-
Open clusters with proper motions fully separated from the field stars using Gaia DR2
Authors:
W. A. Badawy,
A. L. Tadross,
Y. M. Hendy,
I. A. Hassan,
M. N. Ismail
Abstract:
The study of open star clusters makes us understand a lot about the composition and construction of the Milky Way Galaxy. Thanks to the Gaia DR2 database that helps us to get the genetic members of star clusters using their proper motions and parallaxes, estimating their physical properties in a very accurate way. This study aims to detect the reasons that make proper motions value of a cluster is…
▽ More
The study of open star clusters makes us understand a lot about the composition and construction of the Milky Way Galaxy. Thanks to the Gaia DR2 database that helps us to get the genetic members of star clusters using their proper motions and parallaxes, estimating their physical properties in a very accurate way. This study aims to detect the reasons that make proper motions value of a cluster is completely separated from the background field stars and not melted in. We studied a large sample of open stellar clusters taken from Dias catalog and drawing the vector point diagrams using the astrometric data of Gaia DR2. Marking the separated clusters and melted ones and study their mean parameters in each galactic quadrant.
△ Less
Submitted 22 September, 2021; v1 submitted 28 July, 2021;
originally announced July 2021.
-
Reducing Honeypot Log Storage Capacity Consumption -- Cron Job with Perl-Script Approach
Authors:
Iman Hazwam Abd Halim,
Nur Muhammad Irfan Abu Hassan,
Tajul Rosli Razak,
Muhammad Nabil Fikri Jamaluddin,
Mohammad Hafiz Ismail
Abstract:
Honeypot is a decoy computer system that is used to attract and monitor hackers' activities in the network. The honeypot aims to collect information from the hackers in order to create a more secure system. However, the log file generated by honeypot can grow very large when heavy traffic occurred in the system, such as Distributed Denial of Services' (DDoS) attack. The DDoS possesses difficulty w…
▽ More
Honeypot is a decoy computer system that is used to attract and monitor hackers' activities in the network. The honeypot aims to collect information from the hackers in order to create a more secure system. However, the log file generated by honeypot can grow very large when heavy traffic occurred in the system, such as Distributed Denial of Services' (DDoS) attack. The DDoS possesses difficulty when it is being processed and analyzed by the network administrator as it required a lot of time and resources. Therefore, in this paper, we propose an approach to decrease the log size that is by using a Cron job that will run with a Perl-script. This approach parses the collected data into the database periodically to decrease the log size. Three DDoS attack cases were conducted in this study to show the increasing of the log size by sending a different amount of packet per second for 8 hours in each case. The results have shown that by utilizing the Cron job with Perl-script, the log size has been significantly reduced, the disk space used in the system has also decreased. Consequently, this approach capable of speeding up the process of parsing the log file into the database and thus, improving the overall system performance. This study contributes to providing a pathway in reducing honeypot log storage using the Cron job with Perl-Script.
△ Less
Submitted 5 November, 2019;
originally announced November 2019.
-
Pre-solution of the perturbed motion of artificial satellite
Authors:
Inalds A. Hassan,
Hayman Z. Metwally,
Mohammad A. F. Basha
Abstract:
The authors try to find a good solution of an artificial satellite motion under the influence of J2 gravity in terms of KS variables by using Picard Iterative Method. The result shows that there are many solutions for this problem depends on the initial guess solutions, so the choice of correct and convince initial guess is very difficult. Applications of the method applied on many satellites.
The authors try to find a good solution of an artificial satellite motion under the influence of J2 gravity in terms of KS variables by using Picard Iterative Method. The result shows that there are many solutions for this problem depends on the initial guess solutions, so the choice of correct and convince initial guess is very difficult. Applications of the method applied on many satellites.
△ Less
Submitted 16 September, 2012;
originally announced September 2012.