Intrusion detection system is an imperative role in increasing security and decreasing the harm of the computer security system and information system when using of network. It observes different events in a network or system to decide occurring an intrusion or not and it is used to make strategic decision, security purposes and analyzing directions. This paper describes host based intrusion detection system architecture for DDoS attack, which intelligently detects the intrusion periodically and dynamically by evaluating the intruder group respective to the present node with its neighbors. We analyze a dependable dataset named CICIDS 2017 that contains benign and DDoS attack network flows, which meets certifiable criteria and is openly accessible. It evaluates the performance of a complete arrangement of machine learning algorithms and network traffic features to indicate the best features for detecting the assured attack classes. Our goal is storing the address of destination IP that is utilized to detect an intruder by method of misuse detection.
Traditional accounting takes only one dimension (economic) in calculating the value added of the company, and all other aspects (including environmental and social) are neglected, and despite the emergence of Sustainability Accounting and the interest of companies in preparing sustainability reports, these reports are suffering from many problems, including multiple metrics used in measuring companies (cash, quantity and lavish). In addition, these reports may reach dozens of pages in some companies and this causes the problem (information overload) which affects the qualitative properties of accounting information such as appropriate and relative, which requires the need to find a tool that can measure the Sustainability Unit of
... Show MoreThe educational process depends on the means of conveying information from the teacher to the learner. Whenever appropriate, this means the learning process takes place better, faster, and with less effort, and the problem of research lies. The players lack learning in the meta-knowledge curriculum in basketball offensive skills than offensive skills. The aim of the research is to identify the effect of training exercises for educational numbers based on metacognitive skills in teaching some offensive skills with basketball. As for the research assignment, there are statistically significant differences between the results of the pre and post tests for the experimental group and in favor of the post tests. The experimental approach was used
... Show MoreAs an important resource, entanglement light source has been used in developing quantum information technologies, such as quantum key distribution(QKD). There are few experiments implementing entanglement-based deterministic QKD protocols since the security of existing protocols may be compromised in lossy channels. In this work, we report on a loss-tolerant deterministic QKD experiment which follows a modified “Ping-Pong”(PP) protocol. The experiment results demonstrate for the first time that a secure deterministic QKD session can be fulfilled in a channel with an optical loss of 9 dB, based on a telecom-band entangled photon source. This exhibits a conceivable prospect of ultilizing entanglement light source in real-life fiber-based
... Show MoreIn this article, Convolution Neural Network (CNN) is used to detect damage and no damage images form satellite imagery using different classifiers. These classifiers are well-known models that are used with CNN to detect and classify images using a specific dataset. The dataset used belongs to the Huston hurricane that caused several damages in the nearby areas. In addition, a transfer learning property is used to store the knowledge (weights) and reuse it in the next task. Moreover, each applied classifier is used to detect the images from the dataset after it is split into training, testing and validation. Keras library is used to apply the CNN algorithm with each selected classifier to detect the images. Furthermore, the performa
... Show MoreIntroduction The Hybrid Gamma Camera (HGC) is being developed to enhance the localisation of radiopharmaceutical uptake in targeted tissues during surgical procedures such as sentinel lymph node (SLN) biopsy. Purpose To assess the capability of the HGC, a lymph-node-contrast (LNC) phantom was constructed for an evaluative study simulating medical scenarios of varying radioactivity concentration and SLN size. Materials and methods The phantom was constructed using two methyl methacrylate PMMA plates (8 mm thick). The SLNs were simulated by drilling circular wells of diameters ranging between 10 mm and 2.5 mm (16 wells in total) in one plate. These simulated SLNs were placed underneath scattering material with thicknesses ranging between 5 mm
... Show MoreA new, simple and sensitive method was used forevaluation of propranolol withphosphotungstic acidto prove the efficiency, reliability and repeatability of the long distance chasing photometer (NAG-ADF-300-2) using continuous flow injection analysis. The method is based on reaction between propranolol and phosphotungstic acid in an aqueous medium to obtain a yellow precipitate. Optimum parameters was studied to increase the sensitivity for developed method. A linear range for calibration graph was 0.007-13 mmol/L for cell A and 5-15 mmol/L for cell B, and LOD 207.4792 ng/160 µL and 1.2449 µg/160 µL respectively to cell A and cell B with correlation coefficient (r) 0.9988 for cell A, 0.9996 for cell B, RSD% was lower than 1%, (n=8) for the
... Show MoreRenal transplantation is a principal treatment option for end-stage kidney failure. Bone loss and fracture are serious complication of kidney transplantation, associated with morbidity and mortality. The pathogenesis of post transplantation bone loss is multifactorial and complex