Intrusion detection system is an imperative role in increasing security and decreasing the harm of the computer security system and information system when using of network. It observes different events in a network or system to decide occurring an intrusion or not and it is used to make strategic decision, security purposes and analyzing directions. This paper describes host based intrusion detection system architecture for DDoS attack, which intelligently detects the intrusion periodically and dynamically by evaluating the intruder group respective to the present node with its neighbors. We analyze a dependable dataset named CICIDS 2017 that contains benign and DDoS attack network flows, which meets certifiable criteria and is openly accessible. It evaluates the performance of a complete arrangement of machine learning algorithms and network traffic features to indicate the best features for detecting the assured attack classes. Our goal is storing the address of destination IP that is utilized to detect an intruder by method of misuse detection.
New ligands, N1, N4-bis (benzo[d]thiazol-2- ylcarbamothioyl) succinamide (L1) and N1, N4- bis (benzylcarbamothioyl)succinamide (L2), derived from succinyl chloride and 2-amino benzothiazole or benzylamine, respectively, have been used to prepare a set of transition metal complexes with the general formula [M2(L)Cl4], where L=L1 or L2, M = Mn(II), Ni(II), Cu(II), Cd(II), Co(II), Zn(II) or Hg(II). The synthesized compounds were characterized using various analytical techniques including TGA, 13C NMR, mass spectroscopy, 1H and Fourier-transform infrared (FTIR) spectroscopy, magnetic measurement, molar conductivity, electronic spectrum, (%M, %C, %H, %N) and atomic absorption flame (AAF) analysis. The results showed that (L1, L2) bin
... Show MoreObjective: Benzoxazole derivatives have antifungal, anticancer, antibacterial, and anticonvulsant function. Encouraged by this comment, we agreed to synthesize new Benzoxazole compounds connected to the bases of Schiff's. Methods: 2,4-diaminophenol (1) was prepared by the reaction of 2,4-dinitrophenol and sodium dithionate. Compound (1) reacted with either acetic acid to afford compound (2) or with formic acid to afford compound (3). The Schiff bases were preparation from the reaction condensing reaction of compound (2) or (3) and aromatic aldehydes or ketone; [p-nitrobenzaldehyde, p-hydroxybenzaldehyde, p-chlorobenzaldehyde, p-bromoacetophenone and terephthaldehyde]. Results: FTIR and 1H-NMR spectroscopy characterized all of the pr
... Show MoreSulfamethoxazole (SMX) is the most significant antibiotic in the sulfonamide family. It was chosen as the representative of this category because of its widespread use. Starting with sulfamethoxazole, a new series of 2-Azetidinone (M1-M6) was synthesized, the structure of these new derivatives was confirmed using spectral methods, starting with the synthesis of Schiff’s bases by reflux of different aromatic benzaldehydes, separately, with Sulfamethoxazole in ethanol with few drops of acetic acid. The final compounds were obtained by ketene-imine synthesis of β-lactam using chloroacetyl chloride. The designed chemicals’ synthesis has been completed successfully. Physical parameters (melting points and Rf values), Fourier transfo
... Show MoreA new series of schiff base and aminothiadiazole derivatives of N- substituted phthalimide (I-VI) were synthesized. In this work, the intermediate 4-(1,3-dioxoisoindolin-2-yl)benzaldehyde compound (I), was formed by reaction of 4-amino benzaldehyde with phthalic anhydride in glacial acetic acid(GAA). A series of Schiff bases (IV-VI) was prepared by the reaction of benzidine with compound (I) in ethanol and presence of GAA as a catalyst to form compound (IV) which react with compound (I) and p-nitro benzyldehyde to give compound (V) and (VI) respectively. A new phthalimide thiosemi-carbazone derivative (ll) was prepared by reaction of compound (l) with thiosemi-carbazide HCl in the presence of equimolar amount of sodium acetate. Fina
... Show MoreThe importance of evaluation depends on many institutions, whether governmental or private, including media institutions, rely on the list to evaluate the weight of things and appreciation, as well as judging things, achievements, and everything related to the institution is concerned. Because through evaluation, institutions can recognize weaknesses and strengths. It is also an effective tool for management review, through which the institution can review everything related to planning and decision-making, leadership, incentives and other administrative matters.
Therefore, this study attempts to shed light on the evaluation process, its basics and its importance in general and in the Kurdish media institutions as a model in part
... Show Morethe study considers the optical classification of cervical nodal lymph cells and is based on research into the development of a Computer Aid Diagnosis (CAD) to detect the malignancy cases of diseases. We consider 2 sets of features one of them is the statistical features; included Mode, Median, Mean, Standard Deviation and Maximum Probability Density and the second set are the features that consist of Euclidian geometrical features like the Object Perimeter, Area and Infill Coefficient. The segmentation method is based on following up the cell and its background regions as ranges in the minimum-maximum of pixel values. The decision making approach is based on applying of Minimum Dista
Media studies have focused mostly on the issue of the mental image because the image that is formed in the mind has become not only a photo of a human being and having kept for himself. This image has an outside influence which may sometimes up to the formation of the fate of others and it sometimes includes individuals and groups together.
This study comes in the context of identifying the image of Iraqi political parties among Iraqi university students and the nature of the view that students have in their minds about these parties.
Chapter one includes the problem of the research, the importance of the study, the goals and method used. Chapter two is divided into two sections: section one deals with the concept of the mental i
This research deals with the qualitative and quantitative interpretation of Bouguer gravity anomaly data for a region located to the SW of Qa’im City within Anbar province by using 2D- mapping methods. The gravity residual field obtained graphically by subtracting the Regional Gravity values from the values of the total Bouguer anomaly. The residual gravity field processed in order to reduce noise by applying the gradient operator and 1st directional derivatives filtering. This was helpful in assigning the locations of sudden variation in Gravity values. Such variations may be produced by subsurface faults, fractures, cavities or subsurface facies lateral variations limits. A major fault was predicted to extend with the direction NE-
... Show MoreWith the revolutionized expansion of the Internet, worldwide information increases the application of communication technology, and the rapid growth of significant data volume boosts the requirement to accomplish secure, robust, and confident techniques using various effective algorithms. Lots of algorithms and techniques are available for data security. This paper presents a cryptosystem that combines several Substitution Cipher Algorithms along with the Circular queue data structure. The two different substitution techniques are; Homophonic Substitution Cipher and Polyalphabetic Substitution Cipher in which they merged in a single circular queue with four different keys for each of them, which produces eight different outputs for
... Show More