Intrusion detection system is an imperative role in increasing security and decreasing the harm of the computer security system and information system when using of network. It observes different events in a network or system to decide occurring an intrusion or not and it is used to make strategic decision, security purposes and analyzing directions. This paper describes host based intrusion detection system architecture for DDoS attack, which intelligently detects the intrusion periodically and dynamically by evaluating the intruder group respective to the present node with its neighbors. We analyze a dependable dataset named CICIDS 2017 that contains benign and DDoS attack network flows, which meets certifiable criteria and is openly accessible. It evaluates the performance of a complete arrangement of machine learning algorithms and network traffic features to indicate the best features for detecting the assured attack classes. Our goal is storing the address of destination IP that is utilized to detect an intruder by method of misuse detection.
The construction project is a very complicated work by its nature and requires specialized knowledge to lead it to success. The construction project is complicated socially, technically and economically in its planning, management and implementation aspects due to the fact that it has many variables and multiple stakeholders in addition to being affected by the surrounding environment. Successful projects depend on three fundamental points which are cost-time, performance and specifications. The project stakeholder's objective to achieve best specifications and the cost-time frame stipulated in the contract.
The question is, was the optimum implementation accomplished? The provision for the success of the project
... Show MorePurpose: This study aimed to assess the thickness of alveolar bone of maxillary and mandibular incisors from orthodontics perspective. Materials and Method: A total of 73 Cone beam computed tomography for Iraqi patients (47 females and 26 males) were included in this study. The selected images were captured and imported to AutoCAD database software to perform the measurement. To measure alveolar bone thickness, a reference line was drawn through the long axis of each incisor, from the incisal edge to the root apex. Then, labial and lingual/palatal perpendicular lines were drawn to the reference line at 3, 6, and 9mm apically from the cemento-enamel junction (CEJ). Results: The buccal bone is generally thinner than the lingual/palata
... Show MoreAugust Wilson’s major concern is to communicate the African American cultural awareness; to establish a counter-culture based on self-confidence and assertiveness. He advocates an encouraging attitude to elevate the African Americans’ spiritual consciousness and to teach them how to sublimate their aims in life. He aspires to win the everlasting battle against racial discrimination, oppression, injustice, and identity confusion. Sublimation, as a defense mechanism, will be Wilson’s new ammunition to re-read and to re-interpret the psychic constitution of his people, to help them get out of their self-imposed fences and this is the core of Wilson’s new culture. Sublimation is the process in which the psyche directs the negative drive
... Show MoreAbstract The present work included morphological, anatomical, and palynological characters for the new species Acaalypha australis L. specimens, which belong to the family Euphorbiaceae. The species recorded in the study for the first time in Iraq. The plants of this species are annual herbs with green, striated or sub – polygonal stem, and branched near bases, Leaves are simple spirally alternate and lanceolate in shape. Flowers are unisexual, arranged in the axial of distinct leafy and cordate bracts, female flower arranged at the bracts bases and each flower with trileafed perianth and superior ovary with trilobed stylar stigma which has dense and coiled stigmatic hairs. Male flowers are arranged as a mixed verticellate inflorescence a
... Show MoreIn this paper investigate the influences of dissolved CO2/H2S gases, crude oil velocity and temperature on the rate of corrosion of crude oil transmission pipelines of Maysan oil fields southern Iraq. The Potentiostatic corrosion test technique was conducted into two types of carbon steel pipeline (materials API 5L X60 and API 5L X80). The computer software ECE electronic corrosion engineer was used to predict the influences of CO2 partial pressure, the composition of crude oil, flow velocity of crude oil and percentage of material elements of carbon steel on the rate of corrosion. As a result, the carbon steel API 5L X80 indicates good and appropriate resistance to corrosion compared to carbon steel API
... Show MoreA group of amino derivatives [4-aminobenzenesulfonamide,4-amino-N¹ methylbenzenesulfonamide, or N¹-(4-aminophenylsulfonyl)acetamide] bound to carboxyl group of mefenamic acid a well known nonsteroidal anti-inflammatory drugs (NSAIDs) were designed and synthesized for evaluation as a potential anti-inflammatory agent. In vivo acute anti-inflammatory activity of the final compounds (9, 10 and 11) was evaluated in rat using egg-white induced edema model of inflammation in a dose equivalent to (7.5mg/Kg) of mefenamic acid. All tested compounds produced a significant reduction in paw edema with respect to the effect of propylene glycol 50% v/v (control group). Moreover, the 4-amino-N-methylbenzenesulfonamide derivative (c
... Show MoreThe petroleum industry, which is one of the pillars of the national economy, has the potential to generate vast wealth and employment possibilities. The transportation of petroleum products is complicated and changeable because of the hazards caused by the corrosion consequences. Hazardous chemical leaks caused by natural disasters may harm the environment, resulting in significant economic losses. It significantly threatens the aim for sustainable development. When a result, determining the likelihood of leakage and the potential for environmental harm, it becomes a top priority for decision-makers as they develop maintenance plans. This study aims to provide an in-depth understanding of the risks associated with oil and gas pipeli
... Show MoreNon uniform channelization is a crucial task in cognitive radio receivers for obtaining separate channels from the digitized wideband input signal at different intervals of time. The two main requirements in the channelizer are reconfigurability and low complexity. In this paper, a reconfigurable architecture based on a combination of Improved Coefficient Decimation Method (ICDM) and Coefficient Interpolation Method (CIM) is proposed. The proposed Hybrid Coefficient Decimation-Interpolation Method (HCDIM) based filter bank (FB) is able to realize the same number of channels realized using (ICDM) but with a maximum decimation factor divided by the interpolation factor (L), which leads to less deterioration in stop band at
... Show MoreIn this paper a new method is proposed to perform the N-Radon orthogonal frequency division multiplexing (OFDM), which are equivalent to 4-quadrature amplitude modulation (QAM), 16-QAM, 64-QAM, 256-QAM, ... etc. in spectral efficiency. This non conventional method is proposed in order to reduce the constellation energy and increase spectral efficiency. The proposed method gives a significant improvement in Bit Error Rate performance, and keeps bandwidth efficiency and spectrum shape as good as conventional Fast Fourier Transform based OFDM. The new structure was tested and compared with conventional OFDM for Additive White Gaussian Noise, flat, and multi-path selective fading channels. Simulation tests were generated for different channels
... Show More