<span>Distributed denial-of-service (DDoS) attack is bluster to network security that purpose at exhausted the networks with malicious traffic. Although several techniques have been designed for DDoS attack detection, intrusion detection system (IDS) It has a great role in protecting the network system and has the ability to collect and analyze data from various network sources to discover any unauthorized access. The goal of IDS is to detect malicious traffic and defend the system against any fraudulent activity or illegal traffic. Therefore, IDS monitors outgoing and incoming network traffic. This paper contains a based intrusion detection system for DDoS attack, and has the ability to detect the attack intelligently, dynamically and periodically by evaluating the set of attackers of the current node with its neighbors. We use dataset named CICDDoS2019 that contains on binary classes benign and DDoS. Performance has evaluated by applying data mining algorithms as well as applying the best features to discover potential attack classes.</span>
Constitute a planning problem on the basis of personal experience and self-governance in the service organizations away from quantitative scientific method in planning an anchor and a platform, who made a recent research study, analysis and interpretation through scientific methodology adopted which formed its contents, The research aims to identify the true reality of production planning in service organizations, specifically in the Baghdad Hotel as a society to look, in order to assess the best strategy through the standard cost of the strategies of tracking and settlement to cope with developments on services demand changes, Search results confirmed that the settlement rates of production strategy is the best strategy in accordance wi
... Show MoreAO Dr. Ali Jihad, Journal of Physical Education, 2021
Abstract
Through social service tasks for the elderly, it natural for elder people to have some attitudes about the quality and nature of provided services, whether negative or positive. Accordingly, the current research is an attempt to investigate the attitudes of the elderly toward the social service provided to them in the nursery homes. The research sample included 60 elderly people chosen from the nursey home at Al-Karrada district and then a scale of attitudes was administered to them that had proved its reliability and validity. The study concluded with a set of recommendations and suggestions were.
This study included the isolation and identification of Aspergillus flavus isolates associated with imported American rice grains and local corn grains which collected from local markets, using UV light with 365 nm wave length and different media (PDA, YEA, COA, and CDA ). One hundred and seven fungal isolates were identified in rice and 147 isolates in corn.4 genera and 7 species were associated with grains, the genera were Aspergillus ,Fusarium ,Neurospora ,Penicillium . Aspergillus was dominant with occurrence of 0.47% and frequency of 11.75% in rice grains whereas in corn grains the genus Neurospora was dominant with occurrence of 1.09% and frequency 27.25% ,results revealed that 20 isolates out of 50 A. flavus isolates were able
... Show MoreTwo molecular imprinted polymer (MIP) membranes for Levofloxacin (LEV) were prepared based on PVC matrix. The imprinted polymers were prepared by polymerization of styrene (STY) as monomer, N,N methylene di acrylamide as a cross linker ,benzoyl peroxide (BPO) as an initiator and levofloxacin as a template. Di methyl adepate (DMA) and acetophenone (AOPH) were used as plasticizers , the molecular imprinted membranes and the non molecular imprinted membranes were prepared. The slopes and detection limits of the liquid electrodes ranged from -21.96 – -19.38 mV/decade and 2×10-4M- 4×10-4M, and Its response time was around 1 minute, respectively. The liquid electrodes were packed with 0.1 M standar
... Show MoreThe Internet is providing vital communications between millions of individuals. It is also more and more utilized as one of the commerce tools; thus, security is of high importance for securing communications and protecting vital information. Cryptography algorithms are essential in the field of security. Brute force attacks are the major Data Encryption Standard attacks. This is the main reason that warranted the need to use the improved structure of the Data Encryption Standard algorithm. This paper proposes a new, improved structure for Data Encryption Standard to make it secure and immune to attacks. The improved structure of Data Encryption Standard was accomplished using standard Data Encryption Standard with a new way of two key gene
... Show MoreThe conservatorship is a legal action to protect troubled banks from credit risk and bankruptcy risk that banks cannot hedge them .The Central Bank role has to protect the financial system from these risks by controlling and supervising. This research studied these risks and explained the role of The Central Bank. This research presented and analyzed the legal framework for supervision and the imposition of conservatorship bank to address the effects that have been achieved as a result of poor management and weak internal controls. Baraka Bank for Investment and Finance was a research sample to measure the financial ratios for the troubled bank, and analysis the results that led to put the conservatorship. The research depends on the hyp
... Show More