Intrusion detection system is an imperative role in increasing security and decreasing the harm of the computer security system and information system when using of network. It observes different events in a network or system to decide occurring an intrusion or not and it is used to make strategic decision, security purposes and analyzing directions. This paper describes host based intrusion detection system architecture for DDoS attack, which intelligently detects the intrusion periodically and dynamically by evaluating the intruder group respective to the present node with its neighbors. We analyze a dependable dataset named CICIDS 2017 that contains benign and DDoS attack network flows, which meets certifiable criteria and is openly accessible. It evaluates the performance of a complete arrangement of machine learning algorithms and network traffic features to indicate the best features for detecting the assured attack classes. Our goal is storing the address of destination IP that is utilized to detect an intruder by method of misuse detection.
Wireless Body Area Network (WBAN) is a tool that improves real-time patient health observation in hospitals, asylums, especially at home. WBAN has grown popularity in recent years due to its critical role and vast range of medical applications. Due to the sensitive nature of the patient information being transmitted through the WBAN network, security is of paramount importance. To guarantee the safe movement of data between sensor nodes and various WBAN networks, a high level of security is required in a WBAN network. This research introduces a novel technique named Integrated Grasshopper Optimization Algorithm with Artificial Neural Network (IGO-ANN) for distinguishing between trusted nodes in WBAN networks by means of a classifica
... Show MoreAbstract
The current research aims to identify the analysis of the questions for the book of literary criticism for the preparatory stage according to Bloom's classification. The research community consists of (34) exercises and (45) questions. The researcher used the method of analyzing questions and prepared a preliminary list that includes criteria that are supposed to measure exercises, which were selected based on Bloom's classification and the extant literature related to the topic. The scales were exposed to a jury of experts and specialists in curricula and methods of teaching the Arabic language. The scales obtained a complete agreement. Thus, it was adapted to become a reliable instrument in this
... Show MoreThis study has contributed to identify convenience of the land Usifiya of Mahmudiya district baghdad province for the cultivation of sensitive and salt resisting crops and growing pasture .The nine pedons (tracks) of the study have spread over three transects to cover the whole area the north, middle and south .
Depending on Visual Space tupe (TM) for 2007 which is super classified, samples are distributed on all classes of land cover
It is detected the presence of nine series soils namely
MM5- MW96- DM 115 for 1st transect
MF12- DM46 - DM96 for 2nd transect
DM56- DF56 - MW5 for 3rd transect
Soils are classified to the level of sub great group according to (soil Survey Staff) to :
*Typic Torri Fluvents , Typic Haplos
New two experiments of the three factors, in this study were constructed to investigate the effects, of the fixed variations to the box plot on subjects' judgments of the box lengths. These two experiments were constructed as an extension to the group B experiments, the ratio experiments the experiments with two variables carried out previously by Hussin, M.M. (1989, 2006, 2007). The first experiment box notch experiment, and the second experiment outlier values experiment. Subjects were asked to judge what percentage the shorter represented of the longer length in pairs of box lengths and give an estimate of percentage, one being a standard plot and the other being of a different box lengths and
... Show MoreThis study focused on the synthesis of novel polymers incorporating the 1,3,4-oxadiazole ring. Four polymers were specifically prepared by blending polymers (6-9) with polyvinyl alcohol (PVA) in defined ratios, resulting in the formation of blended polymers (10-13). The synthesized polymers were characterized using Fourier Transform Infrared (FTIR) spectroscopy and proton nuclear magnetic resonance (1H-NMR). The results showed that the structure aligned with the proposed synthetic polymers. Furthermore, the physical and thermal properties were studied using scanning electron microscopy (SEM), thermogravimetric analysis (TGA) and Differential Scanning Calorimetry (DSC). Additionally, the biological activity was examined against two s
... Show MoreA novel technique Sumudu transform Adomian decomposition method (STADM), is employed to handle some kinds of nonlinear time-fractional equations. We demonstrate that this method finds the solution without discretization or restrictive assumptions. This method is efficient, simple to implement, and produces good results. The fractional derivative is described in the Caputo sense. The solutions are obtained using STADM, and the results show that the suggested technique is valid and applicable and provides a more refined convergent series solution. The MATLAB software carried out all the computations and graphics. Moreover, a graphical representation was made for the solution of some examples. For integer and fractional order problems, solutio
... Show MoreThis study focused on the synthesis of novel polymers incorporating the 1,3,4-oxadiazole ring. Four polymers were specifically prepared by blending polymers (6-9) with polyvinyl alcohol (PVA) in defined ratios, resulting in the formation of blended polymers (10-13). The synthesized polymers were characterized using Fourier Transform Infrared (FTIR) spectroscopy and proton nuclear magnetic resonance (1H-NMR). The results showed that the structure aligned with the proposed synthetic polymers. Furthermore, the physical and thermal properties were studied using scanning electron microscopy (SEM), thermogravimetric analysis (TGA) and Differential Scanning Calorimetry (DSC). Additionally, the biological activity was examined against two s
... Show MoreCloud computing provides huge amount of area for storage of the data, but with an increase of number of users and size of their data, cloud storage environment faces earnest problem such as saving storage space, managing this large data, security and privacy of data. To save space in cloud storage one of the important methods is data deduplication, it is one of the compression technique that allows only one copy of the data to be saved and eliminate the extra copies. To offer security and privacy of the sensitive data while supporting the deduplication, In this work attacks that exploit the hybrid cloud deduplication have been identified, allowing an attacker to gain access to the files of other users based on very small hash signatures of
... Show MoreThe research deals with the concept of a New Urbanism as an urban development strategy in the suburbs of cities or in its centers that are affected by pedestrian-oriented design and the possibility of walking, as well as integrating economic classes through the diversity of housing and its costs, and this works to facilitate access to jobs and services while providing more diverse neighborhoods and reducing the use of cars , As designing separate houses in the suburbs and increasing car trips poses a threat to the environment and the quality of urban life, and thus the new urban provides a good strategy for developing
... Show More