Preferred Language
Articles
/
WBbCvYoBVTCNdQwCM6Q9
Features Selection for Intrusion Detection System Based on DNA Encoding
...Show More Authors

Intrusion detection systems detect attacks inside computers and networks, where the detection of the attacks must be in fast time and high rate. Various methods proposed achieved high detection rate, this was done either by improving the algorithm or hybridizing with another algorithm. However, they are suffering from the time, especially after the improvement of the algorithm and dealing with large traffic data. On the other hand, past researches have been successfully applied to the DNA sequences detection approaches for intrusion detection system; the achieved detection rate results were very low, on other hand, the processing time was fast. Also, feature selection used to reduce the computation and complexity lead to speed up the system. A new features selection method is proposed based on DNA encoding and on DNA keys positions. The current system has three phases, the first phase, is called pre-processing phase, which is used to extract the keys and their positions, the second phase is training phase; the main goal of this phase is to select features based on the key positions that gained from pre-processing phase, and the third phase is the testing phase, which classified the network traffic records as either normal or attack by using specific features. The performance is calculated based on the detection rate, false alarm rate, accuracy, and also on the time that include both encoding time and matching time. All these results are based on using two or three keys, and it is evaluated by using two datasets, namely, KDD Cup 99, and NSL-KDD. The achieved detection rate, false alarm rate, accuracy, encoding time, and matching time for all corrected KDD Cup records (311,029 records) by using two and three keys are equal to 96.97, 33.67, 91%, 325, 13 s, and 92.74, 7.41, 92.71%, 325 and 20 s, respectively. The results for detection rate, false alarm rate, accuracy, encoding time, and matching time for all NSL-KDD records (22,544 records) by using two and three keys are equal to 89.34, 28.94, 81.46%, 20, 1 s and 82.93, 11.40, 85.37%, 20 and 1 s, respectively. The proposed system is evaluated and compared with previous systems and these comparisons are done based on encoding time and matching time. The outcomes showed that the detection results of the present system are faster than the previous ones.

Scopus
Publication Date
Sat May 08 2021
Journal Name
Iraqi Journal Of Science
Automated Deception Detection Systems, a Review
...Show More Authors

Humans use deception daily since it can significantly affect their life and provide a getaway solution for any undesired situation. Deception is either related to low-stakes (e.g. innocuous) or high-stakes (e.g. with harmful situations). Deception investigation importance has increased, and it became a critical issue over the years with the increase of security levels around the globe. Technology has made remarkable achievements in many human life fields, including deception detection. Automated deception detection systems (DDSs) are widely used in different fields, especially for security purposes. The DDS is comprised of multiple stages, each of which should be built/trained to perform intelligently so that the whole system can give th

... Show More
View Publication Preview PDF
Crossref (2)
Scopus Crossref
Publication Date
Tue Oct 23 2018
Journal Name
Journal Of Economics And Administrative Sciences
The role of the government accounting system in preparing performance reports for government units
...Show More Authors

The purpose of this study is to assess the performance of government units (Iraqi hospitals) by trying to determine the possibility of the current governmental accounting system to provide information on the performance reports of government units. In order to improve the efficiency of hospital resources management, the services provided by the hospital should be subject to performance measurement and evaluation The importance of the health sector in the provision of services, in order to raise the efficiency of the performance of services provided by government units has reached the researcher a set of conclusions, the most important

  1. The financial reports produced by the accounting s

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Thu Jul 27 2023
Journal Name
Al-rafidain Journal Of Medical Sciences ( Issn 2789-3219 )
Clinicopathological Features of Colorectal Cancer in the Iraqi Population Focusing on Age and Early-Onset of Malignancy: A Descriptive Cross-Sectional Study
...Show More Authors

Background: Colorectal cancer (CRC) is one of the top ten most common cancers worldwide. There are multiple risk factors for CRC, one of which is aging. However, in recent years, CRC has been reported in children. Objective: To describe the main characteristics and symptoms of CRC as well as highlight pathologic data for early-onset CRC. Methods: 79 CRC patients were recruited from the Oncology Teaching Hospital in the period February–December 2022. A questionnaire was used to collect demographic and clinical data. Results: 25 (31.6%) of patients were below 50 years of age. 52 (65.8%) patients had tumors in the colon. The most common symptom is bleeding per rectum in both age groups. There was no significant difference in patholog

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Wed Jun 30 2021
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
SYNTHESIS OF NEW LEVOFLOXACIN SELECTIVE MEMBRANE SENSOR BASED ON MOLECULARLY IMPRINTED POLYMERS.: SYNTHESIS OF NEW LEVOFLOXACIN SELECTIVE MEMBRANE SENSOR BASED ON MOLECULARLY IMPRINTED POLYMERS.
...Show More Authors

