Intrusion detection system is an imperative role in increasing security and decreasing the harm of the computer security system and information system when using of network. It observes different events in a network or system to decide occurring an intrusion or not and it is used to make strategic decision, security purposes and analyzing directions. This paper describes host based intrusion detection system architecture for DDoS attack, which intelligently detects the intrusion periodically and dynamically by evaluating the intruder group respective to the present node with its neighbors. We analyze a dependable dataset named CICIDS 2017 that contains benign and DDoS attack network flows, which meets certifiable criteria and is openly accessible. It evaluates the performance of a complete arrangement of machine learning algorithms and network traffic features to indicate the best features for detecting the assured attack classes. Our goal is storing the address of destination IP that is utilized to detect an intruder by method of misuse detection.
An experimental study was performed to estimate the forced convection heat transfer performance and the pressure drop of a single layer graphene (GNPs) based DI-water nanofluid in a circular tube under a laminar flow and a uniform heat flux boundary conditions. The viscosity and thermal conductivity of nanofluid at weight concentrations of (0.1 to 1 wt%) were measured. The effects of the velocity of flow, heat flux and nanoparticle weight concentrations on the enhancement of the heat transfer are examined. The Nusselt number of the GNPs nanofluid was enhanced as the heat flux and the velocity of flow rate increased, and the maximum Nusselt number ratio (Nu nanofluid/ Nu base fluid) and thermal performance factor
... Show MoreBackground: Beta thalassemia major (β-TM) is an inheritable condition with many complications, especially in children. The blood-borne viral infection was proposed as a risk factor due to the recurrent blood transfusion regimen (hemotherapy) as human parvovirus B19 (B19V). Objective: This study investigated the B19V seroprevalence, DNA presence, B19V viral load, and B19V genotypes in β-TM patients and blood donors. Methods: This is a cross-sectional study incorporating 180 subjects, segregated into three distinct groups each of 60 patients, namely control, β-TM, and β-TM infected with Hepatitis C Virus (HCV). For the B19V prevalence in the studied group, the ELISA technique and real-time PCR were used. The genotyping was follo
... Show MoreCisplatin (CP), a platinum compound, is one of the most active cytotoxic drugs used for cancer treatment. Nephrotoxicity is severe dose limiting side effect of this drug. Abnormal production of reactive oxygen species (ROSs) leading to oxidative stress has been implicated in kidney toxicity by Cisplatin. Here the study was aimed to evaluate nephroprotective effect of ethanolic extract of Terminalia arjuna bark (EETAB) at the doses (200 & 400 mg/kg, body weight) against Cisplatin (7.5 mg/kg, i.p) induced nephrotoxicity in rats. The evaluation was done by measuring % change in body weight, renal function tests such as Blood Urea Nitrogen (BUN), Serum Creatinine (Cr), Serum Total Protein (TP) and also Kidney SOD (Super
... Show MoreBackground: Entamoeba histolytica is the causative agent of amoebic dysentery and hepatic abscesses. Despite the efficacy of metronidazole in alleviating infectious diseases, the global dissemination of drug-resistant parasites raises the possibility that Punica granatum could serve as an effective natural alternative treatment. Objective: To evaluate the effect of P. granatum methanolic and aqueous extracts of various parts against E. histolytica trophozoites in an in vitro setting. Methods: Various concentrations (0.14, 0.7, 1.4, and 2.8 mg/ml) of P. granatum extracts of the flowers, leafs, peels, and seeds were chosen for this purpose. A culture medium containing 0.05x106/ml E. histolytica trophozoites was treated with different
... Show MoreBackground: Cleaning and shaping of root canals successfully requires high volumes of irrigation solutions that can only be applied to the apical third of root canal after enlargement with instrument, so the aim of this study was to evaluate and to compare the efficiency of Maxi-I-probe (side-vented needle), in the amount of root canal irrigant penetration for five different master apical file sizes (MAF) and four different degrees of coronal and middle thirds flaring. Materials and Methods: Two hundred resin blocks with simulated root canals were used in this study and divided into 5 major groups (40 for each) based on the size of master apical files (#20, #25, #30, #35, and #40). Each major group was subdivided into 4 subgroups depending
... Show MoreBackground: The repair of bone defects remains a major clinical orthopaedic challenge. Bone is a highly vascularised tissue reliant on the close spatial and temporal connection between blood vessels and bone cells to maintain skeletal integrity. Angiogenesis thus plays a pivotal role in skeletal development and bone fracture repair. The role of angiogenic and osteogenic factors in the adaptive response and interaction of osteoblasts and endothelial cells during the multi step process of bone development and repair will be highlighted in this study. This study aimed to identify the role of local exogenous vascular endothelial growth factor in bone healing and to analyze the expression of VEGF by immunohistochemistry in created bone defect af
... Show MoreThe aim of the study was extraction of arial part of Euphorbia cyathophora constituents with methanol and evaluate its effect on mitotic index and total chromosomal aberration bone marrow cell and spleen cell in mice 200 gm of E. cyathophora fine powder was defatted then extracted by cold maceration 80% ethanol for seven days. The extract was filtered and dried in a rotary evaporator then the dried extract was suspended with water and consecutively extracted using chloroform, ethyl acetate for each. The aqueous layer was then mixed with 100ml methanol. These fractions are dried under reduced pressure to obtain the dry extract. Twenty-four Albino mice were used for the experiment. The animals were divided into four groups: Gr
... Show MoreUsing watermarking techniques and digital signatures can better solve the problems of digital images transmitted on the Internet like forgery, tampering, altering, etc. In this paper we proposed invisible fragile watermark and MD-5 based algorithm for digital image authenticating and tampers detecting in the Discrete Wavelet Transform DWT domain. The digital image is decomposed using 2-level DWT and the middle and high frequency sub-bands are used for watermark and digital signature embedding. The authentication data are embedded in number of the coefficients of these sub-bands according to the adaptive threshold based on the watermark length and the coefficients of each DWT level. These sub-bands are used because they a
... Show More