Intrusion detection system is an imperative role in increasing security and decreasing the harm of the computer security system and information system when using of network. It observes different events in a network or system to decide occurring an intrusion or not and it is used to make strategic decision, security purposes and analyzing directions. This paper describes host based intrusion detection system architecture for DDoS attack, which intelligently detects the intrusion periodically and dynamically by evaluating the intruder group respective to the present node with its neighbors. We analyze a dependable dataset named CICIDS 2017 that contains benign and DDoS attack network flows, which meets certifiable criteria and is openly accessible. It evaluates the performance of a complete arrangement of machine learning algorithms and network traffic features to indicate the best features for detecting the assured attack classes. Our goal is storing the address of destination IP that is utilized to detect an intruder by method of misuse detection.
Bacteriocin is an important antimicrobial peptide that can be used in industrial and medical fields due to its characteristics of antibacterial, food preservation and anticancer activities. Fifty isolates of Bacillus sp were collected from different soil samples which were already recognized via morphological and biochemical identification process. The isolates were screened for bacteriocin production effective against Staphylococcus spp in order to select the highest producing isolate. The isolate NK16 showed the maximum bacteriocin production (80 AU/ml) which was further characterized as Bacillus subtilis NK 16 through using API identification system (API 20E and API 50CHB). Then, next step was to detect the optimal conditions for maximum
... Show MoreOne of the most difficult tasks in modern medical societies is the process of identifying a cure for many infectious diseases caused by drug-resistant microbes. Therefore, it has become necessary to discover new compounds that work in this regard. The currently prepared Schiff base, derived from thiazole, has a biological activity against bacteria and biofilms and its activity increases when it is associated with copper, zinc and platinum ions and forms metal complexes. This study highlights the synthesis and evaluation of novel biological compounds as inhibitors of bacterial growth and biofilms. A three newly complexes are resulting from the reaction of a new Schiff base ligand (LC) with metal ions (Zn, Cu, Pt). The new ligand (LC)
... Show MoreIn this research a new compounds were synthesized started from compound 1 which was synthesized from two moll of piperidine (secondary cyclic amine) with dichloro acetic acid, compound 1 reacted by condensation reaction with methanol and H 2 SO 4 as a catalyst to give the ester compound 2. Compound 2 was reacted with hydrazine hydrate 80 % to give compound 3 , then the compounds 4-13 were synthesized from refluxing of compound 3 with the selected aldehydes and ketones via using few drops of glacial acetic acid, finely step the compounds 4-13 were reacted with phtalic anhydride to give compounds 14-23.. All these compounds were characterized by using of melting point, FTIR, 1 HNMR and mass spectroscopy. Scheme 1 and Scheme 2 shown the all re
... Show MoreA multistep synthesis was established for the preparation of a new vanillic acid-1, 2, 4-1triazole-3-thiol conjugate (
The load shedding scheme has been extensively implemented as a fast solution for unbalance conditions. Therefore, it's crucial to investigate supply-demand balancing in order to protect the network from collapsing and to sustain stability as possible, however its implementation is mostly undesirable. One of the solutions to minimize the amount of load shedding is the integration renewable energy resources, such as wind power, in the electric power generation could contribute significantly to minimizing power cuts as it is ability to positively improving the stability of the electric grid. In this paper propose a method for shedding the load base on the priority demands with incorporating the wind po
... Show MoreLearning the vocabulary of a language has great impact on acquiring that language. Many scholars in the field of language learning emphasize the importance of vocabulary as part of the learner's communicative competence, considering it the heart of language. One of the best methods of learning vocabulary is to focus on those words of high frequency. The present article is a corpus based approach to the study of vocabulary whereby the research data are analyzed quantitatively using the software program "AntWordprofiler". This program analyses new input research data in terms of already stored reliable corpora. The aim of this article is to find out whether the vocabularies used in the English textbook for Intermediate Schools in Iraq are con
... Show MoreA novel median filter based on crow optimization algorithms (OMF) is suggested to reduce the random salt and pepper noise and improve the quality of the RGB-colored and gray images. The fundamental idea of the approach is that first, the crow optimization algorithm detects noise pixels, and that replacing them with an optimum median value depending on a criterion of maximization fitness function. Finally, the standard measure peak signal-to-noise ratio (PSNR), Structural Similarity, absolute square error and mean square error have been used to test the performance of suggested filters (original and improved median filter) used to removed noise from images. It achieves the simulation based on MATLAB R2019b and the resul
... Show MoreAuthentication is the process of determining whether someone or something is, in fact, who or what it is declared to be. As the dependence upon computers and computer networks grows, the need for user authentication has increased. User’s claimed identity can be verified by one of several methods. One of the most popular of these methods is represented by (something user know), such as password or Personal Identification Number (PIN). Biometrics is the science and technology of authentication by identifying the living individual’s physiological or behavioral attributes. Keystroke authentication is a new behavioral access control system to identify legitimate users via their typing behavior. The objective of this paper is to provide user
... Show MoreIris research is focused on developing techniques for identifying and locating relevant biometric features, accurate segmentation and efficient computation while lending themselves to compression methods. Most iris segmentation methods are based on complex modelling of traits and characteristics which, in turn, reduce the effectiveness of the system being used as a real time system. This paper introduces a novel parameterized technique for iris segmentation. The method is based on a number of steps starting from converting grayscale eye image to a bit plane representation, selection of the most significant bit planes followed by a parameterization of the iris location resulting in an accurate segmentation of the iris from the origin
... Show More