Two molecular imprinted polymer (MIP) membranes for Levofloxacin (LEV) were prepared based on PVC matrix. The imprinted polymers were prepared by polymerization of styrene (STY) as monomer, N,N methylene di acrylamide as a cross linker ,benzoyl peroxide (BPO) as an initiator and levofloxacin as a template. Di methyl adepate (DMA) and acetophenone (AOPH) were used as plasticizers , the molecular imprinted membranes and the non molecular imprinted membranes were prepared.  The slopes and detection limits of the liquid electrodes ranged from -21.96 – -19.38 mV/decade and 2×10-4M- 4×10-4M, and Its response time was around 1 minute, respectively. The liquid  electrodes were packed with 0.1 M standar

... Show More
View Publication Preview PDF
Publication Date
Thu Jul 01 2021
Journal Name
Iraqi Journal Of Science
The Influence of NMI against Modularity in Community Detection Problem: A Case Study for Unsigned and Signed Networks
...Show More Authors

Community detection is useful for better understanding the structure of complex networks. It aids in the extraction of the required information from such networks and has a vital role in different fields that range from healthcare to regional geography, economics, human interactions, and mobility. The method for detecting the structure of communities involves the partitioning of complex networks into groups of nodes, with extensive connections within community and sparse connections with other communities. In the literature, two main measures, namely the Modularity (Q) and Normalized Mutual Information (NMI) have been used for evaluating the validation and quality of the detected community structures. Althoug

... Show More
View Publication Preview PDF
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Tue Mar 04 2014
Journal Name
International Journal Of Advanced Computing
User Authentication Approach using a Combination of Unigraph and Digraph Keystroke Features
...Show More Authors

In Computer-based applications, there is a need for simple, low-cost devices for user authentication. Biometric authentication methods namely keystroke dynamics are being increasingly used to strengthen the commonly knowledge based method (example a password) effectively and cheaply for many types of applications. Due to the semi-independent nature of the typing behavior it is difficult to masquerade, making it useful as a biometric. In this paper, C4.5 approach is used to classify user as authenticated user or impostor by combining unigraph features (namely Dwell time (DT) and flight time (FT)) and digraph features (namely Up-Up Time (UUT) and Down-Down Time (DDT)). The results show that DT enhances the performance of digraph features by i

... Show More
Publication Date
Tue Oct 20 2020
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Synthesis and some Features of Three-Phases Polymer/Metal/Ceramic Multilayers Nanocomposite
...Show More Authors

      Layer by layer development two features of pulsed laser deposition PLD, with a high kinetic energy and sharp instantaneous deposition rating. Layered films of polymer/metal/ceramic nanocomposites consisting of polystyrene PS(as substrate) , tin Sn and cadmium oxide CdO were deposited by PLD. Structure for layered samples were measured  by XRD X ray diffraction, there were appearance of peaks  which reflected  to formation of new compounds result of  reaction between layers. Particles size  was calculated using two methods and it give nanoscale. Microstrain was also calculated  and exhibited  high value (0.01) for sample p/m.

 

View Publication Preview PDF
Crossref
Publication Date
Wed May 18 2016
Journal Name
Al-academy
Actor performance features in the types of theatrical silent: راسل كاظم عوده
...Show More Authors

Each art has its own language. Per his style as an artist, which is characterized by the other. The methods differ and vary expressive art to another depending on the tools and methods used, and is a theatrical phenomenon did, and see, and touch, grasp, understand, and imagine, and emotion, and the blending of ideas and images. When unable to speak the language of the traditional theater For the delivery of a specific meaning or a single non-current at the time the highlight of our new language with a very wide area up to the extent of the unification of the languages of the world as it is in fine painting, it's the body of actor language, so it has become a mime art, which expressed Representative meanings reference and movement of vari

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Jan 11 2024
Journal Name
Научный Форум
Structural and semantic features of military metaphors in the modern Russian press
...Show More Authors

Preview PDF
Publication Date
Tue Jan 30 2024
Journal Name
International Journal Of Engineering Pedagogy (ijep)
E-learning in the Cloud Computing Environment: Features, Architecture, Challenges and Solutions
...Show More Authors

The need to constantly and consistently improve the quality and quantity of the educational system is essential. E-learning has emerged from the rapid cycle of change and the expansion of new technologies. Advances in information technology have increased network bandwidth, data access speed, and reduced data storage costs. In recent years, the implementation of cloud computing in educational settings has garnered the interest of major companies, leading to substantial investments in this area. Cloud computing improves engineering education by providing an environment that can be accessed from anywhere and allowing access to educational resources on demand. Cloud computing is a term used to describe the provision of hosting services

... Show More
View Publication
Scopus (1)
Crossref (1)
Scopus Clarivate Crossref