Intrusion detection systems detect attacks inside computers and networks, where the detection of the attacks must be in fast time and high rate. Various methods proposed achieved high detection rate, this was done either by improving the algorithm or hybridizing with another algorithm. However, they are suffering from the time, especially after the improvement of the algorithm and dealing with large traffic data. On the other hand, past researches have been successfully applied to the DNA sequences detection approaches for intrusion detection system; the achieved detection rate results were very low, on other hand, the processing time was fast. Also, feature selection used to reduce the computation and complexity lead to speed up the system. A new features selection method is proposed based on DNA encoding and on DNA keys positions. The current system has three phases, the first phase, is called pre-processing phase, which is used to extract the keys and their positions, the second phase is training phase; the main goal of this phase is to select features based on the key positions that gained from pre-processing phase, and the third phase is the testing phase, which classified the network traffic records as either normal or attack by using specific features. The performance is calculated based on the detection rate, false alarm rate, accuracy, and also on the time that include both encoding time and matching time. All these results are based on using two or three keys, and it is evaluated by using two datasets, namely, KDD Cup 99, and NSL-KDD. The achieved detection rate, false alarm rate, accuracy, encoding time, and matching time for all corrected KDD Cup records (311,029 records) by using two and three keys are equal to 96.97, 33.67, 91%, 325, 13 s, and 92.74, 7.41, 92.71%, 325 and 20 s, respectively. The results for detection rate, false alarm rate, accuracy, encoding time, and matching time for all NSL-KDD records (22,544 records) by using two and three keys are equal to 89.34, 28.94, 81.46%, 20, 1 s and 82.93, 11.40, 85.37%, 20 and 1 s, respectively. The proposed system is evaluated and compared with previous systems and these comparisons are done based on encoding time and matching time. The outcomes showed that the detection results of the present system are faster than the previous ones.
The Purpose of this Research show gap between a Normal Cost System and Resource consumption Accounting Applied in AL-Rafidin Bank.
The Research explores that, how the idle capacity can be determined under resource consumption accounting, discuss the possibility of employing these energies. Research also viewed how costs can be separated into Committee and Attribute. Resource Consumption Accounting assists managers in pricing services or products based on what these services or products use from each Source.
This Research has been proven
A large amount of thermal energy is generated from burning hazardous chemical wastes, and the temperature of the flue gases in hazardous waste incinerators reaches up to (1200 °C). The flue gases are cooled to (40°C) and are treated before emission. This thermal energy can be utilized to produce electrical power by designing a system suitable for dangerous flue gases in the future depending on the results of much research about using a proto-type small steam power plant that uses safe fuel to study and develop the electricity generation process with water tube boiler which is manufactured experimentally with theoretical development for some of its parts which are inefficient in experimental work. The studied system gen
... Show MoreA number of aqueous samples were collected from river Tigris in Baghdad city, enriched ~1000 times using solid phase extraction (SPE), then extracted the trace concentrations of some polychlorinated biphenyls (PCB) using an aqueous two-phase system (ATPS) composed of 1Methylpyridinium chloride [MePy]Cl and KH2PO4 salt. High performance liquid chromatography technique coupled with ultraviolet (HPLC-UV) is used for the quantification. Extraction under the optimized conditions of pH, solvent composition, duration and temperature has given with a yield of PCB about 91%. The limit of detection (LOD) and limit of quantification (LOQ) for analyses are 0.11-0.62 µg.L−1 and 2.67–3.43 µg.L−1 respectively with relative stan
... Show MoreThe research aims to evaluate the suppliers at Diyala general electric industries company conducted in an environment of uncertainty and fuzzy where there is no particular system followed by the company, and also aims to use the problem of traveling salesman problem in the process of transporting raw materials from suppliers to the company in a fuzzy environment. Therefore, a system based on mathematical methods and quantity was developed to evaluate the suppliers. Fuzzy inference system (FIS) and fuzzy set theory were used to solve this problem through (Matlab) and the problem of the traveling salesman in two stages was also solved by the first stage of eliminating the fuzzing of the environment using the rank function method, w
... Show MoreAn attempt was made to evaluate the PV performance of one-axis daily tracking and fixed system for Baghdad, Iraq. Two experimental simulations were conducted on a PV module for that purpose. Measurements included incident solar radiation, load voltage and load current. The first experiment was carried out for six months of winter half of year to simulate the one-axis daily tracking. The azimuth angle was due south while the tilt angle was being set to optimum according to each day of simulation. The second experiment was done at one day to simulate the PV module of fixed angles. It is found that there is a significant power gain of 29.6% for the tracking system in respect to the fixed one. The one-axis daily tracking was much more effect
... Show MoreIn this article we derive two reliability mathematical expressions of two kinds of s-out of -k stress-strength model systems; and . Both stress and strength are assumed to have an Inverse Lomax distribution with unknown shape parameters and a common known scale parameter. The increase and decrease in the real values of the two reliabilities are studied according to the increase and decrease in the distribution parameters. Two estimation methods are used to estimate the distribution parameters and the reliabilities, which are Maximum Likelihood and Regression. A comparison is made between the estimators based on a simulation study by the mean squared error criteria, which revealed that the maximum likelihood estimator works the best.
The present research aims to measure concentration of lead Pb214 in soil using remote sensing and GIS, associated radiological hazards in Baghdad, Iraq. Concentration of specific radioactivity of radioactive elements was measured and analyzed naturally and artificially in 48 soil samples for separate sites from Baghdad, Iraq using crystalline spectroscopy to detect germanium. The average radioactivity concentrations of lead were found, as it was found to have varying values from one site to another, as most of them exceeded the international permissible limit, as the highest concentration was recorded at 180 Bq in the sample H28 in Waziriyah district. Battery Lab (1), and the lowest concentration valu
... Show MoreThe 3D electro-Fenton technique is, due to its high efficiency, one of the technologies suggested to eliminate organic pollutants in wastewater. The type of particle electrode used in the 3D electro-Fenton process is one of the most crucial variables because of its effect on the formation of reactive species and the source of iron ions. The electrolytic cell in the current study consisted of graphite as an anode, carbon fiber (CF) modified with graphene as a cathode, and iron foam particles as a third electrode. A response surface methodology (RSM) approach was used to optimize the 3D electro-Fenton process. The RSM results revealed that the quadratic model has a high R2 of 99.05 %. At 4 g L-1 iron foam particles, time of 5 h, and
... Show MoreThe need to exchange large amounts of real-time data is constantly increasing in wireless communication. While traditional radio transceivers are not cost-effective and their components should be integrated, software-defined radio (SDR) ones have opened up a new class of wireless technologies with high security. This study aims to design an SDR transceiver was built using one type of modulation, which is 16 QAM, and adding a security subsystem using one type of chaos map, which is a logistic map, because it is a very simple nonlinear dynamical equations that generate a random key and EXCLUSIVE OR with the originally transmitted data to protect data through the transmission. At th
... Show MoreEMS in accordance with ISO 14001: 2015 is considered an entry point to reduce environmental impacts, especially the effects resulting from the oil industry, which is the main source of environmental pollution and waste of natural resources, since the second revision of the standard took place in September 2015. The problem of the research was manifested in the weakness in understanding the correct guidelines that must be followed in order to obtain and maintain the standard. The purpose of this research was to give a general picture of what is behind ISO14001:2015 and how it is possible to create a comprehensive base for understanding its application by seeking the gap between the actually achieved reality, standards requirements
... Show More