Botnet is a malicious activity that tries to disrupt traffic of service in a server or network and causes great harm to the network. In modern years, Botnets became one of the threads that constantly evolving. IDS (intrusion detection system) is one type of solutions used to detect anomalies of networks and played an increasing role in the computer security and information systems. It follows different events in computer to decide to occur an intrusion or not, and it used to build a strategic decision for security purposes. The current paper
Cryptography is a method used to mask text based on any encryption method, and the authorized user only can decrypt and read this message. An intruder tried to attack in many manners to access the communication channel, like impersonating, non-repudiation, denial of services, modification of data, threatening confidentiality and breaking availability of services. The high electronic communications between people need to ensure that transactions remain confidential. Cryptography methods give the best solution to this problem. This paper proposed a new cryptography method based on Arabic words; this method is done based on two steps. Where the first step is binary encoding generation used t
... Show MoreThe messages are ancient method to exchange information between peoples. It had many ways to send it with some security.
Encryption and steganography was oldest ways to message security, but there are still many problems in key generation, key distribution, suitable cover image and others. In this paper we present proposed algorithm to exchange security message without any encryption, or image as cover to hidden. Our proposed algorithm depends on two copies of the same collection images set (CIS), one in sender side and other in receiver side which always exchange message between them.
To send any message text the sender converts message to ASCII c
... Show MoreA novel median filter based on crow optimization algorithms (OMF) is suggested to reduce the random salt and pepper noise and improve the quality of the RGB-colored and gray images. The fundamental idea of the approach is that first, the crow optimization algorithm detects noise pixels, and that replacing them with an optimum median value depending on a criterion of maximization fitness function. Finally, the standard measure peak signal-to-noise ratio (PSNR), Structural Similarity, absolute square error and mean square error have been used to test the performance of suggested filters (original and improved median filter) used to removed noise from images. It achieves the simulation based on MATLAB R2019b and the resul
... Show MoreAuthentication is the process of determining whether someone or something is, in fact, who or what it is declared to be. As the dependence upon computers and computer networks grows, the need for user authentication has increased. User’s claimed identity can be verified by one of several methods. One of the most popular of these methods is represented by (something user know), such as password or Personal Identification Number (PIN). Biometrics is the science and technology of authentication by identifying the living individual’s physiological or behavioral attributes. Keystroke authentication is a new behavioral access control system to identify legitimate users via their typing behavior. The objective of this paper is to provide user
... Show MoreToday with increase using social media, a lot of researchers have interested in topic extraction from Twitter. Twitter is an unstructured short text and messy that it is critical to find topics from tweets. While topic modeling algorithms such as Latent Semantic Analysis (LSA) and Latent Dirichlet Allocation (LDA) are originally designed to derive topics from large documents such as articles, and books. They are often less efficient when applied to short text content like Twitter. Luckily, Twitter has many features that represent the interaction between users. Tweets have rich user-generated hashtags as keywords. In this paper, we exploit the hashtags feature to improve topics learned
The current study, which extended from February 2020 to June 2021 at the University of Thi- Qar\ College of Education for Pure Sciences, aimed to follow the changes in external morphological features at different Embryonic Developmental stages in pregnant mice treated with different doses of Rapamycin (Rapa). Use In this study, 32 pregnant mice were divided randomly into four groups, each of which had eight pregnant mice. Each group received different dose of Rapa via intraperitoneally injection at different gestation days until the end of the specified periods, whereas the control group received a DMSO. Mice were administered under the same circumstances and dosages were determined based on body weight, as specified in pharmaceutical const
... Show MoreBackground: habit is any purposeless action repeated unconsciously. It is a sign of lack of harmony between the subject and the surrounding environment. Deleterious oral habits such as finger sucking could be one of the etiological factors for altered oro-facial growth development. This study conducted to explore the association between finger sucking habit and malocclusion in deciduous dentition. Materials and method: Totally 40 chronic thumb sucker and 40 controls matching in age and gender were enrolled in the study. A study conducted by verifying different occlusal trait through the intra-oral examination. Thumb sucking habit diagnosed using data gathered from parents. Results: The statistical analysis showed a highly significant dif
... Show MoreThis work deals with the study of the morphodynamics, history of development of landforms and the origin of the Ga’ara depression. The depression is a suboval erosional topographic feature extending in E-Wdirection and located about 50 km north of Rutba Town, at the Western Desert of Iraq. The area is characterized by fresh and clean surfaces, scarcity of vegetation, abundance of rills, intense drainage and immature soil. These clues indicate that the erosion in the study area is effective. Four types of erosion features are recognized in this area namely sheet, rill, badland and wind erosion. The extent of the wind erosion depends on its position in relation to the prevailing wind direction. Water, wind and gravity are the main agents of
... Show MoreThe imperative of achieving financial stability has transcended national boundaries, necessitating heightened attention from both researchers and policymakers. Consequently, this article delves into an examination of the impact of government debt and public debt on financial development within the context of Iraq. The study employs monetary policy, interest rate, inflation, and population growth as control variables to prognosticate financial development. Utilizing data extracted from the World Development Indicators (WDI) spanning the period from 1995 to 2022, the study employs the dynamic autoregressive distributed lag (DARDL) approach to scrutinize the associations under investigation. The findings underscore a negative association betwe
... Show More