Intrusion detection system is an imperative role in increasing security and decreasing the harm of the computer security system and information system when using of network. It observes different events in a network or system to decide occurring an intrusion or not and it is used to make strategic decision, security purposes and analyzing directions. This paper describes host based intrusion detection system architecture for DDoS attack, which intelligently detects the intrusion periodically and dynamically by evaluating the intruder group respective to the present node with its neighbors. We analyze a dependable dataset named CICIDS 2017 that contains benign and DDoS attack network flows, which meets certifiable criteria and is openly accessible. It evaluates the performance of a complete arrangement of machine learning algorithms and network traffic features to indicate the best features for detecting the assured attack classes. Our goal is storing the address of destination IP that is utilized to detect an intruder by method of misuse detection.
Recent years have seen an explosion in graph data from a variety of scientific, social and technological fields. From these fields, emotion recognition is an interesting research area because it finds many applications in real life such as in effective social robotics to increase the interactivity of the robot with human, driver safety during driving, pain monitoring during surgery etc. A novel facial emotion recognition based on graph mining has been proposed in this paper to make a paradigm shift in the way of representing the face region, where the face region is represented as a graph of nodes and edges and the gSpan frequent sub-graphs mining algorithm is used to find the frequent sub-structures in the graph database of each emotion. T
... Show More<p>In combinatorial testing development, the fabrication of covering arrays is the key challenge by the multiple aspects that influence it. A wide range of combinatorial problems can be solved using metaheuristic and greedy techniques. Combining the greedy technique utilizing a metaheuristic search technique like hill climbing (HC), can produce feasible results for combinatorial tests. Methods based on metaheuristics are used to deal with tuples that may be left after redundancy using greedy strategies; then the result utilization is assured to be near-optimal using a metaheuristic algorithm. As a result, the use of both greedy and HC algorithms in a single test generation system is a good candidate if constructed correctly. T
... Show MoreSocial media is known as detectors platform that are used to measure the activities of the users in the real world. However, the huge and unfiltered feed of messages posted on social media trigger social warnings, particularly when these messages contain hate speech towards specific individual or community. The negative effect of these messages on individuals or the society at large is of great concern to governments and non-governmental organizations. Word clouds provide a simple and efficient means of visually transferring the most common words from text documents. This research aims to develop a word cloud model based on hateful words on online social media environment such as Google News. Several steps are involved including data acq
... Show MoreThe choice of binary Pseudonoise (PN) sequences with specific properties, having long period high complexity, randomness, minimum cross and auto- correlation which are essential for some communication systems. In this research a nonlinear PN generator is introduced . It consists of a combination of basic components like Linear Feedback Shift Register (LFSR), ?-element which is a type of RxR crossbar switches. The period and complexity of a sequence which are generated by the proposed generator are computed and the randomness properties of these sequences are measured by well-known randomness tests.
The detection of diseases affecting plant is very important as it relates to the issue of food security, which is a very serious threat to human life. The system of diagnosis of diseases involves a series of steps starting with the acquisition of images through the pre-processing, segmentation and then features extraction that is our subject finally the process of classification. Features extraction is a very important process in any diagnostic system where we can compare this stage to the spine in this type of system. It is known that the reason behind this great importance of this stage is that the process of extracting features greatly affects the work and accuracy of classification. Proper selection of
... Show MoreSoil compaction is one of the most harmful elements affecting soil structure, limiting plant growth and agricultural productivity. It is crucial to assess the degree of soil penetration resistance to discover solutions to the harmful consequences of compaction. In order to obtain the appropriate value, using soil cone penetration requires time and labor-intensive measurements. Currently, satellite technologies, electronic measurement control systems, and computer software help to measure soil penetration resistance quickly and easily within the precision agriculture applications approach. The quantitative relationships between soil properties and the factors affecting their diversity contribute to digital soil mapping. Digital soil maps use
... Show MoreThis study aims to predict the organic pollution produced from the presence of some polycyclic aromatic hydrocarbons (PAHs) and determination it's concentrations (µg/L , ppb) in Tigris river water by a collection twenty-seven water samples from a selected three stations with nine sampling sites and three depths of water (5 cm , 2 m and 4 m) each site for 4.6 km distance of a geographic studied area which is located between the ( Al-Senak and AL-Sarrafiah bridges ) at Baghdad city – Iraq on May, 2012. The geographic location was determined with a Global Positioning System (GPS) and Geographic Information System (GIS) software program. The concentrations of fourteen components (PAHs) were performed using the reverse phase
... Show MoreA series of benzohydrazide derivatives attached to coumarin moiety at position 6 and 7 have been synthesized. The reaction of coumarin derivatives (coumarin I and II) with p-nitrophenyl hydrazine yield Schiff bases (compound1a and IIa).These Schiff bases were refluxed with benzoyl chloride to give benzohydrazide derivatives of coumarin substituted at its 6 or 7 nucleus position (Ia1 and IIa1).The reaction and the purity of the products were checked by thin layer chromatography (TLC). The structures of the final compounds and their intermediates were confirmed by their melting points, infra red spectroscopy, and elemental microanalysis(CHN).
Compounds (Ia1 and IIa1) were evaluated for&n
... Show MoreIn this work, novel compounds of hydrazones derived from (2,4-dinitrophenyl) hydrazine were synthesized. Benzamides derivatives and sulfonamides derivatives were prepared from p-amino benzaldehyde. Then these compounds were condensed with (2,4-dinitrophenyl) hydrazine through Imine bond formation to give hydrazones compounds. The compounds were characterized using FT-IR (IR Affinity-1) spectrometer, and 1HNMR analyses. The majority of the compounds have a moderate antimicrobial activity against “Gram-positive bacteria staphylococcus Aureus, and staphylococcus epidermidis, Gram-negative bacteria Escherichia coli, and Klebsiella pneumoniae, and fungi species Candida albicans” using concentrations of 250 µg\ml.
Cryptography algorithms play a critical role in information technology against various attacks witnessed in the digital era. Many studies and algorithms are done to achieve security issues for information systems. The high complexity of computational operations characterizes the traditional cryptography algorithms. On the other hand, lightweight algorithms are the way to solve most of the security issues that encounter applying traditional cryptography in constrained devices. However, a symmetric cipher is widely applied for ensuring the security of data communication in constraint devices. In this study, we proposed a hybrid algorithm based on two cryptography algorithms PRESENT and Salsa20. Also, a 2D logistic map of a chaotic system is a
... Show More