Intrusion detection system is an imperative role in increasing security and decreasing the harm of the computer security system and information system when using of network. It observes different events in a network or system to decide occurring an intrusion or not and it is used to make strategic decision, security purposes and analyzing directions. This paper describes host based intrusion detection system architecture for DDoS attack, which intelligently detects the intrusion periodically and dynamically by evaluating the intruder group respective to the present node with its neighbors. We analyze a dependable dataset named CICIDS 2017 that contains benign and DDoS attack network flows, which meets certifiable criteria and is openly accessible. It evaluates the performance of a complete arrangement of machine learning algorithms and network traffic features to indicate the best features for detecting the assured attack classes. Our goal is storing the address of destination IP that is utilized to detect an intruder by method of misuse detection.
Background: Directly observed therapy-short course (DOTS) had been adopted by World Health Organization (WHO) as hopeful strategy for treatment of tuberculosis (TB) since early nineties. Iraqi health authorities started DOTS implementation since 2001 in Baghdad. Coverage expanded gradually till 100% in 2004. War and unstable security condition hit Iraq since March 2003. Objective: The objective of this study was To evaluate the DOTS implementation program in Baghdad in different periods including 2 unstable periods for proper assessment of war and instability on treatment of TB. Patients and methods: This study had been conducted in Baghdad during four different periods (before and during 2003 war, after war; without and with DOTS). Dire
... Show MoreIn this paper, tunable optical band-pass filters based on Polarization Maintaining Fiber –Mach Zehnder Interferometer presented. Tunability of the band-pass filter implemented by applying different mechanical forces N on the micro-cavities splicing regions (MCSRs). The micro-cavity formed by using three variable-lengths of single-mode polarization-maintaining fiber with (8, 16, 24) cm lengths, splice between two segments of (SMF-28) with (26, 13) cm lengths, using the fusion splicing technique. Ellipsoidal shape micro-cavities experimentally achieved parallel to the propagation axis having dimensions between (12-24) μm of width and (4-12) μm of length. A micro-cavity with width and length as high as 24 μm and 12 μ
... Show MoreThe present study aims to detect CTX-M-type ESBL from Escherichia coli clinical isolates and to analyze their antibotic susceptibility patterns. One hundred of E. coli isolates were collected from different clinical samples from a tertiary hospital. ESBL positivity was determined by the disk diffusion method. PCR used for amplification of CTX-M-type ESBL produced by E. coli. Out of 100 E. coli isolates, twenty-four isolates (24%) were ESBL-producers. E. coli isolated from pus was the most frequent clinical specimen that produced ESBL (41.66%) followed by urine (34.21%), respiratory (22.23%), and blood (19.05%). After PCR amplification of these 24 isolates, 10 (41.66%) isolates were found to possess CTX-M genes. The CTX-M type ESBL
... Show MoreThe social contract represents a set of laws and determinants agreed upon by a group of individuals in order to organize society for the better.This agreement guarantees them to live in peace according to the pre-agreed laws, and on the basis of that, it represents the key to resolving the crisis relations between the state and society, and this is what prompted Iraqi society to move towards the formulation of a new social contract through popular protest movements in 2019.To overcome the old social contract that shook the trust between the state and society as a result of its negative outputs at various political, economic and social levels, and many problems emerged that hindered the process of building the social contra
... Show MoreSignature verification involves vague situations in which a signature could resemble many reference samples or might differ because of handwriting variances. By presenting the features and similarity score of signatures from the matching algorithm as fuzzy sets and capturing the degrees of membership, non-membership, and indeterminacy, a neutrosophic engine can significantly contribute to signature verification by addressing the inherent uncertainties and ambiguities present in signatures. But type-1 neutrosophic logic gives these membership functions fixed values, which could not adequately capture the various degrees of uncertainty in the characteristics of signatures. Type-1 neutrosophic representation is also unable to adjust to various
... Show MoreMany consumers of electric power have excesses in their electric power consumptions that exceed the permissible limit by the electrical power distribution stations, and then we proposed a validation approach that works intelligently by applying machine learning (ML) technology to teach electrical consumers how to properly consume without wasting energy expended. The validation approach is one of a large combination of intelligent processes related to energy consumption which is called the efficient energy consumption management (EECM) approaches, and it connected with the internet of things (IoT) technology to be linked to Google Firebase Cloud where a utility center used to check whether the consumption of the efficient energy is s
... Show MoreAuthentication is the process of determining whether someone or something is, in fact, who or what it is declared to be. As the dependence upon computers and computer networks grows, the need for user authentication has increased. User’s claimed identity can be verified by one of several methods. One of the most popular of these methods is represented by (something user know), such as password or Personal Identification Number (PIN). Biometrics is the science and technology of authentication by identifying the living individual’s physiological or behavioral attributes. Keystroke authentication is a new behavioral access control system to identify legitimate users via their typing behavior. The objective of this paper is to provide user
... Show MoreThe quality of Global Navigation Satellite Systems (GNSS) networks are considerably influenced by the configuration of the observed baselines. Where, this study aims to find an optimal configuration for GNSS baselines in terms of the number and distribution of baselines to improve the quality criteria of the GNSS networks. First order design problem (FOD) was applied in this research to optimize GNSS network baselines configuration, and based on sequential adjustment method to solve its objective functions.
FOD for optimum precision (FOD-p) was the proposed model which based on the design criteria of A-optimality and E-optimality. These design criteria were selected as objective functions of precision, whic
... Show More