Preferred Language
Articles
/
WBbCvYoBVTCNdQwCM6Q9
Features Selection for Intrusion Detection System Based on DNA Encoding
...Show More Authors

Intrusion detection systems detect attacks inside computers and networks, where the detection of the attacks must be in fast time and high rate. Various methods proposed achieved high detection rate, this was done either by improving the algorithm or hybridizing with another algorithm. However, they are suffering from the time, especially after the improvement of the algorithm and dealing with large traffic data. On the other hand, past researches have been successfully applied to the DNA sequences detection approaches for intrusion detection system; the achieved detection rate results were very low, on other hand, the processing time was fast. Also, feature selection used to reduce the computation and complexity lead to speed up the system. A new features selection method is proposed based on DNA encoding and on DNA keys positions. The current system has three phases, the first phase, is called pre-processing phase, which is used to extract the keys and their positions, the second phase is training phase; the main goal of this phase is to select features based on the key positions that gained from pre-processing phase, and the third phase is the testing phase, which classified the network traffic records as either normal or attack by using specific features. The performance is calculated based on the detection rate, false alarm rate, accuracy, and also on the time that include both encoding time and matching time. All these results are based on using two or three keys, and it is evaluated by using two datasets, namely, KDD Cup 99, and NSL-KDD. The achieved detection rate, false alarm rate, accuracy, encoding time, and matching time for all corrected KDD Cup records (311,029 records) by using two and three keys are equal to 96.97, 33.67, 91%, 325, 13 s, and 92.74, 7.41, 92.71%, 325 and 20 s, respectively. The results for detection rate, false alarm rate, accuracy, encoding time, and matching time for all NSL-KDD records (22,544 records) by using two and three keys are equal to 89.34, 28.94, 81.46%, 20, 1 s and 82.93, 11.40, 85.37%, 20 and 1 s, respectively. The proposed system is evaluated and compared with previous systems and these comparisons are done based on encoding time and matching time. The outcomes showed that the detection results of the present system are faster than the previous ones.

Scopus
Publication Date
Wed Jun 01 2016
Journal Name
Journal Of Economics And Administrative Sciences
Budget Programs and Performance away to enhance the control in government economic units
...Show More Authors

     The control function of important functions in the system of government for several reasons , perhaps the most important of the magnitude of spending and spending in one of the tools adopted in the implementation of the control function.                               

        Perhaps the most prominent stages of the development budget in terms of setup and use in the budget programs and performance , as specialized literature  show its importance in strengthening financial and operationl

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Oct 01 2019
Journal Name
Journal Of Engineering
Mechanisms of Plant-Correlation Phytoremediation of Al-Daura Iraqi Refinery Wastewater Using Wetland Plant from Tigris River
...Show More Authors

In developing countries, conventional physico-chemical methods are commonly used for removing contaminants. These methods are not efficient and very costly. However, new in site strategy with high treatment efficiency and low operation cost named constructed wetland (CW) has been set. In this study, Phragmites australis was used with free surface batch system to estimate its ability to remediate total
petroleum hydrocarbons (TPH) and chemical oxygen demand (COD) from Al-Daura refinery wastewater. The system operated in semi-batch, thus, new wastewater was weekly added to the plant for 42 days. The results showed high removal percentages (98%) of TPH and (62.3%) for COD. Additionally, Phragmites australis biomass increased significant

... Show More
View Publication Preview PDF
Crossref (5)
Crossref
Publication Date
Thu Nov 21 2019
Journal Name
Journal Of Engineering
Automatic Determination of Liquid's Interface in Crude Oil Tank using Capacitive Sensing Techniques
...Show More Authors

The petroleum sector has a significant influence on the development of multiphase detection sensor techniques; to separate the crude oil from water, the crude oil tank is used. In this paper, a measuring system using a simple and low cost two parallel plate capacitance sensor is designed and implemented based on a Micro controlled embedded system plus PC to automatically identify the (gas/oil) and (oil/water) dynamic multi-interface in the crude oil tank. The Permittivity differences of two-phase liquids are used to determine the interface of them by measuring the relative changes of the sensor’s capacitance when passes through the liquid’s interface. The experiment results to determine the liquid’s interface is sa

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Nov 02 2013
Journal Name
International Journal Of Computer Applications
Mixed Transforms Generated by Tensor Product and Applied in Data Processing
...Show More Authors

Finding orthogonal matrices in different sizes is very complex and important because it can be used in different applications like image processing and communications (eg CDMA and OFDM). In this paper we introduce a new method to find orthogonal matrices by using tensor products between two or more orthogonal matrices of real and imaginary numbers with applying it in images and communication signals processing. The output matrices will be orthogonal matrices too and the processing by our new method is very easy compared to other classical methods those use basic proofs. The results are normal and acceptable in communication signals and images but it needs more research works.

