The major of DDoS attacks use TCP protocol and the TCP SYN flooding attack is the most common one among them. The SYN Cookie mechanism is used to defend against the TCP SYN flooding attack. It is an effective defense, but it has a disadvantage of high calculations and it doesn’t differentiate spoofed packets from legitimate packets. Therefore, filtering the spoofed packet can effectively enhance the SYN Cookie activity. Hop Count Filtering (HCF) is another mechanism used at the server side to filter spoofed packets. This mechanism has a drawback of being not a perfect and final solution in defending against the TCP SYN flooding attack. An enhanced mechanism of Integrating and combining the SYN Cookie with Hop Count Filtering (HCF) mechanism is proposed to protect the server from TCP SYN flooding. The results show that the defense against SYN flood DDoS attack is enhanced, since the availability of legitimate packets is increased and the time of SYN Cookie activity is delayed.
Intrusion detection systems detect attacks inside computers and networks, where the detection of the attacks must be in fast time and high rate. Various methods proposed achieved high detection rate, this was done either by improving the algorithm or hybridizing with another algorithm. However, they are suffering from the time, especially after the improvement of the algorithm and dealing with large traffic data. On the other hand, past researches have been successfully applied to the DNA sequences detection approaches for intrusion detection system; the achieved detection rate results were very low, on other hand, the processing time was fast. Also, feature selection used to reduce the computation and complexity lead to speed up the system
... Show MoreShadow removal is crucial for robot and machine vision as the accuracy of object detection is greatly influenced by the uncertainty and ambiguity of the visual scene. In this paper, we introduce a new algorithm for shadow detection and removal based on different shapes, orientations, and spatial extents of Gaussian equations. Here, the contrast information of the visual scene is utilized for shadow detection and removal through five consecutive processing stages. In the first stage, contrast filtering is performed to obtain the contrast information of the image. The second stage involves a normalization process that suppresses noise and generates a balanced intensity at a specific position compared to the neighboring intensit
... Show MoreThis study successfully synthesized high-performance photodetectors based on Ag-WO3 core–shell heterostructures using a simple and economical two-step pulsed laser ablation in water method and has investigated the electrical characteristics of the Ag@WO3 nanocomposite heterojunction. The Hall effect tests indicate that the synthesized Ag@WO3 exhibits n-type conduction with a Hall mobility of 1.25 × 103 cm2V-1S-1. Dark current–voltage properties indicated that the created heterojunctions displayed rectification capabilities, with the highest rectification factor of around 1.71 seen at a 5 V bias. A photodetector’s responsivity reveals the existence of two response peaks, which are situated in the ultraviolet and visible region. The ph
... Show MoreRegarding to the computer system security, the intrusion detection systems are fundamental components for discriminating attacks at the early stage. They monitor and analyze network traffics, looking for abnormal behaviors or attack signatures to detect intrusions in early time. However, many challenges arise while developing flexible and efficient network intrusion detection system (NIDS) for unforeseen attacks with high detection rate. In this paper, deep neural network (DNN) approach was proposed for anomaly detection NIDS. Dropout is the regularized technique used with DNN model to reduce the overfitting. The experimental results applied on NSL_KDD dataset. SoftMax output layer has been used with cross entropy loss funct
... Show MoreEpithelial ovarian cancer is the leading cause of cancer deaths in women. To date, an effective screening tool for ovarian cancer has not been identified Several clinical and biological factors including serum cancer antigen 125 (CA- 125) have been assessed for prognostic and predictive relevance CA-125 is an epithelial marker derived from coelomic epithelium. It is elevated in 90% of advanced ovarian cancers and in 50% of early ovarian cancers while 20% of ovarian cancers have low or no expression of CA- 125 CA-125 concentrations were measured by Mini Vidas test (VIDAS CA125 II / BIOMERIEUX / France). The median CA-125 levels were significantly higher in the sera of ovarian cancer patients than in those with benign tumors an
... Show MoreTo determine the important pathogenic role of celiac disease in triggering several autoimmune disease, thirty patients with Multiple Sclerosis of ages (22-55) years have been investigated and compared with 25 healthy individuals. All the studied groups were carried out to measure anti-tissue transglutaminase antibodies IgA IgG by ELISA test, anti-reticulin antibodies IgA and IgG, and anti-endomysial antibodies IgA and IgG by IFAT. There was a significant elevation in the concentration of anti-tissue transglutaminase antibodies IgA and IgG compared to control groups (P≤0.05), there was 4(13.33%) positive results for anti-reticulin antibodies IgA and IgG , 3(10%) positive results for anti-endomysial antibodies IgA and IgG . There were 4 pos
... Show MoreBackground: Beta thalassemia major (β-TM) is an inheritable condition with many complications, especially in children. The blood-borne viral infection was proposed as a risk factor due to the recurrent blood transfusion regimen (hemotherapy) as human parvovirus B19 (B19V). Objective: This study investigated the B19V seroprevalence, DNA presence, B19V viral load, and B19V genotypes in β-TM patients and blood donors. Methods: This is a cross-sectional study incorporating 180 subjects, segregated into three distinct groups each of 60 patients, namely control, β-TM, and β-TM infected with Hepatitis C Virus (HCV). For the B19V prevalence in the studied group, the ELISA technique and real-time PCR were used. The genotyping was follo
... Show More