The major of DDoS attacks use TCP protocol and the TCP SYN flooding attack is the most common one among them. The SYN Cookie mechanism is used to defend against the TCP SYN flooding attack. It is an effective defense, but it has a disadvantage of high calculations and it doesn’t differentiate spoofed packets from legitimate packets. Therefore, filtering the spoofed packet can effectively enhance the SYN Cookie activity. Hop Count Filtering (HCF) is another mechanism used at the server side to filter spoofed packets. This mechanism has a drawback of being not a perfect and final solution in defending against the TCP SYN flooding attack. An enhanced mechanism of Integrating and combining the SYN Cookie with Hop Count Filtering (HCF) mechanism is proposed to protect the server from TCP SYN flooding. The results show that the defense against SYN flood DDoS attack is enhanced, since the availability of legitimate packets is increased and the time of SYN Cookie activity is delayed.
The content of Furocoumarin derivatives (Psoralens) of Ruta Chalepensis L. (Whole plant) was studied by simple extraction with petroleum ether (b.p. 60-80Co). The results indicated that the plant contains a total of about (0.015%).
Investigation of these compounds by thin layer chromatography (TLC) revealed the presence of at least four compounds of which methoxsalen (8-methoxypsoralen) was isolated. It was identified and authenticated with a standard by spectral method, IR, NMR, Mass spectra and HPLC.This plant could be considered as a good source for supplying this compound, which is widely used in dermatological preparations.
This paper presents stochastic analysis using the perturbation method to model the structure of a container to verify the distributions of probability of maximum and minimum axial forces reactions in piles. The proposed simulation of a container port terminal under 11 scenarios of load combinations was presented. The probability distributions for live loads are assigned according to the input parameters of simulation data. Part of the load itself is implicitly combined such as vertical live load which includes the weight of equipment and containers and wind load. The structural model was simulated in the software STAAD Pro., while the statistical analyses were performed with MATLAB. The results demonstrated that, the most significant extern
... Show MoreThe present study analyzes the violation of the strategies of conversation in two English plays namely Richard II and King Lear. The present study tries to achieve the following goals: 1. showing how the strategies of real conversation can be applied to conversation in plays. 2. analyzing how the characters communicate with each other to discover how Shakespeare violates the strategies of conversation in depicting his characters. The study has been conducted on the bases of the following hypotheses:
- The strategies of conversation which are derived from the study of natural conversation can be applied to conversation in drama with some modification for dramatic purposes.
The transition of professionals between different sectors is considered as one of sources of
acquisition of technology and will lead to add the practical experience to them. This experience
depending on different factors like: the scientific degree and practical experience by the
professionals, the technology possessed by the transferor sector, the duration that spent by
experienced in transferor sector, the type of work performed by professional….etc.
The research aims to verify the affect of these factors in technology transfer process.
Research reached that the technology transfer process which is depending on the Iraqi competencies
in work is unsatisfied level between Iraqi organizations because there are dif
Objectives: The aim of the study was, to assess the nurse's role regarding cardiovascular drug
administration in Erbil city.
Methodology: A descriptive survey was conducted in Hawler teaching and Rizgari teaching Hospitals. The
number of samples is 50 nurses; the period of the study was started from 15th of November 2008 up to
the end of March 2009. A questionnaire was developed by investigators based on extensive review of
available studies and literatures. Data were collected through application of observational check list
consist of two part, part one was demographic sheet and part two about nurse’s responsibility regarding
medication administration which include (before, during, after drug administration). Data
Many behavioral researchers pointed out the importance of relaxation techniques in the treatment of different psychological disorders where find the importance of these techniques in reducing anxiety and stress and the resulted of behaviors and habits, with the development of these techniques are being used to gain public health, whether mental health or physical or mentality, and one of these techniques is music therapy that reduces tension and anxiety and operates a state of relaxation, which is used in the treatment of patients of dental clinic.
Re
... Show Morein this paper sufficient conditions of oscillation of all of nonlinear second order neutral differential eqiation and sifficient conditions for nonoscillatory soloitions to onverage to zero are obtained
Leishmania is the causative agent of leishmaniasis, a widely distributed disease. Amastigote forms of Leishmania are intracellular and reside within the macrophage of the vertebrate host. Previous studies showed that certain Leishmania species may scavenge host factors for survival, specially sphingolipids, the key element of the eukaryotic membranes. In this study we have investigated the survival of new world L. mexicana amastigotes in murine macrophage cell-line in the presence and absence of foetal bovine serum (FBS). Results showed that there was no significance in the infectivity of amastigotes and also the number of parasite per cell; such findings suggest that L. mexicana amastigotes have its own pathway of sphingolipid intake and c
... Show More