<span>Distributed denial-of-service (DDoS) attack is bluster to network security that purpose at exhausted the networks with malicious traffic. Although several techniques have been designed for DDoS attack detection, intrusion detection system (IDS) It has a great role in protecting the network system and has the ability to collect and analyze data from various network sources to discover any unauthorized access. The goal of IDS is to detect malicious traffic and defend the system against any fraudulent activity or illegal traffic. Therefore, IDS monitors outgoing and incoming network traffic. This paper contains a based intrusion detection system for DDoS attack, and has the ability to detect the attack intelligently, dynamically and periodically by evaluating the set of attackers of the current node with its neighbors. We use dataset named CICDDoS2019 that contains on binary classes benign and DDoS. Performance has evaluated by applying data mining algorithms as well as applying the best features to discover potential attack classes.</span>
Smart cities have recently undergone a fundamental evolution that has greatly increased their potentials. In reality, recent advances in the Internet of Things (IoT) have created new opportunities by solving a number of critical issues that are allowing innovations for smart cities as well as the creation and computerization of cutting-edge services and applications for the many city partners. In order to further the development of smart cities toward compelling sharing and connection, this study will explore the information innovation in smart cities in light of the Internet of Things (IoT) and cloud computing (CC). IoT data is first collected in the context of smart cities. The data that is gathered is uniform. The Internet of Things,
... Show MoreToday, the role of cloud computing in our day-to-day lives is very prominent. The cloud computing paradigm makes it possible to provide demand-based resources. Cloud computing has changed the way that organizations manage resources due to their robustness, low cost, and pervasive nature. Data security is usually realized using different methods such as encryption. However, the privacy of data is another important challenge that should be considered when transporting, storing, and analyzing data in the public cloud. In this paper, a new method is proposed to track malicious users who use their private key to decrypt data in a system, share it with others and cause system information leakage. Security policies are also considered to be int
... Show MoreThe techniques of contemporary Iraqi painting and their reflection on the productions of students of art education is an important subject in the field of painting at the theoretical and practical levels in academic study, whether theoretical or practical. Al-Iraqi is one of the arts with historical roots and a distinguished position among other artistic genres. Painting has received a sufficient level of development through the use of various contemporary techniques to advance it for the better.
The methodological framework included the problem of research and the need for it, and then the importance of research came in shedding light on the techniques of contemporary Iraqi painting, and the impact of these techniques on the producti
An ultrasonic treatment was applied to the vacuum gas oil at intervals of 5 to 30 minutes, at 70°C. In this work, the improvement of the important properties of Iraqi vacuum gas oil, such as carbon residue, was studied with several parameter conditions that affect vacuum efficiency, such as sonication time (5, 10, 15, 20, 25, and 30) min, power amplitude (10–50%). After ultrasonic treatment, the carbon residue of vacuum gas oil was evaluated using a Conradson carbon residue meter (ASTM D189). The experiment revealed that the oil's carbon residue had decreased by 16%. As a consequence of the experiment It was discovered that ultrasonic treatment might reduce the carbon residual and density of oil samples being studied. It also notice
... Show MoreNowadays, people's expression on the Internet is no longer limited to text, especially with the rise of the short video boom, leading to the emergence of a large number of modal data such as text, pictures, audio, and video. Compared to single mode data ,the multi-modal data always contains massive information. The mining process of multi-modal information can help computers to better understand human emotional characteristics. However, because the multi-modal data show obvious dynamic time series features, it is necessary to solve the dynamic correlation problem within a single mode and between different modes in the same application scene during the fusion process. To solve this problem, in this paper, a feature extraction framework of
... Show MoreBanking institutions are considered one of development foundations,and they also performe active role in supporting national economey and itsinstitutions. Banks became diversed in their activities that specialized Banksbecame one of the constituents of developing work in any activity, especiallyin investiment sector .In view of the importance of insurance sector and thenecessity of developing its divices and its working instituments, studyinginsurance Banking reality became a necessity, because insurance Companies inIraq are suffering of weakness in the level of insurance service, in addition tothe existence of a problem in the relationship between Banks network andinsurance industry.So this research aims to define insurance reality; the
... Show MoreThe building of Basrah University located in a rural area at Gramat Ali, its consist of seven colleges and very high number of students, lecturers ,and employers. Therefore, the intersections which leading to university building suffer congestion at morning peak hour (8-9) A.M and evening peak hour (2-3) P.M. In this study we collected the data in intersections which leading to university building at peak hour at same time, then we had analysis this data by using the highway capacity manual (HCM) and program (HCS). Also, we collected that data in University entries with classification of vehicles according to types and number of passengers at peak hour. Then we studied the number of proposals to riddance the congestion, such as the effe
... Show MoreA hydraulic platform was manufactured to serve palm trees and to enhance palm tree services, with a height of 12 meters, by the General Company for Hydraulic Industries, one of the Ministry of Industry's formations. This platform was tested in the field after being manufactured according to a randomized complete block design using split-split plots with three factors. The first factor represented the shape of the orchard land, with two levels (flat land and uneven land), serving as the main plots. The second factor had three levels representing palm tree heights (4, 8, and 12 meters), which served as the sub-plots. The third factor was the palm tree services, represented at three levels (pruning, pollination, and harvesting), with each trea
... Show More