The major of DDoS attacks use TCP protocol and the TCP SYN flooding attack is the most common one among them. The SYN Cookie mechanism is used to defend against the TCP SYN flooding attack. It is an effective defense, but it has a disadvantage of high calculations and it doesn’t differentiate spoofed packets from legitimate packets. Therefore, filtering the spoofed packet can effectively enhance the SYN Cookie activity. Hop Count Filtering (HCF) is another mechanism used at the server side to filter spoofed packets. This mechanism has a drawback of being not a perfect and final solution in defending against the TCP SYN flooding attack. An enhanced mechanism of Integrating and combining the SYN Cookie with Hop Count Filtering (HCF) mechanism is proposed to protect the server from TCP SYN flooding. The results show that the defense against SYN flood DDoS attack is enhanced, since the availability of legitimate packets is increased and the time of SYN Cookie activity is delayed.
The leaves of globe artichoke, Cynara scolymus Family Asteraceae/ compositea have long – used in traditional medicine and now included in British and European Pharmacopeia, the British Harbal Pharmacopeia and complete German Commission E monographs.The plant originally comes from Mediterranean region and North Africa and cultivated around the world. The flowers are used worldwide for nutrition purposes and the leaves for medical purposes including hepatic affections. The plant wildly distributed in Iraq in the watery lines and boundary of the field.The plant contains many phytochemicals such as the bitter phenolic acids whose choleretic and hypocholestremic as these compounds are antioxidant. Other materials to h
... Show MoreThe research aims to know the impact of workers values on their performance which is reflected on increasing productivity and improving its quality as well as the organization's progress and success. Application of this research took place in the General Company Of Electrical Industries; it contained four main pillars; the first involved research methodology، regarding the problem، importance، aim، basic theory، and method of data collection، the second is dedicated to the theoretical framework related to the research basic variables (values and workgroups) the third is assigned to analyze the actual data by using number of statistical methods، such as mathematical medium and standard deviation and also spearman rank
... Show MoreThe research tackles the nature of relationship between the Orthodox Church and the state in the Russian Federation. At the beginning of the nineties of the last century, the church had been performed a different role in its relationship with the state, and it had an effect over the internal and foreign policies for the Russian Federation. In political history of Russia, the church’s existence became an evident too much in comparing with the previous historical period, starting with the educational and political system, whether through a symbolic participating roles as what happened in the inauguration ceremony to take over responsibility of the head of state or taking actual roles such as influencing on the process of holding elections d
... Show MoreThe internationalization of the Libyan crisis and its accompanying militarization of the conflict have played a vital role in hindering to reach a comprehensive political settlement solution in Libya. The increasing international greediness in the Libyan energy resources and the geopolitical importance of the Libyan State led to the involvement of many international and regional powers in this crisis and transformed the Libyan crisis into “proxy war”. Moreover, the Turkish direct military intervention in the Libyan crisis is considered as one of the main constraints facing the international and regional efforts to settle the Libyan crisis as a result of the Turkish insistence on its military existence in Libya to preserve i
... Show MoreIncreased interest in the subject of the image because of its great and growing link to the life of the individual and society and its impact on the overall political, economic and cultural conditions. This interest is no longer confined to the images of people or institutions, but has become beyond that to the images of countries and peoples and the impact on bilateral relations between them,
However, we find that the image of the Iraqi abroad remained vague and has not been scientifically recognized and the most that we can generalize are the features of the image of Arabs and Muslims abroad; and assume that the image of the Iraqi applies to them as the Iraqi is in the end an Arab or Muslim.
Based on this, the research
... Show MoreWireless networks and communications have witnessed tremendous development and growth in recent periods and up until now, as there is a group of diverse networks such as the well-known wireless communication networks and others that are not linked to an infrastructure such as telephone networks, sensors and wireless networks, especially in important applications that work to send and receive important data and information in relatively unsafe environments, cybersecurity technologies pose an important challenge in protecting unsafe networks in terms of their impact on reducing crime. Detecting hacking in electronic networks and penetration testing. Therefore, these environments must be monitored and protected from hacking and malicio
... Show MoreNowadays, internet security is a critical concern; the One of the most difficult study issues in network security is "intrusion detection". Fight against external threats. Intrusion detection is a novel method of securing computers and data networks that are already in use. To boost the efficacy of intrusion detection systems, machine learning and deep learning are widely deployed. While work on intrusion detection systems is already underway, based on data mining and machine learning is effective, it requires to detect intrusions by training static batch classifiers regardless considering the time-varying features of a regular data stream. Real-world problems, on the other hand, rarely fit into models that have such constraints. Furthermor
... Show MoreIn order to scrutinize the impact of the decoration of Sc upon the sensing performance of an XN nanotube (X = Al or Ga, and XNNT) in detecting sarin (SN), the density functionals M06-2X, τ-HCTHhyb, and B3LYP were utilized. The interaction of the pristine XNNT with SN was a physical adsorption with the sensing response (SR) of approximately 5.4. Decoration of the Sc metal into the surface of the AlN and GaN led to an increase in the adsorption energy of SN from −3.4 to −18.9, and −3.8 to −20.1 kcal/mol, respectively. Also, there was a significant increase in the corresponding SR to 38.0 and 100.5, the sensitivity of metal decorated XNNT (metal@XNNT) is increased. So, we found that Sc-decorating more increases the sensitivity of GaNN
... Show MoreIn recent years, there has been expanding development in the vehicular part and the number of vehicles moving on the roads in all the sections of the country. Arabic vehicle number plate identification based on image processing is a dynamic area of this work; this technique is used for security purposes such as tracking of stolen cars and access control to restricted areas. The License Plate Recognition System (LPRS) exploits a digital camera to capture vehicle plate numbers is used as input to the proposed recognition system. Basically, the proposed system consists of three phases, vehicle license plate localization, character segmentation, and character recognition, the License Plate (LP) detection is presented using canny edge detection
... Show MoreThis research depends on the relationship between the reflected spectrum, the nature of each target, area and the percentage of its presence with other targets in the unity of the target area. The changes occur in Land cover have been detected for different years using satellite images based on the Modified Spectral Angle Mapper (MSAM) processing, where Landsat satellite images are utilized using two software programming (MATLAB 7.11 and ERDAS imagine 2014). The proposed supervised classification method (MSAM) using a MATLAB program with supervised classification method (Maximum likelihood Classifier) by ERDAS imagine have been used to get farthest precise results and detect environmental changes for periods. Despite using two classificatio
... Show More