<span>Distributed denial-of-service (DDoS) attack is bluster to network security that purpose at exhausted the networks with malicious traffic. Although several techniques have been designed for DDoS attack detection, intrusion detection system (IDS) It has a great role in protecting the network system and has the ability to collect and analyze data from various network sources to discover any unauthorized access. The goal of IDS is to detect malicious traffic and defend the system against any fraudulent activity or illegal traffic. Therefore, IDS monitors outgoing and incoming network traffic. This paper contains a based intrusion detection system for DDoS attack, and has the ability to detect the attack intelligently, dynamically and periodically by evaluating the set of attackers of the current node with its neighbors. We use dataset named CICDDoS2019 that contains on binary classes benign and DDoS. Performance has evaluated by applying data mining algorithms as well as applying the best features to discover potential attack classes.</span>
In this research, the structural behavior of reinforced concrete columns made of normal and hybrid reactive powder concrete (hybrid by steel and polypropylene fibers) subjected to chloride salts with concentration was 8341.6 mg/l. The study consists of two parts, the first one is experimental study and the second one is theoretical analysis. Three main variables were adopted in the experimental program; concrete type, curing type and loading arrangement. Twenty (120x120x1200) mm columns were cast and tested depending on these variables. The samples were reinforced using two different bars; Ø8 for ties and Ø12 with minimum longitudinal reinforcement (0.01Ag). The specimens were divided into two main groups based o
... Show Moreلمعرفة مدى تأثير تمرينات مهارية وفق تقنية تركيز للتفكير الجاني على الدقة الحركة وتعلم هجمة الإيقاف بالغطس للطلاب في سلاح الشيش استخدمت الباحثتان المنهج التجريبي على عينة من طلاب المرحلة الثالثة بكلية التربية البدنية وعلوم الرياضة –جامعة ديالى والتي بلغت (30) طالباً موزعين على مجموعتين التجريبية والضابطة وبعد إكمال اجراءات البحث وتطبيق الاختبارات القبلية وتنفيذ التمرينات والاختبار البعدي ومعالجة الب
... Show MoreThis study evaluated the extent to which obturation materials bypass fractured endodontic instruments positioned in the middle and apical thirds of severely curved simulated root canals using different obturation techniques. Sixty resin blocks with simulated root canals were used, each with a 50° curvature, a 6.5 mm radius of curvature, and a length of 16.5 mm, prepared to an ISO #15 diameter and taper. Canals were shaped using ProTaper Universal files (Dentsply Maillefer) attached to an X-smart Plus endo motor (Dentsply), set at 3.5 Ncm torque and 250 rpm, up to size S2 at working length. To simulate fractures, F2 and F3 files were weakened 3 mm from the tip, then twisted to break in the apical and middle sections of the canal, re
... Show MoreToday in the digital realm, where images constitute the massive resource of the social media base but unfortunately suffer from two issues of size and transmission, compression is the ideal solution. Pixel base techniques are one of the modern spatially optimized modeling techniques of deterministic and probabilistic bases that imply mean, index, and residual. This paper introduces adaptive pixel-based coding techniques for the probabilistic part of a lossy scheme by incorporating the MMSA of the C321 base along with the utilization of the deterministic part losslessly. The tested results achieved higher size reduction performance compared to the traditional pixel-based techniques and the standard JPEG by about 40% and 50%,
... Show MoreThis study investigates the feasibility of a mobile robot navigating and discovering its location in unknown environments, followed by the creation of maps of these navigated environments for future use. First, a real mobile robot named TurtleBot3 Burger was used to achieve the simultaneous localization and mapping (SLAM) technique for a complex environment with 12 obstacles of different sizes based on the Rviz library, which is built on the robot operating system (ROS) booted in Linux. It is possible to control the robot and perform this process remotely by using an Amazon Elastic Compute Cloud (Amazon EC2) instance service. Then, the map to the Amazon Simple Storage Service (Amazon S3) cloud was uploaded. This provides a database
... Show MoreSmart cities have recently undergone a fundamental evolution that has greatly increased their potentials. In reality, recent advances in the Internet of Things (IoT) have created new opportunities by solving a number of critical issues that are allowing innovations for smart cities as well as the creation and computerization of cutting-edge services and applications for the many city partners. In order to further the development of smart cities toward compelling sharing and connection, this study will explore the information innovation in smart cities in light of the Internet of Things (IoT) and cloud computing (CC). IoT data is first collected in the context of smart cities. The data that is gathered is uniform. The Internet of Things,
... Show MoreThe research's aim is to place two teaching methods ( total and analytical method) and to know which one of them is better than the other in teaching the counter-attack with Epee. The researchers have used the experimental method for being considered suitable to solve the problem of the research. The sample of the research includes third –stage female students of college of physical education and sport sciences / Baghdad University in the subject of fencing, their number amounted 60 female students. It has been used SPSS for processing the results. They have concluded that the two groups of the research and the two methods (( total and analytical) have learnt the counter- attack of the two over mentioned groups. they have recommended to c
... Show MoreWatermarking operation can be defined as a process of embedding special wanted and reversible information in important secure files to protect the ownership or information of the wanted cover file based on the proposed singular value decomposition (SVD) watermark. The proposed method for digital watermark has very huge domain for constructing final number and this mean protecting watermark from conflict. The cover file is the important image need to be protected. A hidden watermark is a unique number extracted from the cover file by performing proposed related and successive operations, starting by dividing the original image into four various parts with unequal size. Each part of these four treated as a separate matrix and applying SVD
... Show MoreAudio classification is the process to classify different audio types according to contents. It is implemented in a large variety of real world problems, all classification applications allowed the target subjects to be viewed as a specific type of audio and hence, there is a variety in the audio types and every type has to be treatedcarefully according to its significant properties.Feature extraction is an important process for audio classification. This workintroduces several sets of features according to the type, two types of audio (datasets) were studied. Two different features sets are proposed: (i) firstorder gradient feature vector, and (ii) Local roughness feature vector, the experimentsshowed that the results are competitive to
... Show More