Intrusion detection system is an imperative role in increasing security and decreasing the harm of the computer security system and information system when using of network. It observes different events in a network or system to decide occurring an intrusion or not and it is used to make strategic decision, security purposes and analyzing directions. This paper describes host based intrusion detection system architecture for DDoS attack, which intelligently detects the intrusion periodically and dynamically by evaluating the intruder group respective to the present node with its neighbors. We analyze a dependable dataset named CICIDS 2017 that contains benign and DDoS attack network flows, which meets certifiable criteria and is openly accessible. It evaluates the performance of a complete arrangement of machine learning algorithms and network traffic features to indicate the best features for detecting the assured attack classes. Our goal is storing the address of destination IP that is utilized to detect an intruder by method of misuse detection.
The synthesis of new benzodiazepine, imidazole, isatin, maleimide, pyrimidine and 1,2,4-triazole derived from 2-amino-4-hydroxy-1,3,5-triazine, via its cyclocondensation reaction with different organic reagents, is described. FT-IR, 1H-NMR and as well as 13C-NMR spectra disclosed the structures of the precursors and heterocyclic derivatives formed.
Abstract
Performance evaluation is of great importance in all countries of the world, because it has a prominent and effective role in determining the efficiency and effectiveness of the optimal use of available resources, which are rare and important in achieving the desired objectives. With the continued growth of public spending and the limited resources, the State seeks to achieve its objectives through its units with minimal expenditure or deficit, rationality and wastefulness in the spending. In many countries, particularly developing countries, reforms are made in the public sector to achieve that goal through the adoption of IPSAS, which is reflected in the developmen
... Show MoreThis research, involved synthesis of some new 1,2,3-triazoline and 1,2,3,4- tetrazole derivatives from antharanilic acid as starting material .The first step includes formation of 2-Mercapto-3-phenyl-4(3H)Quinazolinone (0) through reacted of anthranilic acid with phenylisothiocyanate in ethanol, then compound (0) reaction with chloro acetyl chloride in dimethyl foramamide (DMF) to prepare intermediate S-(α-chloroaceto-2-yl)-3-phenylquinazolin-4(3H)-one (1); compound (1) reacted with sodium azide to yield S-(α-azidoaceto-2-yl)-3-phenylquinazolin-4(3H)-one (2), while Schiff bases (3-10) were prepared from condensation of substituted primary aromatic amines with different aromatic aldehydes in absolute ethanol as a solvent. Compound (2)
... Show MoreThe research aims to know the effectiveness of a training program based on multiple intelligence theory in developing literary thinking among students of the Arabic Language Department at Ibn Rushd School of Humanities and to achieve the goal of research, the Safaris Research Institute, and the research community of Arabic language students in the Faculty of Education the third section of Arabic Language: The research sample consists of (71) students. Divided into (35) students in the experimental group and (36) students in the control group, the researcher balanced between the two groups with variables (intelligence, testing of tribal literary thinking, and time age in months), and after using the T-test for two independent samples, the
... Show MoreIn this paper , an efficient new procedure is proposed to modify third –order iterative method obtained by Rostom and Fuad [Saeed. R. K. and Khthr. F.W. New third –order iterative method for solving nonlinear equations. J. Appl. Sci .7(2011): 916-921] , using three steps based on Newton equation , finite difference method and linear interpolation. Analysis of convergence is given to show the efficiency and the performance of the new method for solving nonlinear equations. The efficiency of the new method is demonstrated by numerical examples.
Abstract
In this paper, fatigue damage accumulation were studied using many methods i.e.Corton-Dalon (CD),Corton-Dalon-Marsh(CDM), new non-linear model and experimental method. The prediction of fatigue lifetimes based on the two classical methods, Corton-Dalon (CD)andCorton-Dalon-Marsh (CDM), are uneconomic and non-conservative respectively. However satisfactory predictions were obtained by applying the proposed non-linear model (present model) for medium carbon steel compared with experimental work. Many shortcomings of the two classical methods are related to their inability to take into account the surface treatment effect as shot peening. It is clear that the new model shows that a much better and cons
... Show MoreThe present study aims to explore the effectiveness of a proposed study unit based on the funds of knowledge theory in developing the attitudes towards cultural identity and the proposed study unit. In order to achieve the goal of the study, the two researchers followed the quasi-experimental approach, where the study sample consisted of (28) female students of the fifth-grade at Al-Jeelah Basic Education School, Al-Dakhiliyah Governorate in the Sultanate of Oman. The data were collected by two scales: the first is a scale of attitudes towards cultural identity consisting of (26) items. The second was a scale of attitudes towards the proposed study unit, which consisted of (24) items. The results of the study revealed that the effect of
... Show MoreIn regression testing, Test case prioritization (TCP) is a technique to arrange all the available test cases. TCP techniques can improve fault detection performance which is measured by the average percentage of fault detection (APFD). History-based TCP is one of the TCP techniques that consider the history of past data to prioritize test cases. The issue of equal priority allocation to test cases is a common problem for most TCP techniques. However, this problem has not been explored in history-based TCP techniques. To solve this problem in regression testing, most of the researchers resort to random sorting of test cases. This study aims to investigate equal priority in history-based TCP techniques. The first objective is to implement
... Show MoreAkaike’s Information Criterion (AIC) is a popular method for estimation the number of sources impinging on an array of sensors, which is a problem of great interest in several applications. The performance of AIC degrades under low Signal-to-Noise Ratio (SNR). This paper is concerned with the development and application of quadrature mirror filters (QMF) for improving the performance of AIC. A new system is proposed to estimate the number of sources by applying AIC to the outputs of filter bank consisting quadrature mirror filters (QMF). The proposed system can estimate the number of sources under low signal-to-noise ratio (SNR).