Intrusion detection system is an imperative role in increasing security and decreasing the harm of the computer security system and information system when using of network. It observes different events in a network or system to decide occurring an intrusion or not and it is used to make strategic decision, security purposes and analyzing directions. This paper describes host based intrusion detection system architecture for DDoS attack, which intelligently detects the intrusion periodically and dynamically by evaluating the intruder group respective to the present node with its neighbors. We analyze a dependable dataset named CICIDS 2017 that contains benign and DDoS attack network flows, which meets certifiable criteria and is openly accessible. It evaluates the performance of a complete arrangement of machine learning algorithms and network traffic features to indicate the best features for detecting the assured attack classes. Our goal is storing the address of destination IP that is utilized to detect an intruder by method of misuse detection.
In recent years, the positioning applications of Internet-of-Things (IoT) based systems have grown increasingly popular, and are found to be useful in tracking the daily activities of children, the elderly and vehicle tracking. It can be argued that the data obtained from GPS based systems may contain error, hence taking these factors into account, the proposed method for this study is based on the application of IoT-based positioning and the replacement of using IoT instead of GPS. This cannot, however, be a reason for not using the GPS, and in order to enhance the reliability, a parallel combination of the modern system and traditional methods simultaneously can be applied. Although GPS signals can only be accessed in open spaces, GP
... Show More: Cervical malignancy positioned as the fourth most prevalent disease among women around the world. HPVs especially HPV16 are the causative agent of cervical cancer, responsible of about 5% of all human cancers worldwide. Some researchers found that the fibronectin is repressed by the papillomavirus (HPV) type 16 E7 oncoprotein in both HPV-positive nontumorigenic and tumorigenic cell lines, while others found that the HPV oncoprotein increase the levels of fibronectin. The aim is to study the effect of HPV infection on Fibronectin expression and their correlation onthe development of Cervicalcancinoma. The current retrospective study enrolled paraffinized blocks of two groups. The research included 30 cervical carcinomatous tissues as well
... Show MoreÖz
Arzı Kanber/Kamber hikayesi Anadolu, Rumeli, Azerbaycan, Türkmenistan ve Irak gibi Türk dünyasının birçok yerinde birden fazla varyantı bulunan, çok sevilen ve yaygın olarak anlatılan aşk ve dramatik maceralı bir halk hikayesidir. Türk halk hikayelerinin en popüler olanlarından biri sayılan Arzı Kanber/Kamber hikayesi, Anadolu'nun birçok yöresinde bilinmesine rağmen Irak Türkmenleri arasında daha çok sevildiği ve yaygın olarak anlatıldığı tespit edilen birden fazla varyantından da görülebilir. Irak Türkmenleri arasında günümüze kadar hikayenin iki varyantı tespit edilmi
... Show MoreThe rapid developmemt of information technology and its use in all fields has a bositive influence on all fields , and financial markets have a share of this development through the use of an electronic trading system to settle transactions and enhance transparency and disclosure in all activities of these markets and stimulate their performance .
It is worth nothing that these revolutions remove the necessity for nonstop connection with persons through the internet or phone networks , novel knowledge decreases the charges of structure original transaction system and reducing the fences of new participants entry .
The development in transportations expertise allows for quicker or
... Show MoreThe current research aims at identifying the new marketing directions that in the picture because if the changes and challenges that face the business nowadays, these effect on the future of the new product.
The problem of the research concentrate on the new marketing activities and how to make it appropriate between the product and the market's need, and to fulfill the needs and desire of the customer and it's importance for achieving the economical goals of the organization for a long relationship with the customer.
The resume of the research is about the impact of nowadays marketing and it's effect on knowing the customer instead of concentrating on the important roll of mark
... Show MoreConvolutional Neural Networks (CNN) have high performance in the fields of object recognition and classification. The strength of CNNs comes from the fact that they are able to extract information from raw-pixel content and learn features automatically. Feature extraction and classification algorithms can be either hand-crafted or Deep Learning (DL) based. DL detection approaches can be either two stages (region proposal approaches) detector or a single stage (non-region proposal approach) detector. Region proposal-based techniques include R-CNN, Fast RCNN, and Faster RCNN. Non-region proposal-based techniques include Single Shot Detector (SSD) and You Only Look Once (YOLO). We are going to compare the speed and accuracy of Faster RCNN,
... Show MoreTo determine the relationship between herpes simplex virus 1, 2 and neurological disorders, sixty samples from patients with neurological diseases were collected (40 patients with Multiple sclerosis and 20 patients with Parkinson’s disease) all of whom attended both the Neurological science Hospital as well as the Neuropathology consultation Department in Baghdad Hospital In Iraq. The samples were collected in the time frame between November 2017 and April 2018. The ages of the patients that were investigated were between (17-76) years and compared to a control group consisting of 25 samples collected from apparently healthy individuals. All the studied groups were subjected to the measurement of anti-HSV 1, 2 IgG antibodies by the means
... Show MoreThe goal of this work is to check the presence of PNS (photon number splitting) attack in quantum cryptography system based on BB84 protocol, and to get a maximum secure key length as possible. This was achieved by randomly interleaving decoy states with mean photon numbers of 5.38, 1.588 and 0.48 between the signal states with mean photon numbers of 2.69, 0.794 and 0.24. The average length for a secure key obtained from our system discarding the cases with Eavesdropping was equal to 125 with 20 % decoy states and 82 with 50% decoy states for mean photon number of 0.794 for signal states and 1.588 for decoy states.