The major of DDoS attacks use TCP protocol and the TCP SYN flooding attack is the most common one among them. The SYN Cookie mechanism is used to defend against the TCP SYN flooding attack. It is an effective defense, but it has a disadvantage of high calculations and it doesn’t differentiate spoofed packets from legitimate packets. Therefore, filtering the spoofed packet can effectively enhance the SYN Cookie activity. Hop Count Filtering (HCF) is another mechanism used at the server side to filter spoofed packets. This mechanism has a drawback of being not a perfect and final solution in defending against the TCP SYN flooding attack. An enhanced mechanism of Integrating and combining the SYN Cookie with Hop Count Filtering (HCF) mechanism is proposed to protect the server from TCP SYN flooding. The results show that the defense against SYN flood DDoS attack is enhanced, since the availability of legitimate packets is increased and the time of SYN Cookie activity is delayed.
Evolutionary algorithms are better than heuristic algorithms at finding protein complexes in protein-protein interaction networks (PPINs). Many of these algorithms depend on their standard frameworks, which are based on topology. Further, many of these algorithms have been exclusively examined on networks with only reliable interaction data. The main objective of this paper is to extend the design of the canonical and topological-based evolutionary algorithms suggested in the literature to cope with noisy PPINs. The design of the evolutionary algorithm is extended based on the functional domain of the proteins rather than on the topological domain of the PPIN. The gene ontology annotation in each molecular function, biological proce
... Show MoreBy definition, the detection of protein complexes that form protein-protein interaction networks (PPINs) is an NP-hard problem. Evolutionary algorithms (EAs), as global search methods, are proven in the literature to be more successful than greedy methods in detecting protein complexes. However, the design of most of these EA-based approaches relies on the topological information of the proteins in the PPIN. Biological information, as a key resource for molecular profiles, on the other hand, acquired a little interest in the design of the components in these EA-based methods. The main aim of this paper is to redesign two operators in the EA based on the functional domain rather than the graph topological domain. The perturb
... Show MoreObjective: Detection the presumptive prevalence of
silent celiac disease in patients with type 1 diabetes
mellitus with determination of which gender more
likely to be affected.
Methods: One hundred twenty asymptomatic patients
[75 male , 45 female] with type 1 diabetes mellitus
with mean age ± SD of 11.25 ± 2.85 year where
included in the study . All subjects were serologically
screened for the presence of anti-tissue transglutaminase
IgA antibodies (anti-tTG antibodies) by Enzyme-
Linked Immunosorbent Assay (ELISA) & total IgA
was also measured for all using radial
immunodiffusion plate . Anti-tissue transglutaminase
IgG was selectively done for patients who were
expressing negative anti-
Objective: Detection the presumptive prevalence of silent celiac disease in patients with type 1 diabetes mellitus with determination of which gender more likely to be affected.
Methods: One hundred twenty asymptomatic patients [75 male , 45 female] with type 1 diabetes mellitus with mean age ± SD of 11.25 ± 2.85 year where included in the study . All subjects were serologically screened for the presence of anti-tissue transglutaminase IgA antibodies (anti-tTG antibodies) by Enzyme-Linked Immunosorbent Assay (ELISA) & total IgA was also measured for all using radial immunodiffusion plate . Anti-tissue transglutaminase IgG was selectively done for patients who were expressing negative anti-tissue transglutaminase IgA with low tot
In this study, industrial fiber and polymer mixtures were used for high-speed impact (ballistic) applications where the effects of polymer (epoxy), polymeric
mixture (epoxy + unsaturated polyester), synthetic rubber (polyurethane), Kevlar fiber, polyethylene fiber (ultra High molecular weight) and carbon fiber.
Four successive systems of samples were prepared. the first system component made of (epoxy and 2% graphene and 20 layer of fiber), then ballistic test was
applied, the sample was successful in the test from a distance of 7 m. or more than, by using a pistol personally Glock, Caliber of 9 * 19 mm. The second
system was consisting of (epoxy, 2% graphene, 36 layers of fiber and one layer of hard rubber), it was succeeded
A steganography hides information within other information, such as file, message, picture, or video. A cryptography is the science of converting the information from a readable form to an unreadable form for unauthorized person. The main problem in the stenographic system is embedding in cover-data without providing information that would facilitate its removal. In this research, a method for embedding data into images is suggested which employs least significant bit Steganography (LSB) and ciphering (RSA algorithm) to protect the data. System security will be enhanced by this collaboration between steganography and cryptography.