The major of DDoS attacks use TCP protocol and the TCP SYN flooding attack is the most common one among them. The SYN Cookie mechanism is used to defend against the TCP SYN flooding attack. It is an effective defense, but it has a disadvantage of high calculations and it doesn’t differentiate spoofed packets from legitimate packets. Therefore, filtering the spoofed packet can effectively enhance the SYN Cookie activity. Hop Count Filtering (HCF) is another mechanism used at the server side to filter spoofed packets. This mechanism has a drawback of being not a perfect and final solution in defending against the TCP SYN flooding attack. An enhanced mechanism of Integrating and combining the SYN Cookie with Hop Count Filtering (HCF) mechanism is proposed to protect the server from TCP SYN flooding. The results show that the defense against SYN flood DDoS attack is enhanced, since the availability of legitimate packets is increased and the time of SYN Cookie activity is delayed.
Pavement crack and pothole identification are important tasks in transportation maintenance and road safety. This study offers a novel technique for automatic asphalt pavement crack and pothole detection which is based on image processing. Different types of cracks (transverse, longitudinal, alligator-type, and potholes) can be identified with such techniques. The goal of this research is to evaluate road surface damage by extracting cracks and potholes, categorizing them from images and videos, and comparing the manual and the automated methods. The proposed method was tested on 50 images. The results obtained from image processing showed that the proposed method can detect cracks and potholes and identify their severity levels wit
... Show MorePlagiarism is becoming more of a problem in academics. It’s made worse by the ease with which a wide range of resources can be found on the internet, as well as the ease with which they can be copied and pasted. It is academic theft since the perpetrator has ”taken” and presented the work of others as his or her own. Manual detection of plagiarism by a human being is difficult, imprecise, and time-consuming because it is difficult for anyone to compare their work to current data. Plagiarism is a big problem in higher education, and it can happen on any topic. Plagiarism detection has been studied in many scientific articles, and methods for recognition have been created utilizing the Plagiarism analysis, Authorship identification, and
... Show MoreThe rapid rise in the use of artificially generated faces has significantly increased the risk of identity theft in biometric authentication systems. Modern facial recognition technologies are now vulnerable to sophisticated attacks using printed images, replayed videos, and highly realistic 3D masks. This creates an urgent need for advanced, reliable, and mobile-compatible fake face detection systems. Research indicates that while deep learning models have demonstrated strong performance in detecting artificially generated faces, deploying these models on consumer mobile devices remains challenging due to limitations in computing power, memory, privacy, and processing speed. This paper highlights several key challenges: (1) optimiz
... Show MoreHM Al-Dabbas, RA Azeez, AE Ali, Iraqi Journal of Science, 2023
For several applications, it is very important to have an edge detection technique matching human visual contour perception and less sensitive to noise. The edge detection algorithm describes in this paper based on the results obtained by Maximum a posteriori (MAP) and Maximum Entropy (ME) deblurring algorithms. The technique makes a trade-off between sharpening and smoothing the noisy image. One of the advantages of the described algorithm is less sensitive to noise than that given by Marr and Geuen techniques that considered to be the best edge detection algorithms in terms of matching human visual contour perception.
Individuals across different industries, including but not limited to agriculture, drones, pharmaceuticals and manufacturing, are increasingly using thermal cameras to achieve various safety and security goals. This widespread adoption is made possible by advancements in thermal imaging sensor technology. The current literature provides an in-depth exploration of thermography camera applications for detecting faults in sectors such as fire protection, manufacturing, aerospace, automotive, non-destructive testing and structural material industries. The current discussion builds on previous studies, emphasising the effectiveness of thermography cameras in distinguishing undetectable defects by the human eye. Various methods for defect
... Show MoreObjective Using two complementary techniques of virus detection human papillomavirus (HPV)[capture of hybrids (CH) and polymerase chain reaction (PCR)], relate the cytological study and/or cervical biopsy with high-risk HPV (HPV-HR) genotypes presence, as well as relating their viral load (VL). Methods About 272 women, who presented most cell alterations compatible with lesions cervical HPV, which has been detected in all high risk by the CH method and HPV genotype detection by PCR. Results In 22% of the patients it was not detected HPV DNA. Genotype 16 and/or 18 was prevalent and was found in 33% of the 212 women studied, meanwhile, mixed infections were found by several genotypes in 25%. In as for the histological lesions found, in 61 pat
... Show More