Intrusion detection system is an imperative role in increasing security and decreasing the harm of the computer security system and information system when using of network. It observes different events in a network or system to decide occurring an intrusion or not and it is used to make strategic decision, security purposes and analyzing directions. This paper describes host based intrusion detection system architecture for DDoS attack, which intelligently detects the intrusion periodically and dynamically by evaluating the intruder group respective to the present node with its neighbors. We analyze a dependable dataset named CICIDS 2017 that contains benign and DDoS attack network flows, which meets certifiable criteria and is openly accessible. It evaluates the performance of a complete arrangement of machine learning algorithms and network traffic features to indicate the best features for detecting the assured attack classes. Our goal is storing the address of destination IP that is utilized to detect an intruder by method of misuse detection.
The current study aims to develop a proposed educational program based on augmented reality (AR) technology, in addition to assessing its effectiveness in developing research and historical imagination skills of the Humanities Track's female students at the secondary stage, as well as assessing the correlative and predictive relationships between the amount of growth for the two dependent variables. To achieve this, a secondary school in the city of Makkah Al-Mukarramah was chosen, and an available random sample of (30) female students from the study population was selected. The quasi-experimental approach was followed by this study, particularly one group design. In addition, two tools were used to collect study data, namely: a test of
... Show MoreThe research presented the experience of creating a new sustainable city, and this experience of establishing an Eco-City (Environmentally friendly) is considered the first experience in Iraq. The current study stressed the importance of the need for environmental planning in the early stages of planning new cities based on realism in planning, design and implementation. Subsequently, that aims to preserve the ecosystem, which is difficult to compensate if degraded or polluted. The research incorporated environmental planning indicators within sustainable urban planning (Reliance on generating electric power that is based on clean and renewable energy sources, Availability of public t
Climate change causes water shortage (water scarcity) in addition to the dams built by neighboring countries, which caused a lack of Iraq's water share. Therefore, evaluating the irrigation system requires considering its suitability, adequacy, and efficiency. Irrigation is considered adequate when it maintains water availability within the root zone, and if the amount to be added is determined, irrigation efficiency becomes possible by avoiding water loss. Babil Governorate is considered one of the agricultural governorates in the country that depends on its irrigation from Shatt Al-Hilla. The study area is the Elaj project. Three fields were selected for the project (B1, B2, and B3). These fields are lo
... Show MoreThis research examines the factors which influence pedestrian's walking speed in Baghdad. the variations in walking speed of pedestrians are related to pedestrian characteristics such as gender, age group, and clothing traditions. Using the established methodology, the counts of pedestrians were performed using manual and video counting. The case study was performed in two streets located in a highly crowded commercial zone at the city center of Baghdad: Al-Karada Dakhel and Al- Sina’a Street. Data were subjected to statistical analysis using IBM SPSS Statistics 19 software. It has been found that Iraqi pedestrians walk slower than other pedestrians in the developed countries or in the region with minimum walking speed of 29.85 m/min.
... Show MoreImpact of buildings in Iraq and other countries on the environment is obvious; this problem began to take scientific and humanitarian dimensions in order to reduce and eliminate this problem. This impact can be seen through the energy, water and raw materials consumed for the establishment, operation and maintenance of these buildings, as well as the emissions of hazardous gases and generations of solid wastes.
This work was conducted to assess the current maintenance managerial practice for the governmental buildings to stand on the main obstacle and extrapolation of measures by means of interviews with experts to determine the effective factors and closed questionnaire to state the features and the need for new
... Show MoreMineral filler is one of important materials and affecting on properties and quality of asphalt mixtures .There are different types of mineral filler depended on cost and quality , the matter encourages us to achieve this study to evaluate hydrated lime filler effects on properties of asphalt mixes related with strength and durability. Conventional asphaltic concrete mixtures with Portland cement and soft sandstone fillers and mixtures modified with hydrated lime were evaluated for their fundamental engineering properties as defined by Marshall properties , index of retained strength , indirect tensile strength , permanent deformation characteristics , and fatigue resistance .A typical dense graded mixture employed in construction
... Show MoreMany trials were made to prepare Tinidazole 2% as bioadhesive vaginal gels using different gel bases including hydroxypropyl methyl cellulose (3 and 4% w/w), methylcellulose (3 and 4%w/w) and carboxymethylcellulose (2 and 3% w/w) .Swelling index of the polymers,pH , viscosity , bioadhesive force , and in-vitro drug release to the simulating vaginal fluid (S.V.F.) were investigated for all the prepared bioadhesive gels . The mechanism of drug release from the gel bases was also investigated.
The results revealed that C MC 3% gave the highest viscosity and bioadhesive strength with the lowest release rate while lowest viscosity and bioadhesive force
... Show MoreFinger vein recognition and user identification is a relatively recent biometric recognition technology with a broad variety of applications, and biometric authentication is extensively employed in the information age. As one of the most essential authentication technologies available today, finger vein recognition captures our attention owing to its high level of security, dependability, and track record of performance. Embedded convolutional neural networks are based on the early or intermediate fusing of input. In early fusion, pictures are categorized according to their location in the input space. In this study, we employ a highly optimized network and late fusion rather than early fusion to create a Fusion convolutional neural network
... Show More