Intrusion detection system is an imperative role in increasing security and decreasing the harm of the computer security system and information system when using of network. It observes different events in a network or system to decide occurring an intrusion or not and it is used to make strategic decision, security purposes and analyzing directions. This paper describes host based intrusion detection system architecture for DDoS attack, which intelligently detects the intrusion periodically and dynamically by evaluating the intruder group respective to the present node with its neighbors. We analyze a dependable dataset named CICIDS 2017 that contains benign and DDoS attack network flows, which meets certifiable criteria and is openly accessible. It evaluates the performance of a complete arrangement of machine learning algorithms and network traffic features to indicate the best features for detecting the assured attack classes. Our goal is storing the address of destination IP that is utilized to detect an intruder by method of misuse detection.
Objective:To measure the acceptance level of the Personal Digital Assistance (PDA)’suse among nursing students as a tool of education in the Kingdom of Saudi Arabia. Methodology: Eighty-nine nursing students participated in this cross-sectional descriptive study by completing a questionnaire based on the Technology Acceptance Model (TAM) by Davis. Two dimensions were explored and evaluated; (1) the applicability of the TAM model in assessing this technology; and (2) the overall percentage of students’ agreement on the different TAM variables. Results: This study presented significant positive influence bet
Background: Denture cleansing is an important step that can prevent the spread of infection and improve a patient's health, the durability of the dentures, and the overall quality of life; therefore, it is necessary to choose a suitable cleanser that, in addition to being effective, does not have an unfavorable effect on the qualities of the denture base resin itself when used for an extended period. Aim: This research aims to assess the effects of ozonated water on the surface roughness and hardness of heat-cured acrylic resin by immersion technique. Materials: Sixty bars shapemade of heat-cured acrylicweremanufactured.Thirty samples for every test, including: (surface hardness and surface roughness). Then, these samples were divided into
... Show MoreSelexipag is an orally selective long-acting prostacyclin receptor agonist, which indicated for the treatment of pulmonary arterial hypertension. It is practically insoluble in water ( class II, according to BCS). This work aims to prepare and optimized Selexipag nanosuspensions to achieve an enhancement in the in vitro dissolution rate. The solvent antisolvent precipitation method was used for the production of nanosuspension, and the effect of formulation parameters (stabilizer type, drug: stabilizer ratio, and use of co-stabilizer) and process parameter (stirring speed) on the particle size and polydispersity index were studied. SLPNS prepared with Soluplus® as amain stabilizer (F15) showed the smallest particle size 47nm wi
... Show MoreMetal-organic frameworks (MOFs) are a relatively new class of materials of unique porous structures and exceptional properties. Currently, more than 110,000 types of MOFs have been reported among the countless possibilities. In this study, we have synthesised a novel MOF using zirconium chloride as the metal source and 4,4'-dicarboxy-2,2'-biquinoline (bicinchoninic acid disodium salt) as the linker, which reacted in N,N-Dimethylformamide (DMF) solvent. Three preparation methods were employed to prepare five types of the MOF, and they were compared to optimize the synthesis conditions. The resulting MOFs, named Zr-BADS, were characterised using scanning electron microscopy (SEM), energy dispersive spectroscopy (EDS), microscopy, and
... Show MoreWireless Body Area Sensor Network (WBASN) is gaining significant attention due to its applications in smart health offering cost-effective, efficient, ubiquitous, and unobtrusive telemedicine. WBASNs face challenges including interference, Quality of Service, transmit power, and resource constraints. Recognizing these challenges, this paper presents an energy and Quality of Service-aware routing algorithm. The proposed algorithm is based on each node's Collaboratively Evaluated Value (CEV) to select the most suitable cluster head (CH). The Collaborative Value (CV) is derived from three factors, the node's residual energy, the distance vector between nodes and personal device, and the sensor's density in each CH. The CEV algorithm operates i
... Show MoreSymmetric cryptography forms the backbone of secure data communication and storage by relying on the strength and randomness of cryptographic keys. This increases complexity, enhances cryptographic systems' overall robustness, and is immune to various attacks. The present work proposes a hybrid model based on the Latin square matrix (LSM) and subtractive random number generator (SRNG) algorithms for producing random keys. The hybrid model enhances the security of the cipher key against different attacks and increases the degree of diffusion. Different key lengths can also be generated based on the algorithm without compromising security. It comprises two phases. The first phase generates a seed value that depends on producing a rand
... Show MoreThe research aims to identify the academic problems of family counseling diploma students at Saudi Universities. In addition, to identify the differences in these problems according to gender, marital status, place of study, academic specialization, and GPA. The sample consisted of (491) students. The researcher has used one questionnaire for academic problems prepared by the researcher. The research revealed the following results: There were academic problems among family counseling diploma students at Saudi Universities, the most problems were related to the systems and administrations of the university, then the field training, the buildings, classrooms and campus facilities, then the academic courses, after that the exams, then
... Show MoreLED is an ultra-lightweight block cipher that is mainly used in devices with limited resources. Currently, the software and hardware structure of this cipher utilize a complex logic operation to generate a sequence of random numbers called round constant and this causes the algorithm to slow down and record low throughput. To improve the speed and throughput of the original algorithm, the Fast Lightweight Encryption Device (FLED) has been proposed in this paper. The key size of the currently existing LED algorithm is in 64-bit & 128-bit but this article focused mainly on the 64-bit key (block size=64-bit). In the proposed FLED design, complex operations have been replaced by LFSR left feedback technology to make the algorithm perform more e
... Show More