<span>Distributed denial-of-service (DDoS) attack is bluster to network security that purpose at exhausted the networks with malicious traffic. Although several techniques have been designed for DDoS attack detection, intrusion detection system (IDS) It has a great role in protecting the network system and has the ability to collect and analyze data from various network sources to discover any unauthorized access. The goal of IDS is to detect malicious traffic and defend the system against any fraudulent activity or illegal traffic. Therefore, IDS monitors outgoing and incoming network traffic. This paper contains a based intrusion detection system for DDoS attack, and has the ability to detect the attack intelligently, dynamically and periodically by evaluating the set of attackers of the current node with its neighbors. We use dataset named CICDDoS2019 that contains on binary classes benign and DDoS. Performance has evaluated by applying data mining algorithms as well as applying the best features to discover potential attack classes.</span>
Recently, biometric technologies are used widely due to their improved security that decreases cases of deception and theft. The biometric technologies use physical features and characters in the identification of individuals. The most common biometric technologies are: Iris, voice, fingerprint, handwriting and hand print. In this paper, two biometric recognition technologies are analyzed and compared, which are the iris and sound recognition techniques. The iris recognition technique recognizes persons by analyzing the main patterns in the iris structure, while the sound recognition technique identifies individuals depending on their unique voice characteristics or as called voice print. The comparison results show that the resul
... Show MoreBiosignal analysis is one of the most important topics that researchers have tried to develop during the last century to understand numerous human diseases. Electroencephalograms (EEGs) are one of the techniques which provides an electrical representation of biosignals that reflect changes in the activity of the human brain. Monitoring the levels of anesthesia is a very important subject, which has been proposed to avoid both patient awareness caused by inadequate dosage of anesthetic drugs and excessive use of anesthesia during surgery. This article reviews the bases of these techniques and their development within the last decades and provides a synopsis of the relevant methodologies and algorithms that are used to analyze EEG sig
... Show MoreThis study included the isolation and identification of Aspergillus flavus isolates associated with imported American rice grains and local corn grains which collected from local markets, using UV light with 365 nm wave length and different media (PDA, YEA, COA, and CDA ). One hundred and seven fungal isolates were identified in rice and 147 isolates in corn.4 genera and 7 species were associated with grains, the genera were Aspergillus ,Fusarium ,Neurospora ,Penicillium . Aspergillus was dominant with occurrence of 0.47% and frequency of 11.75% in rice grains whereas in corn grains the genus Neurospora was dominant with occurrence of 1.09% and frequency 27.25% ,results revealed that 20 isolates out of 50 A. flavus isolates were able
... Show MoreAbstract
The research aims to determine the role of the efficiency of Human Resources Information System in the effectiveness of Employees Performance Appraisal System in the Ministry of Higher Education and Scientific Research / Center for the ministry, it was touching the researchers need the ministry to devise methods that employ outputs Human Resources Information System in the organization surveyed for the development of methods and levels of process evaluate the performance of its employees, in order to identify the extent of the role played by human resources information system in the process of assessing the performance of employees, we raised the question of the President as follows:
... Show MoreThis research basically gives an introduction about the multiple intelligence
theory and its implication into the classroom. It presents a unit plan based upon the
MI theory followed by a report which explains the application of the plan by the
researcher on the first class student of computer department in college of sciences/
University of Al-Mustansiryia and the teacher's and the students' reaction to it.
The research starts with a short introduction about the MI theory is a great
theory that could help students to learn better in a relaxed learning situation. It is
presented by Howard Gardener first when he published his book "Frames of
Minds" in 1983 in which he describes how the brain has multiple intelligen
This current research aims to reveal the difference between the levels of teaching expertise of physics teachers according to the years of service by answering the following question: does the educational skill level of physics teachers work according to the service? The sample of the study consisted of (225) physics teachers by (125) females (56%), and (100) males (44%), distributed on (4) education directorates in Baghdad governorate on both sides of al-Karkh and al-Rusafa. In order to achieve the aim of the study, the researcher prepared a note card for expertise teaching, consisting of (39) paragraphs distributed into (5) fields. The apparent validity and reliability of the card were verified through an agreement (the researcher hers
... Show MoreOne of the main element in the network is the intersection which consider as the critical points because there are many conflict in this element. The capability and quality of operation of an intersection was assessed to provide a better understanding of the network's traffic efficiency. In Baghdad city, the capital of/Iraq the majority of the intersections are operated under the congestion status and with level of service F, therefore theses intersection are consider as high spot point of delay in the network of Baghdad city. In this study we selected Al-Ameria signalized intersection as a case study to represent the delay problem in the intersections in Baghdad. The intersection is located in the w
In this paper, two of the local search algorithms are used (genetic algorithm and particle swarm optimization), in scheduling number of products (n jobs) on a single machine to minimize a multi-objective function which is denoted as (total completion time, total tardiness, total earliness and the total late work). A branch and bound (BAB) method is used for comparing the results for (n) jobs starting from (5-18). The results show that the two algorithms have found the optimal and near optimal solutions in an appropriate times.
At the heart of every robust economy is a vital banking system. The functional banking system can effectively perform several functions such as mobilizing savings, allocating credit, monitoring managers, transforming risks, and facilitating the financial transactions. This paper aims to measure the impact of banking system development on economic growth in Iraq. Credit to private sector divided by GDP used as a proxy of banking development. Real per capita GDP used as a proxy of economic growth. By using Autoregressive Distributed Lag (ARDL) model, the paper finds that the undeveloped Iraqi banking system could not promote economic growth in the country. Therefore, a variety of policies need to be taken to spur the role of bankin
... Show More