Intrusion detection system is an imperative role in increasing security and decreasing the harm of the computer security system and information system when using of network. It observes different events in a network or system to decide occurring an intrusion or not and it is used to make strategic decision, security purposes and analyzing directions. This paper describes host based intrusion detection system architecture for DDoS attack, which intelligently detects the intrusion periodically and dynamically by evaluating the intruder group respective to the present node with its neighbors. We analyze a dependable dataset named CICIDS 2017 that contains benign and DDoS attack network flows, which meets certifiable criteria and is openly accessible. It evaluates the performance of a complete arrangement of machine learning algorithms and network traffic features to indicate the best features for detecting the assured attack classes. Our goal is storing the address of destination IP that is utilized to detect an intruder by method of misuse detection.
Sorghum cultivation is often accompanied by low field emergence rates and weak seedlings, which may be due to genetic or environmental stress. A factorial experiment was conducted in the spring and fall seasons of 2022 using a randomized complete block design with split-plot arrangement and four replications. Planting dates (spring season: Feb. 15th, Mar. 1st, 15th, and Apr. 1st, 15th; fall season: Jun. 15th, Jul. 1st, 15th, and Aug. 1st, 15th) were allocated to the main plots. Seeds stimulation treatments (35% banana peel extract + 100 mg L-1 citric acid and distilled water soaking treatment only) were allocated to the subplots. The interaction treatment (banana peel extract + citric acid) with the planting date of April 15 showed the high
... Show MoreThe present study stresses two of the most significant aspects of linguistic approach: Pragmatics” and the “Speech Act Theory”, revealing its importance and the stages and levels of development through Hebrew language’s speech acts analysis including (political speech, the Holy Bible, Hebrew stories).
Chronologically, Pragmatics has always been the center of linguists’ interests due to its importance in linguistic decryptions, particularly, through “Speech Act Theory” that has been initiated and developed by the most prominent philosophers and linguistics.
The prese
... Show MoreThe predatory bush crickets Saga ephippigera Fischer Von Waldheim, 1846 is the largest Iraqi orthopterans and one of the most active and successful predators in the Kurdistan region. The nymphs and adults prey on all the stages of various species of insects. Twelve adult specimens were collected from Erbil Province during May 2018 and June 2021. Morphological structures of the adult insects were described and illustrated in details; important taxonomic characteristics of body regions with their appendages were chosen; and the results indicated the importance of morphological characteristics which confirmed the identification of this species correctly.
The research examines the mechanism of application of )ISO 21001: 2018( in the Energy Branch- Electromechanical Engineering at the University of Technology to achieve the quality of the educational service to prepare the branch to obtain the certificate of conformity with the requirements of) ISO 21001: 2018(, the necessary data were collected Depending on the (CHEKLIST) of (ISO 21001: 2018), field interviews and records of the concerned department, The researchers reached a number of results, the most prominent of which was the adoption of high quality leadership leaders and their willingness to implement the standard requirements, The university has a basic structure that qualifies it to implement the international standard, as
... Show MoreCoupling reaction of 2-amino benzoic acid with 8-hydroxy quinoline gave bidentate azo ligand. The prepared ligand has been identified by Microelemental Analysis,1HNMR,FT-IR and UV-Vis spectroscopic techniques. Treatment of the prepared ligand with the following metal ions (ZnII,CdII and HgII) in aqueous ethanol with a 1:2 M:L ratio and at optimum pH, yielded a series of neutral complexes of the general formula [M(L)2]. The prepared complexes have been characterized by using flame atomic absorption, (C.H.N) Analysis, FT-IR and UV-Vis spectroscopic methods as well as conductivity measurements. The nature of the complexes formed were studied following the mole ratio and continuous variation methods, Beer's law obeyed over a concentration range
... Show MoreAzo derivative ligand[H3L] have been synthesized by the reaction of diazonium salt of p-amino benzoic acid with orcinol in(1:1)mole ratio. The bidente ligand was reacted with the metal ions MnII,FeIIandCrIIIin(2:1)mole ratio via reflux in ethanol using Et3N as a base to give complexes of the general formula: [ M(H2L)2(H2O)x]Cly The synthesized compounds were characterized by spectroscopic methods[ I.R , UV-Vis, A.A and H1 NMR]along with melting point, chloride content and conductivity measurements. The complexes were screend for their in vitro antibacterial activity against one strain of staphylococcus as Gram(+) positive and one strain of pseudomonas as Gram(-) Negative, using the agar diffusion technique.