Intrusion detection system is an imperative role in increasing security and decreasing the harm of the computer security system and information system when using of network. It observes different events in a network or system to decide occurring an intrusion or not and it is used to make strategic decision, security purposes and analyzing directions. This paper describes host based intrusion detection system architecture for DDoS attack, which intelligently detects the intrusion periodically and dynamically by evaluating the intruder group respective to the present node with its neighbors. We analyze a dependable dataset named CICIDS 2017 that contains benign and DDoS attack network flows, which meets certifiable criteria and is openly accessible. It evaluates the performance of a complete arrangement of machine learning algorithms and network traffic features to indicate the best features for detecting the assured attack classes. Our goal is storing the address of destination IP that is utilized to detect an intruder by method of misuse detection.
In This paper, CuO thin films having different thickness (250, 300 , 350 and 400) nm were deposited on glass substrates by thermal vacuum evaporator. The thermal oxidation of this evaporated film was done in heated glass at temperature (300 in air at one hour. The study of X-ray diffraction investigated all the exhibit polycrystalline nature with monoclinic crystal structure include uniformly grains. Thin film’s internal structure topographical and optical properties. Furthermore, the crystallization directions of CuO (35.54 , 38.70 ) can be clearly observed through an X-ray diffraction analysis XRD, Atomic Force Microscope AFM (topographic image) showed that the surface Characteristics , thin films crystals grew with increases in either
... Show MoreSpatial data analysis is performed in order to remove the skewness, a measure of the asymmetry of the probablitiy distribution. It also improve the normality, a key concept of statistics from the concept of normal distribution “bell shape”, of the properties like improving the normality porosity, permeability and saturation which can be are visualized by using histograms. Three steps of spatial analysis are involved here; exploratory data analysis, variogram analysis and finally distributing the properties by using geostatistical algorithms for the properties. Mishrif Formation (unit MB1) in Nasiriya Oil Field was chosen to analyze and model the data for the first eight wells. The field is an anticline structure with northwest- south
... Show MoreBackground: Self-medication is a practice or action taken by individuals for themselves in order to achieve and maintain health, as well as to avoid and protect against disease. The aim of this study is to evaluate the knowledge, attitudes, and practice of self-medication among medical students at Sudan International University.
Subjects & Methods: This was a prospective study that involved 288 out of 1000 students in the Faculty of Medicine at Sudan International University. Data were collected using a self-administered questionnaire from January to March 2022 to evaluate the self-medication knowledge, attitude, and practice among first, second, and third-ye
... Show MoreSol-gel derived CuCo-oxide coatings as solar selective surfaces, synthesized onto aluminium substrates at various annealing temperatures, are analysed by correlating their structural, chemical bonding states, and surface morphological topographies. As the annealing progressed, all the coatings displayed a Cu0.56Co2.44O4 (ICSD 78-2175) phase with preferential orientation along (400) reflection plane. Rietveld refinement of X-ray diffraction (XRD) data indicate that residual stress and microstrains developed around the coating surfaces are reduced resulting in mechanically stable thin films. Enhancement of the crystallite size and preferred orientation of the surface were confirmed via XRD, field emission scanning electron microscopy (FESEM),
... Show MoreIn this work, an explicit formula for a class of Bi-Bazilevic univalent functions involving differential operator is given, as well as the determination of upper bounds for the general Taylor-Maclaurin coefficient of a functions belong to this class, are established Faber polynomials are used as a coordinated system to study the geometry of the manifold of coefficients for these functions. Also determining bounds for the first two coefficients of such functions.
In certain cases, our initial estimates improve some of the coefficient bounds and link them to earlier thoughtful results that are published earlier.
This research analyzes the level of the short circuit effect of the Iraqi super network and decides the suitable location for the High Voltage Direct Current (HVDC) connections in order to obtain the best short circuit reduction of the total currents of the buses in the network. The proposed method depends on choosing the transmission lines for Alternating current (AC) system that suffers from high Short Circuit Levels (SCLs) in order to reduce its impact on the transmission system and on the lines adjacent to it and this after replacing the alternating current (AC) line by direct current (DC) line. In this paper, Power System Simulator for Engineering (PSS/E) is used to model two types of HVDC lines in an effective regi
... Show MoreThe current research aims to identify the level of compulsive buying behavior and Histrionic Personality among a sample of primary school teachers for the academic year (2021-2022) and in the light of some variables
(sex, marital status). To measure the Histrionic Personality, the researcher applied two scales to a random stratified sample of (200) male and female teachers. The results showed statistically significant differences in the level of compulsive buying behavior according to the gender variable and in favor of female teachers. There are no statistically significant differences in terms of marital status. There are statistically significant differences in the Histrionic Personality based on gender variables in favor of f
... Show MoreThe problem of this study lies in that NATO was formed in the first place to protect Europe from Warsaw Pact. The geographical and military strategy have been changed with the change of its mission and expanding its operation scope with the leadership of the USA in the international scens. The latter has made this organization as the military arm to tighten its control over strategic regions.
The research supposes that NATO state members confront security concerns and political and military issues that push to expand the organization. The importance of this study lies in knowing the new roles of NATO imposed by the United States. Therefore, the continuity and affi
... Show More