Intrusion detection system is an imperative role in increasing security and decreasing the harm of the computer security system and information system when using of network. It observes different events in a network or system to decide occurring an intrusion or not and it is used to make strategic decision, security purposes and analyzing directions. This paper describes host based intrusion detection system architecture for DDoS attack, which intelligently detects the intrusion periodically and dynamically by evaluating the intruder group respective to the present node with its neighbors. We analyze a dependable dataset named CICIDS 2017 that contains benign and DDoS attack network flows, which meets certifiable criteria and is openly accessible. It evaluates the performance of a complete arrangement of machine learning algorithms and network traffic features to indicate the best features for detecting the assured attack classes. Our goal is storing the address of destination IP that is utilized to detect an intruder by method of misuse detection.
Brainstorming has been a common approach in many industries where the result is not always accurate, especially when procuring automobile spare parts. This approach was replaced with a scientific and optimized method that is highly reliable, hence the decision to optimize the inventory inflation budget based on spare parts and miscellaneous costs of the typical automobile industry. Some factors required to achieve this goal were investigated. Through this investigation, spare parts (consumables and non-consumables) were found to be mostly used in Innoson Vehicle Manufacturing (IVM), Nigeria but incorporated miscellaneous costs to augment the cost of spare parts. The inflation rate was considered first due to the market's
... Show MoreA survey of haemoproteids among the eight species of Iraq rallids were carried out in the
middle, south, and west of Iraq. Two haemoproteods were recorded, Haeomproteus porzanae
(Galli-Valerio, 1907) as a new record for Iraq and the new species H. baghdadensis described
from Fulica atra L. collected in the middle of Iraq.
New ligands, N1, N4-bis (benzo[d]thiazol-2- ylcarbamothioyl) succinamide (L1) and N1, N4- bis (benzylcarbamothioyl)succinamide (L2), derived from succinyl chloride and 2-amino benzothiazole or benzylamine, respectively, have been used to prepare a set of transition metal complexes with the general formula [M2(L)Cl4], where L=L1 or L2, M = Mn(II), Ni(II), Cu(II), Cd(II), Co(II), Zn(II) or Hg(II). The synthesized compounds were characterized using various analytical techniques including TGA, 13C NMR, mass spectroscopy, 1H and Fourier-transform infrared (FTIR) spectroscopy, magnetic measurement, molar conductivity, electronic spectrum, (%M, %C, %H, %N) and atomic absorption flame (AAF) analysis. The results showed that (L1, L2) bin
... Show MoreObjective: Benzoxazole derivatives have antifungal, anticancer, antibacterial, and anticonvulsant function. Encouraged by this comment, we agreed to synthesize new Benzoxazole compounds connected to the bases of Schiff's. Methods: 2,4-diaminophenol (1) was prepared by the reaction of 2,4-dinitrophenol and sodium dithionate. Compound (1) reacted with either acetic acid to afford compound (2) or with formic acid to afford compound (3). The Schiff bases were preparation from the reaction condensing reaction of compound (2) or (3) and aromatic aldehydes or ketone; [p-nitrobenzaldehyde, p-hydroxybenzaldehyde, p-chlorobenzaldehyde, p-bromoacetophenone and terephthaldehyde]. Results: FTIR and 1H-NMR spectroscopy characterized all of the pr
... Show MoreSulfamethoxazole (SMX) is the most significant antibiotic in the sulfonamide family. It was chosen as the representative of this category because of its widespread use. Starting with sulfamethoxazole, a new series of 2-Azetidinone (M1-M6) was synthesized, the structure of these new derivatives was confirmed using spectral methods, starting with the synthesis of Schiff’s bases by reflux of different aromatic benzaldehydes, separately, with Sulfamethoxazole in ethanol with few drops of acetic acid. The final compounds were obtained by ketene-imine synthesis of β-lactam using chloroacetyl chloride. The designed chemicals’ synthesis has been completed successfully. Physical parameters (melting points and Rf values), Fourier transfo
... Show MoreA new series of schiff base and aminothiadiazole derivatives of N- substituted phthalimide (I-VI) were synthesized. In this work, the intermediate 4-(1,3-dioxoisoindolin-2-yl)benzaldehyde compound (I), was formed by reaction of 4-amino benzaldehyde with phthalic anhydride in glacial acetic acid(GAA). A series of Schiff bases (IV-VI) was prepared by the reaction of benzidine with compound (I) in ethanol and presence of GAA as a catalyst to form compound (IV) which react with compound (I) and p-nitro benzyldehyde to give compound (V) and (VI) respectively. A new phthalimide thiosemi-carbazone derivative (ll) was prepared by reaction of compound (l) with thiosemi-carbazide HCl in the presence of equimolar amount of sodium acetate. Fina
... Show MoreThe importance of evaluation depends on many institutions, whether governmental or private, including media institutions, rely on the list to evaluate the weight of things and appreciation, as well as judging things, achievements, and everything related to the institution is concerned. Because through evaluation, institutions can recognize weaknesses and strengths. It is also an effective tool for management review, through which the institution can review everything related to planning and decision-making, leadership, incentives and other administrative matters.
Therefore, this study attempts to shed light on the evaluation process, its basics and its importance in general and in the Kurdish media institutions as a model in part
... Show Morethe study considers the optical classification of cervical nodal lymph cells and is based on research into the development of a Computer Aid Diagnosis (CAD) to detect the malignancy cases of diseases. We consider 2 sets of features one of them is the statistical features; included Mode, Median, Mean, Standard Deviation and Maximum Probability Density and the second set are the features that consist of Euclidian geometrical features like the Object Perimeter, Area and Infill Coefficient. The segmentation method is based on following up the cell and its background regions as ranges in the minimum-maximum of pixel values. The decision making approach is based on applying of Minimum Dista
With the revolutionized expansion of the Internet, worldwide information increases the application of communication technology, and the rapid growth of significant data volume boosts the requirement to accomplish secure, robust, and confident techniques using various effective algorithms. Lots of algorithms and techniques are available for data security. This paper presents a cryptosystem that combines several Substitution Cipher Algorithms along with the Circular queue data structure. The two different substitution techniques are; Homophonic Substitution Cipher and Polyalphabetic Substitution Cipher in which they merged in a single circular queue with four different keys for each of them, which produces eight different outputs for
... Show More