A novel method for Network Intrusion Detection System (NIDS) has been proposed, based on the concept of how DNA sequence detects disease as both domains have similar conceptual method of detection. Three important steps have been proposed to apply DNA sequence for NIDS: convert the network traffic data into a form of DNA sequence using Cryptography encoding method; discover patterns of Short Tandem Repeats (STR) sequence for each network traffic attack using Teiresias algorithm; and conduct classification process depends upon STR sequence based on Horspool algorithm. 10% KDD Cup 1999 data set is used for training phase. Correct KDD Cup 1999 data set is used for testing phase to evaluate the proposed method. The current experiment results show that the proposed system has obtained good results and these results are equal to 86.36%, 49.69%, and 77.65% for detection rate, false alarm rate and accuracy respectively. These results are considered as a better result when it is compared with the other previous basic algorithms. It is possible to conclude that DNA sequence has potential for NIDS solution and it has potential improvement using a better encoding method.
The research seeks to identify the impact of fraud detection skills in the settlement of compensatory claims for the fire and accident insurance portfolio and the reflection of these skills in preventing and reducing the payment of undue compensation to some who seek profit and enrichment at the expense of the insurance contract. And compensatory claims in the portfolio of fire and accident insurance in the two research companies, which show the effect and positive return of the detection skills and settlement of the compensation on the amount of actual compensation against the claims inflated by some of the insured, The research sample consisted of (70) respondents from a community size (85) individuals between the director and assistan
... Show MoreAbstract:
In light of the development in the banking environment and the increasing reliance on electronic systems in providing banking services and due to the intense competition witnessed by the banking sector, the need has emerged to apply the comprehensive electronic banking system, which works on the Internet in providing new and diverse banking services regardless of time and place by linking all branches to one central database, and despite the advantages achieved from the application of the comprehensive system, there is a set of risks that accompany the use of that system, What requires the auditors to develop the audit method in line with the size of the development in the
... Show MoreThis study was conducted on a sample of commercial banks in Iraq, chosen according number of considerations for twenty banks, contained two public banks and eighteen private banks. &
... Show Moreabstract
the research discussed a stage of strategic management. The strategic of the evaluation of the proposed strategy through feedback is to ensure that it is implemented with the least possible variation. The research aims at evaluation a proposed strategy for the Ministry of Planning for the years 2018-2022 in line with the orientations of the state, taking into account the surrounding environmental conditions. It relies on scientific bases and steps to formulate the strategy The extent of the strategy suitability was tested through a set of statistical means and its objectivity was verified through a survey of a number of specialized experts who were selected in accordance with the principle
... Show MoreArtificial Neural Network (ANN) is widely used in many complex applications. Artificial neural network is a statistical intelligent technique resembling the characteristic of the human neural network. The prediction of time series from the important topics in statistical sciences to assist administrations in the planning and make the accurate decisions, so the aim of this study is to analysis the monthly hypertension in Kalar for the period (January 2011- June 2018) by applying an autoregressive –integrated- moving average model and artificial neural networks and choose the best and most efficient model for patients with hypertension in Kalar through the comparison between neural networks and Box- Je
... Show MoreIn the present investigation, bed porosity and solid holdup in viscous three-phase inverse fluidized bed (TPIFB) are determined for aqueous solutions of carboxy methyl cellulose (CMC) system using polyethylene and polypropylene as a particles with low-density and diameter (5 mm) in a (9.2 cm) inner diameter with height (200 cm) of vertical perspex column. The effectiveness of gas velocity Ug , liquid velocity UL, liquid viscosity μL, and particle density ρs on bed porosity BP and solid holdups εg were determined. The bed porosity increases with "increasing gas velocity", "liquid velocity", and "liquid viscosity". Solid holdup decreases with increasing gas, liquid
... Show MoreThe symmetrical N,N‾-Bis-(4-methyl phenyl) pyromellitamic diacid (I) was synthesized from the reaction of toludine with pyromellitic dianhydride in dry acetone. Esterification of amic acid (I) with dimethyl sulphate in basic medium using acetone as a solvent give symmetrical N,N‾-bis-( 4- methyl phenyl ) pyromellitam diacetate (II). The condensation of new ester with hydrazine hydrate in ethanol leads to the formation symmetrical N,N‾-bis- (4-methyl phenyl) pyromellitamic hydrazide (III). New symmetrical 1,3-oxazepine derivatives (V)a-e can be synthesized from the reaction of the new synthesized Schiff bases (III)a-e (which are synthesized from the reaction new hydrazide
... Show MoreIn order to select the optimal tracking of fast time variation of multipath fast time variation Rayleigh fading channel, this paper focuses on the recursive least-squares (RLS) and Extended recursive least-squares (E-RLS) algorithms and reaches the conclusion that E-RLS is more feasible according to the comparison output of the simulation program from tracking performance and mean square error over five fast time variation of Rayleigh fading channels and more than one time (send/receive) reach to 100 times to make sure from efficiency of these algorithms.