In this paper the queuing system (M/Er/1/N) has been considered in equilibrium. The method of stages introduced by Erlang has been used. The system of equations which governs the equilibrium probabilities of various stages has been given. For general N the probability of j stages of service are left in the system, has been introduced. And the probability for the empty system has been calculated in the explicit form.
<span>Distributed denial-of-service (DDoS) attack is bluster to network security that purpose at exhausted the networks with malicious traffic. Although several techniques have been designed for DDoS attack detection, intrusion detection system (IDS) It has a great role in protecting the network system and has the ability to collect and analyze data from various network sources to discover any unauthorized access. The goal of IDS is to detect malicious traffic and defend the system against any fraudulent activity or illegal traffic. Therefore, IDS monitors outgoing and incoming network traffic. This paper contains a based intrusion detection system for DDoS attack, and has the ability to detect the attack intelligently, dynami
... Show MoreAn approximate solution of the liner system of ntegral cquations fot both fredholm(SFIEs)and Volterra(SIES)types has been derived using taylor series expansion.The solusion is essentailly
Kurdistan power system is expanded along years ago. The electrical power is transmitted through long transmission lines. The main problem of transmission lines is active and reactive power losses. It is important to solve this issue, unless, the most of electrical energy will lost over transmission system. In this study, High Voltage Direct Current links/bipolar connection were connected in a power system to reduce the power losses. The 132kV, 50 Hz, 36 buses Kurdistan power system is used as a study case. The load flow analysis was implemented by using ETAP.16 program in which Newton-Raphson method for three cases. The results show that the losses are reduced after inserted HVDC links.
Multiplicative inverse in GF (2 m ) is a complex step in some important application such as Elliptic Curve Cryptography (ECC) and other applications. It operates by multiplying and squaring operation depending on the number of bits (m) in the field GF (2 m ). In this paper, a fast method is suggested to find inversion in GF (2 m ) using FPGA by reducing the number of multiplication operations in the Fermat's Theorem and transferring the squaring into a fast method to find exponentiation to (2 k ). In the proposed algorithm, the multiplicative inverse in GF(2 m ) is achieved by number of multiplications depending on log 2 (m) and each exponentiation is operates in a single clock cycle by generating a reduction matrix for high power of two ex
... Show MoreSeveral azo dyes were synthesized through coupling reaetion of some substituted phenols and B.naphthol with diazonium salt of 2- amino-1,3-4- thiadiazol -5- thiol. All the synthesized compounds during this work were characterized using some speetral data (F.TIRand UV)andM.P . 2-[4 --Hydroxy napthyl-azo ] -1,3,4-Thiadiazol -5-Thiol • 2- [2-- hydroxy –4- NO2 – phenyl- azo]- 1,3,4 - Thiadiazol –5-Thiol. • 2- [3--Amino-4-Hydroxy phenyl –azo]-1,3,4 - Thiadiazol –5-Thiol. . • 2-[2--Amino-4-Hydroxy phenyl -azo]-1,3,4 - Thiadiazol –5-Thiol . • 2- [3--Amino-6- Hydroxy phenyl -azo]-1,3,4 - Thiadiazol –5-Thiol. • 2-[2-- Hydroxy- 5 – chloro – Pheny - azo]- 1,3,4 - Thiadiazol –5-Thiol . • 2- [4-- Hydroxy phenyl -azo] -1,
... Show More