View Publication
Crossref
Publication Date
Mon Jul 01 2024
Journal Name
المجلة العلمية لعلوم وفنون الرياضة
العلاقة بين طول الذراع وبعض المتغيرات البايوكينماتيكية في سباحة الفراشة (50 متر) لسباحي المنتخب الوطني
...Show More Authors

Competitive swimming is a highly researched area and technological developments have aided advances in the understanding of the biomechanical principles that underpin these elements and govern propulsion. Moreover, those working in the sports field especially in swimming are interested in studying, analyzing, evaluating and developing motor skills by diagnosing the strengths and weaknesses of the skill, and accordingly, coaches and specialists correct these errors. The researchers chose this (Butterfly swimming) and the (arm length) is an important variable because the success of the stroke is greatly dependent on the propulsion generated from the arm pull, and swimmers with a longer arm span have a mechanical advantage with the resulting f

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Feb 10 2023
Journal Name
Journal Of Applied Mathematics
The Dynamics of a Delayed Ecoepidemiological Model with Nonlinear Incidence Rate
...Show More Authors

In this paper, the general framework for calculating the stability of equilibria, Hopf bifurcation of a delayed prey-predator system with an SI type of disease in the prey population, is investigated. The impact of the incubation period delay on disease transmission utilizing a nonlinear incidence rate was taken into account. For the purpose of explaining the predation process, a modified Holling type II functional response was used. First, the existence, uniform boundedness, and positivity of the solutions of the considered model system, along with the behavior of equilibria and the existence of Hopf bifurcation, are studied. The critical values of the delay parameter for which stability switches and the nature of the Hopf bifurcat

... Show More
View Publication Preview PDF
Scopus (3)
Scopus Clarivate Crossref
Publication Date
Wed Dec 27 2023
Journal Name
Journal Of Planner And Development
Beyond Individual Ownership: Women's and Men's Land Tenure Rights in Iraqi Heritage Systems
...Show More Authors

This paper delves into the significant role played by local social and traditional structures in shaping Traditional Community Tenure (TCT) within Iraqi Land Tenure Legislation (ILTR), and examines their impact on gender inequalities, with a specific focus on women's land tenure rights. The methodological approach employed in this study identified the sources of barriers to gender equality within TCT as outlined in ILTR at two different bilateral levels, with input obtained from key stakeholders in a selected city in Iraq. The case study survey encompassed three districts, which served as local layers within the historic sectors of the Iraqi city of Al-Nasiriya. the study employed quantitative methods, including a household surveyو with

... Show More
View Publication Preview PDF
Publication Date
Sun Jun 05 2011
Journal Name
Baghdad Science Journal
Applying Quran Security and Hamming CodesFor Preventing of Text Modification
...Show More Authors

The widespread of internet allover the world, in addition to the increasing of the huge number of users that they exchanged important information over it highlights the need for a new methods to protect these important information from intruders' corruption or modification. This paper suggests a new method that ensures that the texts of a given document cannot be modified by the intruders. This method mainly consists of mixture of three steps. The first step which barrows some concepts of "Quran" security system to detect some type of change(s) occur in a given text. Where a key of each paragraph in the text is extracted from a group of letters in that paragraph which occur as multiply of a given prime number. This step cannot detect the ch

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed May 03 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Security of Iris Recognition and Voice Recognition Techniques
...Show More Authors

  Recently, biometric technologies are used widely due to their improved security that decreases cases of deception and theft. The biometric technologies use physical features and characters in the identification of individuals. The most common biometric technologies are: Iris, voice, fingerprint, handwriting and hand print. In this paper, two biometric recognition technologies are analyzed and compared, which are the iris and sound recognition techniques. The iris recognition technique recognizes persons by analyzing the main patterns in the iris structure, while the sound recognition technique identifies individuals depending on their unique voice characteristics or as called voice print. The comparison results show that the resul

... Show More
View Publication Preview PDF
Publication Date
Sun Dec 01 2019
Journal Name
Al-adab Journal
Lamenting the Father in Modern American Poetry: A Study in Selected Elegies of Mark Strand and Sharon Olds
...Show More Authors

Modern American elegy reveals a change in the attitude of mourning from the traditional lamenting approach to some antielegiac attitudes towards the mourned figure. Many American poets have lamented the pass away of the stately figure of the father. However, some poets attack their dead father, and ridiculed him in a poem that is intended to be an elegy, instead of showing passion, homage and love to him. In this regard, two poetic attitudes to the father can be traced in modern American poetry. The first one takes the form of tributes and praise, offering great admiration, compassion, and love for the father. For these poets, a father is an inspiration. The second voice develops some anger and contempt against the patriarchal authority emb

... Show More
View Publication Preview PDF