Distributed Denial of Service (DDoS) attacks on Web-based services have grown in both number and sophistication with the rise of advanced wireless technology and modern computing paradigms. Detecting these attacks in the sea of communication packets is very important. There were a lot of DDoS attacks that were directed at the network and transport layers at first. During the past few years, attackers have changed their strategies to try to get into the application layer. The application layer attacks could be more harmful and stealthier because the attack traffic and the normal traffic flows cannot be told apart. Distributed attacks are hard to fight because they can affect real computing resources as well as network bandwidth. DDoS attacks
... Show MoreResearchers dream of developing autonomous humanoid robots which behave/walk like a human being. Biped robots, although complex, have the greatest potential for use in human-centred environments such as the home or office. Studying biped robots is also important for understanding human locomotion and improving control strategies for prosthetic and orthotic limbs. Control systems of humans walking in cluttered environments are complex, however, and may involve multiple local controllers and commands from the cerebellum. Although biped robots have been of interest over the last four decades, no unified stability/balance criterion adopted for stabilization of miscellaneous walking/running modes of biped
Recent years have witnessed an increase in the use of composite coatings for numerous applications, including aerospace, aircraft, and maritime vessels. These materials owe this popularity surge to the superior strength, weight, stiffness, and electrical insulation they exhibit over conventional substances, such as metals. The growing demand for such materials is accompanied by the inevitable need for fast, accurate, and affordable nondestructive testing techniques to reveal any possible defects within the coatings or any defects under coating. However, typical nondestructive testing (NDT) techniques such as ultrasonic testing (UT), infrared thermography (IRT), eddy current testing (ECT), and laser shearography (LS) have failed to p
... Show MoreIn this work, an experimental research on a low voltage DC magnetron plasma sputtering (0-650) volt is used for coating gold on a glass substrate at a constant pressure of argon gas 0.2 mbar and deposition time of 30 seconds. We focused on the effects of operating conditions for the system such as, electrode separation and sputtering current on coated samples under the influence of magnetic flux. Electron temperature and electrons and ions densities are determined by a cylindrical single Langmuir probe. The results show the sensitivity of electrode separation lead to change the plasma parameters. Furthermore, the surface morphology of gold coated samples at different electrode separation and sputtering current were studied by atomic forc
... Show MoreThis paper aims to make a historical review of jet grouting techniques and encountered problems at different sites in several countries. This review is a good guide to understanding the performance and limitations of improved soils or lands. The basic concept of jet grouting technology is to use cement as a binder to accelerate the hardening process of an admixture of material grout and soil. The different case history was conducted in both sand soil and clay soil in the horizontal and vertical direction. Other papers on field construction showed that the grout can be gelled within 5-10 minutes. Due to different cases and studies, these will help improve soil by supporting the foundation load with a minimal settlement.
... Show MoreRecord, verify, and showcase your peer review contributions in a format you can include in job and funding applications (without breaking reviewer anonymity).
One of the concerns of adopting an e-voting systems in the pooling place of any critical elections is the possibility of compromising the voting machine by a malicious piece of code, which could change the votes cast systematically. To address this issue, different techniques have been proposed such as the use of vote verification techniques and the anonymous ballot techniques, e.g., Code Voting. Verifiability may help to detect such attack, while the Code Voting assists to reduce the possibility of attack occurrence. In this paper, a new code voting technique is proposed, implemented and tested, with the aid of an open source voting. The anonymous ballot improved accordingly the paper audit trail used in this machine. The developed system,
... Show More