately 1 month and 5 months after the attack using a battery of questionnaires. Findings revealed, as expected, that 79.5% of the part
... Show MoreThis work concentrates on the effect of a flex-skin trailing edge flap on the aerodynamic characteristics of SD7037 airfoil at low Reynolds numbers, in the range of 2^10 to 5^10 using computational methods. The study used a range of angle of attack (AOA) associated with the take-off phase and different flap angles. The numerical model was set up in Siemens STAR-CCM+ package using the κ-ω shear stress transport turbulence model and the (γ-Reθ) transition model which ensured the approximate solution of Navier-Stokes equations. The verification of the computational solution was done by the comparison with the available experimental data of the plain flap, and it was discovered that the results matched pretty well at lower AoAs. Results in
... Show MoreBackground: Polymeric composites have been widely used as dental restorative materials. A fundamental knowledge and understanding of the behavior of these materials in the oral cavity is essential to improve their properties and performance. The goal of this study was to measure water sorption of four composite resins containing different filler and resin matrix contents. Materials and method: Resin composite specimens giomer (Beautifil II) Filtek™ P90, Filtek™ Z350 XT, and Tetric N Ceram were prepared in a cylindrical mould of 3mm thickness and 6mm diameter (n=10) and light cured . All specimens placed in silica-gel desiccators at 37˚C for seven days, a constant weight was obtained. All samples were immersed in deionized distill
... Show MoreThe first aim of this paper was to evaluate the push-out bond strength of the gutta-percha coating of Thermafil and GuttaCore and compare it with that of gutta-percha used to coat an experimental hydroxyapatite/polyethylene (HA/PE) obturator. The second aim was to assess the thickness of gutta-percha around the carriers of GuttaCore and HA/PE obturators using microcomputed tomography (