A new efficient Two Derivative Runge-Kutta method (TDRK) of order five is developed for the numerical solution of the special first order ordinary differential equations (ODEs). The new method is derived using the property of First Same As Last (FSAL). We analyzed the stability of our method. The numerical results are presented to illustrate the efficiency of the new method in comparison with some well-known RK methods.
Intrusion detection system is an imperative role in increasing security and decreasing the harm of the computer security system and information system when using of network. It observes different events in a network or system to decide occurring an intrusion or not and it is used to make strategic decision, security purposes and analyzing directions. This paper describes host based intrusion detection system architecture for DDoS attack, which intelligently detects the intrusion periodically and dynamically by evaluating the intruder group respective to the present node with its neighbors. We analyze a dependable dataset named CICIDS 2017 that contains benign and DDoS attack network flows, which meets certifiable criteria and is ope
... Show MoreThe influx of Arab Qahtani and Nizari tribes continued to the countries of Baluchistan and the Levant in pre-Islamic times until the Levant became open to the Arab-Islamic tide during the first century AH. The Islamic Orient until the early Islamic Arab Army reached the western borders of China. What we will see in the folds of the search.
A study carried out in quail’s field owned by the Department of Animal production/ Collage of Agriculture / Tikrit University. For the period 14/ 5/ 2016 to 4/ 6/ 2016 in order to study the effect of adding Curcuma longa - to the diet of quails - on some productive and physiological characteristics of the Japanese quail birds bred for meat production. Using (48) quail birds which are two weeks old provided by Department of Agricultural Research. The birds were divided randomly after weighing them into three treatments; four replicate treatments for (4 bird/ replicate). The treatments as follows: (T1) control group (fed diet without any supplement), second (T2) and third (T3) groups were fed diet supplemental 4.5 and 9g Curcuma powder /
... Show MoreIn this paper, the goal of proposed method is to protect data against different types of attacks by unauthorized parties. The basic idea of proposed method is generating a private key from a specific features of digital color image such as color (Red, Green and Blue); the generating process of private key from colors of digital color image performed via the computing process of color frequencies for blue color of an image then computing the maximum frequency of blue color, multiplying it by its number and adding process will performed to produce a generated key. After that the private key is generated, must be converting it into the binary representation form. The generated key is extracted from blue color of keyed image then we selects a c
... Show MoreThis work, deals with Kumaraswamy distribution. Kumaraswamy (1976, 1978) showed well known probability distribution functions such as the normal, beta and log-normal but in (1980) Kumaraswamy developed a more general probability density function for double bounded random processes, which is known as Kumaraswamy’s distribution. Classical maximum likelihood and Bayes methods estimator are used to estimate the unknown shape parameter (b). Reliability function are obtained using symmetric loss functions by using three types of informative priors two single priors and one double prior. In addition, a comparison is made for the performance of these estimators with respect to the numerical solution which are found using expansion method. The
... Show MoreWith the twenty - First century, It becomes clear to us that for 110 years the Japanese - Chinese relations have been witnessing big radical events and developments. ( we take the year of 1949 as the starting date for this relations). In order to prove hypothesis the study divided in to four chapters. - The first chapter deals with explaining the factors of the subject of the Japanese - Chinese relations which described as Indirect threat and aggressive relations from Japan to China after the Second World War by Japanese entering in the American world strategy, in order to destroy the communist china's system which decleard in 1949, because the united states understood that the new system in Beijing could threat American's Interest
... Show MoreOne of most the important compounds which have active hydrogen (substrate) is the thiols which used in a wide field in preparation of Mannich bases . A large number of Mannich bases have been prepared as a biologically active compound (pharmaceutical, pesticides, bactericidal, fungicidal and tuberculostatic) and in order to correlate their structure and reactivity with their pharmacological activity such as . It has been reported that the reaction is easily proceeded by using primary and secondary amine beside formaldehyde. But when we tried the reaction of thiols as substrate and formaldehyde and succinimide instead of amine, the reaction did not proceed to give Mannich base but product were methylenene – bis – sulfide . Mann
... Show More