Intrusion detection system is an imperative role in increasing security and decreasing the harm of the computer security system and information system when using of network. It observes different events in a network or system to decide occurring an intrusion or not and it is used to make strategic decision, security purposes and analyzing directions. This paper describes host based intrusion detection system architecture for DDoS attack, which intelligently detects the intrusion periodically and dynamically by evaluating the intruder group respective to the present node with its neighbors. We analyze a dependable dataset named CICIDS 2017 that contains benign and DDoS attack network flows, which meets certifiable criteria and is openly accessible. It evaluates the performance of a complete arrangement of machine learning algorithms and network traffic features to indicate the best features for detecting the assured attack classes. Our goal is storing the address of destination IP that is utilized to detect an intruder by method of misuse detection.
The general health of palm trees, encompassing the roots, stems, and leaves, significantly impacts palm oil production, therefore, meticulous attention is needed to achieve optimal yield. One of the challenges encountered in sustaining productive crops is the prevalence of pests and diseases afflicting oil palm plants. These diseases can detrimentally influence growth and development, leading to decreased productivity. Oil palm productivity is closely related to the conditions of its leaves, which play a vital role in photosynthesis. This research employed a comprehensive dataset of 1,230 images, consisting of 410 showing leaves, another 410 depicting bagworm infestations, and an additional 410 displaying caterpillar infestations. Furthe
... Show MoreA group of amine derivatives [4-aminobenzenesulfonamide derivatives, 2-aminopyridine and 2-aminothiazole] incorporated to α-carbon of diclofenac a well known non-steroidal anti-inflammatory drug (NSAID) to increase bulkiness were designed and synthesized for evaluation as a potential anti-inflammatory agents with expected COX-2 selectivity. In vivo acute anti-inflammatory activity of the selected final compounds (9, 12 and 13) was evaluated in rats using egg-white induced edema model of inflammation in a dose equivalent to (3 mg/Kg) of diclofenac sodium. All tested compounds produced a significant reduction in paw edema with respect to the effect of propylene glycol 50
... Show MoreThe research study included the synthesis of a new series of heterocyclic derivatives containing the antibiotic Levofloxacin. The first way provides for the reaction of Levofloxacin with thionyl chloride in benzene as a solvent to give an acid chloride derivative. A new class of acid hydrazide synthesized from Levofloxacin was studied. Schiff bases were produced via the reaction of acid hydrazide with substituted aromatic ketones in methanol. The next stage involved the response of Schiff bases with thioglycolic acid and mono chloroacetic acid in DMF to produce derivatives of the antibiotic levofloxacin that have five heterocyclic members, including the derivatives thiazolidine-4-one and oxazolidine-5-one. The FTIR, 1HNMR, a
... Show MoreAmoxicillin 1 was treated with thiosemicarbazide and Phosphoryl chloride to obtain a new derivatives that contains 1,3,4-thiadiazole moiety 2. Schiff bases compounds were synthesized by the reaction of compound 2 with different aldehydes such as benzaldehyde and some substituted Benzaldehyde; p-hydroy, p-Chloro, p-Nitro, p-Dimethylamino, p-Methyl, p-Methoxy, p-Ethoxy to give compounds 3a-h. The obtained compounds have tested towards gram -ve and gram +ve bacteria. The compound shows good to moderate result towards the bacteria.
Till now, isatin derivatives have received a lot of interest in organic and medicinal chemistry due to their significant biological and pharmacological activities. Schiff’s and Mannich bases of isatins are an effective group of heterocyclic derivatives that play a significant role in medicinal chemistry as antimicrobial agents. In light of these facts, new Schiff bases and Mannich bases of isatin were synthesized. The monomer Mannich bases; 3(a-e) have been synthesized by reacting isatin with different secondary amines, piperidine, morpholine, and pyrrolidine, dimethylamine, diphenylamine, separately, and formaldehyde, while the dimer (5) formed by using piperazine and formaldehyde which then react separately with Phenylhydrazine
... Show MoreThe internet, unlike other traditional means of communication, has a flexibility to stimulate the user and allows him to develop it. Perhaps, the reason for the superiority of the internet over other traditional means of communication is the possibility of change and transmission from one stage to another in a short period. This means that the internet is able to move from the use to the development of the use and then the development of means and innovation as the innovation of the internet is a logical product of the interaction of the user with the network. The internet invests all the proposals and ideas and does not ignore any even if it is simple. This is represented in social networking sites which in fact reflects personal emotio
... Show Morefashion designers who have benefited greatly from the mobilization of ancient aesthetic ideas in the heritage of the people and guaranteed in their productions so that there is no change In the aesthetic value created by the designers of the research in the ancient heritage to find new signs that reflect the connection of man to the present as the aesthetic value of all the man created by the designs of fabrics and fashion through the ages The problem of research was determined in the absence of a precise understanding of the nature of classical thought in fashion and the absence of a clear perception of the sustainability of this thought in contemporary fashion. He
... Show MoreMaking the data secure is more and more concerned in the communication era. This research is an attempt to make a more secured information message by using both encryption and steganography. The encryption phase is done with dynamic DNA complementary rules while DNA addition rules are done with secret key where both are based on the canny edge detection point of the cover image. The hiding phase is done after dividing the cover image into 8 blocks, the blocks that are used for hiding selected in reverse order exception the edge points. The experiments result shows that the method is reliable with high value in PSNR