Intrusion detection system is an imperative role in increasing security and decreasing the harm of the computer security system and information system when using of network. It observes different events in a network or system to decide occurring an intrusion or not and it is used to make strategic decision, security purposes and analyzing directions. This paper describes host based intrusion detection system architecture for DDoS attack, which intelligently detects the intrusion periodically and dynamically by evaluating the intruder group respective to the present node with its neighbors. We analyze a dependable dataset named CICIDS 2017 that contains benign and DDoS attack network flows, which meets certifiable criteria and is openly accessible. It evaluates the performance of a complete arrangement of machine learning algorithms and network traffic features to indicate the best features for detecting the assured attack classes. Our goal is storing the address of destination IP that is utilized to detect an intruder by method of misuse detection.
Samarium ion selective electrodes we1·e construct.ed and prepared
then tested as probefor Samarium ion detection and determination in different aqueous solutions.
The sensitive membrane is made of PVC which contains Samarium
picrate complexed with either 18-crown-6 or 15-crown-5 ethers as active species.
Different plasticizers: phthalates (DBPH), phosphates (DBP) and
phosphonates (DOPP) were incorporated into the membranes as solvent
mediators.
Every membrane was evaluated practically following &n
... Show MoreThirty serum samples of patients suffering from rheumatoid arthritis after screening of rheumatoid factor, C-reactive protein and ESR were collected and including in present study to detect the IgG antibody against Chlamydia pneumoniae by ELISA test. The results showed only 2(6%) patients had seropositive of C. pneumoniae, this lead to suggest that C. pneumoniae may be one of the etiological or trigger factor in patients of rheumatoid arthritis.
New schiff bases series (VIII) a-e and 1,3-thiazolidin-4-one derivatives (IX) a-e containing the 1,2,4-triazole and 1,3,4-thiazazole rings were synthesized and screening their biological activities. These compounds were identified via Fourier transform infrared (FT-IR) spectra, some via Proton nuclear magnetic resonance (1H-NMR) and mass spectra. The biological results indicated that all of these compounds did not reveal antibacterial effectiveness against (Escherichia coli and Klebsiella species) (G-). Some of these compounds showed moderate antibacterial activity against (Staphylococcus aureus, and Staphylococcus epidermidis) (G+), and all compounds exhibited moderate activity against Candida albicans.
In the present work, a series of new bis cyclic imides (pyromellit imides) linked to different nitrogen heterocycles namely (pyridine, pyrimidine, phenazone and quinoline) was synthesized.
Synthesis of the new imides was performed via two steps in the first one a series of bis amic acids (pyromellit amic acids) was synthesized via reaction of pyromellitic anhydride with variety of nitrogen heterocyclic primary amines while in the second step the prepared bis amic acids were dehydrated via treatment with acetic anhydride and anhydrous sodium acetate affording the desired imides.
The prepared bis Imides were screened for their antimicrobial activity against many types of bacteria and fungi and the results indicated that they possess
This research includes synthesis of new heterocyclic derivatives of N-benzyl-5-bromoisatin. New 1, 2, 4-triazole, oxazoline and thiazoline derivatives of [N-benzyl-5-bromo-3-(Ethyliminoacetate)-indole-2-one] (2) have been synthesized. The preparation process started by the reaction of 5-bromoisatin with sodium hydride in dimethylformamide (DMF) at 0°C, gave suspension of sodium salt of 5-bromoisatin and subsequent reaction with benzylchloride to give N-benzyl-5-bromoisatin (1). Compound (1) reacted with ethylglycinate (Schiff base) obtained the intermediate compound (2) which reacted with different reagents in two ways. The first way, compound (2) reacted with (hydrazine hydrate, semicarbazide, phenylsemicarbazide and thiosemicarbazide)
... Show MoreAge is a predominant parameter for arbitrating an individual, for security and access concerns of the data that exist in cyber space. Nowadays we find a rapid growth in unethical practices from youngsters as well as skilled cyber users. Facial image renders a variety of information that can be used, when processed to ascertain the age of individuals. In this paper, local facial features are considered to predict the age group, where local Binary Pattern (LBP) is extracted from four regions of facial images. The prominent areas where wrinkles are developed naturally in human as age increases are taken for feature extraction. Further these feature vectors are subjected to ensemble techniques that increases th
... Show MoreNotes are given regarding new record species of the braconid parasite short note in Iraq. That is Apanteles angalcti it is found to parasitize early larval instaxs of Ectomyslois ceratontae, one of the most serious pests of pomegra- nate fruit.
A robust video-bitrate adaptive scheme at client-aspect plays a significant role in keeping a good quality of video streaming technology experience. Video quality affects the amount of time the video has turned off playing due to the unfilled buffer state. Therefore to maintain a video streaming continuously with smooth bandwidth fluctuation, a video buffer structure based on adapting the video bitrate is considered in this work. Initially, the video buffer structure is formulated as an optimal control-theoretic problem that combines both video bitrate and video buffer feedback signals. While protecting the video buffer occupancy from exceeding the limited operating level can provide continuous video str
... Show MoreFuzzy logic is used to solve the load flow and contingency analysis problems, so decreasing computing time and its the best selection instead of the traditional methods. The proposed method is very accurate with outstanding computation time, which made the fuzzy load flow (FLF) suitable for real time application for small- as well as large-scale power systems. In addition that, the FLF efficiently able to solve load flow problem of ill-conditioned power systems and contingency analysis. The FLF method using Gaussian membership function requires less number of iterations and less computing time than that required in the FLF method using triangular membership function. Using sparsity technique for the input Ybus sparse matrix data gi
... Show More