Computer systems and networks are increasingly used for many types of applications; as a result the security threats to computers and networks have also increased significantly. Traditionally, password user authentication is widely used to authenticate legitimate user, but this method has many loopholes such as password sharing, brute force attack, dictionary attack and more. The aim of this paper is to improve the password authentication method using Probabilistic Neural Networks (PNNs) with three types of distance include Euclidean Distance, Manhattan Distance and Euclidean Squared Distance and four features of keystroke dynamics including Dwell Time (DT), Flight Time (FT), mixture of (DT) and (FT), and finally Up-Up Time (UUT). The resul
... Show MorePattern matching algorithms are usually used as detecting process in intrusion detection system. The efficiency of these algorithms is affected by the performance of the intrusion detection system which reflects the requirement of a new investigation in this field. Four matching algorithms and a combined of two algorithms, for intrusion detection system based on new DNA encoding, are applied for evaluation of their achievements. These algorithms are Brute-force algorithm, Boyer-Moore algorithm, Horspool algorithm, Knuth-Morris-Pratt algorithm, and the combined of Boyer-Moore algorithm and Knuth–Morris– Pratt algorithm. The performance of the proposed approach is calculated based on the executed time, where these algorithms are applied o
... Show MoreThe Internet of Things (IoT) is an information network that connects gadgets and sensors to allow new autonomous tasks. The Industrial Internet of Things (IIoT) refers to the integration of IoT with industrial applications. Some vital infrastructures, such as water delivery networks, use IIoT. The scattered topology of IIoT and resource limits of edge computing provide new difficulties to traditional data storage, transport, and security protection with the rapid expansion of the IIoT. In this paper, a recovery mechanism to recover the edge network failure is proposed by considering repair cost and computational demands. The NP-hard problem was divided into interdependent major and minor problems that could be solved in polynomial t
... Show MoreInduced EF is among the most important of advanced oxidation processes (AOPs) It was employed to treat different kinds of wastewater. In the present review, the types and mechanism of induced EF were outlined. Parameters affecting this process have been mentioned with details. These are current density, pH, H2O2 concentration, and time. The application of induced electro Fenton in various sectors of industries like textile, petroleum refineries, and pharmaceutical were outlined. The outcomes of this review demonstrate the vital role of induced EF in treatment of wastewater at high efficiency and low cost in contrast with conventional technique
This research include synthesized and characterization the compound [I] by reaction terephthaldehyde , mercaptoacetic acid and thiosemicarbazide with concentrated sulfuric acid then this compound reaction with ethyl chloroacetate and sodium acetate to product ester compound [II],the latter compound reaction with hydrazine hydrate to synthesized acid hydrazide [III] after that reaction with 4-alkoxy benzaldehyde[IV]n to synthesized Schiff bases compounds [V]n, the compound [VI] synthesized via reaction compound [I] with chloroacetic acid and sodium acetate then the compound[VI] reaction with 2-phenylenediamine in 4 N hydrochloric acid to product benzimidazole compound[VII]. The compounds characterized by melting points, FTIR and 1HNMR spectr
... Show MoreThis research includes the synthesis of some new different heterocyclic derivatives of 5-Bromoisatin. New sulfonylamide, diazine, oxazole, thiazole and 1,2,3-triazole derivatives of 5-Bromoisatin have been synthesized. The synthesis process started by the reaction of 5-Bromoisatin with different reagents to obtain schiff bases of 5-Bromoisatin intermediate compounds(1, 8, 19) by using glacial acetic acid as a catalyst in three routes. The first route, 5-Bromoisatin reacted with p-aminosulfonylchloride to product compound(1), then converted to sulfonyl amide derivatives(2-7) by the reaction of compound(1) with different substituted primary aromatic amine in absolute ethanol. The second route includes the reaction of 5-Bromoisatin rea
... Show MoreObjective: Hesperidin (HSP) is a pharmacologically active organic compound found in citrus fruits and peppermint. We synthesized a new HSP derivative by reacting it with 5-Amino-1,3,4-thiadiazole-2-thiol in acetic acid. Methods: This compound was characterized by Fourier-transform infrared, proton nuclear magnetic resonance, and electron impact mass spectra. A molecular docking study explores the predicted binding of the compound and its possible mode of action. Bioavailability, site of absorption, drug mimic, and topological polar surface was predicted using absorption, distribution, metabolism, and excretion (ADME) studies. Results: The docking study predicts that the new compound binds to the active sites of Aurora-B
... Show MoreNew bidentate dithiocarbamate ligand (NaL) namely [Sodium-2-(((3-methyl -4- “(2,2,2-tri fluoro ethoxy) pyridin-2”-yl) methyl) sulfinyl)-1H-benzoimidazole -1-carbodithioate] was prepared. This free ligand was synthesized from the reaction of a (RS)-2-([3-methyl -4-(2,2,2-tri fluoroethoxy) pyridin-2-yl] methyl sulfinyl)-1H benzoimidazole, CS2 and NaOH in methanol as solvent. From reaction of dithiocarbamate salt (NaL) with metal ions (M); Co(II), Ni(II), Cu(II), Zn(II), Cd(II) and Pd(II)”, have obtained the DTC complexes at general molecular formula [M(L)2(H2O)2] and [Pd(L)2]. To characterize the ligand and its complexes, used different analyses methods such FTIR, UV-Vis, elemental microanalysis, atomic absoreption, magnetic susceptibil
... Show More