8,447 research outputs found

    An overview to Software Architecture in Intrusion Detection System

    Full text link
    Today by growing network systems, security is a key feature of each network infrastructure. Network Intrusion Detection Systems (IDS) provide defense model for all security threats which are harmful to any network. The IDS could detect and block attack-related network traffic. The network control is a complex model. Implementation of an IDS could make delay in the network. Several software-based network intrusion detection systems are developed. However, the model has a problem with high speed traffic. This paper reviews of many type of software architecture in intrusion detection systems and describes the design and implementation of a high-performance network intrusion detection system that combines the use of software-based network intrusion detection sensors and a network processor board. The network processor which is a hardware-based model could acts as a customized load balancing splitter. This model cooperates with a set of modified content-based network intrusion detection sensors rather than IDS in processing network traffic and controls the high-speed.Comment: 8 Pages, International Journal of Soft Computing and Software Engineering [JSCSE]. arXiv admin note: text overlap with arXiv:1101.0241 by other author

    Solutions of the system of operator equations BXA=B=AXBBXA=B=AXB via βˆ—*-order

    Full text link
    In this paper, we establish some necessary and sufficient conditions for the existence of solutions to the system of operator equations BXA=B=AXB BXA=B=AXB in the setting of bounded linear operators on a Hilbert space, where the unknown operator XX is called the inverse of AA along BB. After that, under some mild conditions we prove that an operator XX is a solution of BXA=B=AXB BXA=B=AXB if and only if Bβ‰€βˆ—AXAB \stackrel{*}{ \leq} AXA, where the βˆ—*-order Cβ‰€βˆ—DC\stackrel{*}{ \leq} D means CCβˆ—=DCβˆ—,Cβˆ—C=Cβˆ—DCC^*=DC^*, C^*C=C^*D. Moreover we present the general solution of the equation above. Finally, we present some characterizations of Cβ‰€βˆ—DC \stackrel{*}{ \leq} D via other operator equations.Comment: 13 pages, to appear in Electron. J. Linear Algebra (ELA

    Improving urban run-off quality using iron oxide nanoparticles with magnetic field

    Get PDF
    Run-off from road surfaces is a major source of pollution in the environment. The aim of this study was to investigate the efficiency of nano iron oxide under a magnetic field to improve urban run-off quality. Experiments were conducted in a 50mm diameter column made of Plexiglass in which 20 cm deep stainless steel wool was used as the medium bed. A pair of magnets, each with 0.7 T magnetic charge density, was installed around the column. The particle size of the iron oxide was determined by X-ray diffraction (XRD) analysis. Atomic absorption spectroscopy, spectrophotometer, turbidimeter, and pH meter were used to measure heavy metals, nitrate and phosphate, turbidity and pH, respectively. Results from XRD analysis revealed that the average nanoparticle size was 32 nm. The average removal efficiency for turbidity, Pb, Zn, Cd, and phosphate were 41.5, 93.9, 96.2, 88.4, and 87.4%, respectively. However, nitrate was not removed from the column tests. The results of this study showed that nano iron oxide in the presence of magnetic field has the potential to improve urban run-off quality. However, for further reduction of turbidity and nitrate removal other options should be considered
    • …
    corecore