Intrusion detection systems detect attacks inside computers and networks, where the detection of the attacks must be in fast time and high rate. Various methods proposed achieved high detection rate, this was done either by improving the algorithm or hybridizing with another algorithm. However, they are suffering from the time, especially after the improvement of the algorithm and dealing with large traffic data. On the other hand, past researches have been successfully applied to the DNA sequences detection approaches for intrusion detection system; the achieved detection rate results were very low, on other hand, the processing time was fast. Also, feature selection used to reduce the computation and complexity lead to speed up the system. A new features selection method is proposed based on DNA encoding and on DNA keys positions. The current system has three phases, the first phase, is called pre-processing phase, which is used to extract the keys and their positions, the second phase is training phase; the main goal of this phase is to select features based on the key positions that gained from pre-processing phase, and the third phase is the testing phase, which classified the network traffic records as either normal or attack by using specific features. The performance is calculated based on the detection rate, false alarm rate, accuracy, and also on the time that include both encoding time and matching time. All these results are based on using two or three keys, and it is evaluated by using two datasets, namely, KDD Cup 99, and NSL-KDD. The achieved detection rate, false alarm rate, accuracy, encoding time, and matching time for all corrected KDD Cup records (311,029 records) by using two and three keys are equal to 96.97, 33.67, 91%, 325, 13 s, and 92.74, 7.41, 92.71%, 325 and 20 s, respectively. The results for detection rate, false alarm rate, accuracy, encoding time, and matching time for all NSL-KDD records (22,544 records) by using two and three keys are equal to 89.34, 28.94, 81.46%, 20, 1 s and 82.93, 11.40, 85.37%, 20 and 1 s, respectively. The proposed system is evaluated and compared with previous systems and these comparisons are done based on encoding time and matching time. The outcomes showed that the detection results of the present system are faster than the previous ones.
The seismic reflection method has a primary role in petroleum exploration. This research is a structural interpretation study of the 2D seismic reflection survey carried out in the Upper West Euphrates (Khan Al-Baghdadi area), which is located in the western part of Iraq, Al-Anbar governorate. The two objectives of this research are to interpret Base Akkas/Top Khabour reflector and to define potential hydrocarbon traps in the surveyed area. Based on the synthetic seismogram of Akk_3 well near the study area, the Akkas/Top Khabour reflector was identified on the seismic section. Also, the Silurian Akkas Hot_shale reflector was identified and followed up, which represents the source and seal rocks of the Paleozoic
... Show MoreThis paper aims to introduce a concept of an equilibrium point of a dynamical system which will call it almost global asymptotically stable. We also propose and analyze a prey-predator model with a suggested function growth in prey species. Firstly the existence and local stability of all its equilibria are studied. After that the model is extended to an optimal control problem to obtain an optimal harvesting strategy. The discrete time version of Pontryagin's maximum principle is applied to solve the optimality problem. The characterization of the optimal harvesting variable and the adjoint variables are derived. Finally these theoretical results are demonstrated with numerical simulations.
The widespread of internet allover the world, in addition to the increasing of the huge number of users that they exchanged important information over it highlights the need for a new methods to protect these important information from intruders' corruption or modification. This paper suggests a new method that ensures that the texts of a given document cannot be modified by the intruders. This method mainly consists of mixture of three steps. The first step which barrows some concepts of "Quran" security system to detect some type of change(s) occur in a given text. Where a key of each paragraph in the text is extracted from a group of letters in that paragraph which occur as multiply of a given prime number. This step cannot detect the ch
... Show MoreRecently, biometric technologies are used widely due to their improved security that decreases cases of deception and theft. The biometric technologies use physical features and characters in the identification of individuals. The most common biometric technologies are: Iris, voice, fingerprint, handwriting and hand print. In this paper, two biometric recognition technologies are analyzed and compared, which are the iris and sound recognition techniques. The iris recognition technique recognizes persons by analyzing the main patterns in the iris structure, while the sound recognition technique identifies individuals depending on their unique voice characteristics or as called voice print. The comparison results show that the resul
... Show MoreThe aim of the research is to provide an analytical study to promote financial inclusion in Iraq by clarifying the opportunities and challenges of the economic and demographic situation in Iraq, studying the structure of the financial system and introducing non-bank financial institutions operating in Iraq, and using the descriptive approach. Analytical in the study of the phenomenon of research, the research reached a number of conclusions, the most prominent of which were:
- Iraqi society is a young society.
- The majority of the population is 70 percent. They live almost in urban areas.
- The coverage of bank branch networks is concentrated in only four provinces, leaving other provinces outside financial
Modern American elegy reveals a change in the attitude of mourning from the traditional lamenting approach to some antielegiac attitudes towards the mourned figure. Many American poets have lamented the pass away of the stately figure of the father. However, some poets attack their dead father, and ridiculed him in a poem that is intended to be an elegy, instead of showing passion, homage and love to him. In this regard, two poetic attitudes to the father can be traced in modern American poetry. The first one takes the form of tributes and praise, offering great admiration, compassion, and love for the father. For these poets, a father is an inspiration. The second voice develops some anger and contempt against the patriarchal authority emb
... Show MoreIn order to study the correlation between CMV infection and increase in blood pressure among Iraqi patients, 201 blood samples were collected including; 88 male, 113 female hypertensive patients and 40 control samples. Patients sera were grouped into patients who are under medication (T), and patients who do not take any treat-ment for hypertension(NT). Samples were tested for CMV-IgM/IgG by ELISA, ren-in enzyme and interleukin-6(IL-6) levels were determined by ELISA too. The opti-cal density readings difference for CMV-IgG were significant between (T) and (NT) groups as well as when each group compared to control, level of renin enzyme showed significant difference between patients group(T and NT) and between each group compared to the
... Show MoreThe contemporary business environment is witnessing increasing calls for modifications to the traditional cost system, and a trend towards adopting cost management techniques to provide appropriate financial and non-financial information for senior and executive departments, including the Resource Consumption Accounting (RCA) technique in question, which classifies costs into fixed and variable to support the decision-making process. Moreover, (RCA) combines two approaches to cost estimation, the first based on activity-based cost accounting (ABC) and the second on the German cost accounting method (GPK). The research aims to provide a conceptual vision for resource consumption accounting, after Considering it as an accounting te
... Show MoreIn this paper the process of metal ions extraction (Zn(II) and Cu(II)) was studied in PEG-KCl aqueous two phase system was investigated without using an extracting agent. The experimental runs were performance at constant temperature (25 oC), constant mixing time (30 min), and constant PH of the solution (about 3). The effect of KCl salt concentration (from 10% to 25%), volumetric phase ratio of PEG solution to KCl solution (from 0.5 to 2), and the initial metal ion concentration (from 0.25 ml to 2 ml of 1 gm/L solution) were investigated on the percent extraction of Zn(II) and Cu(II). The results indicated that the percent extraction of metal ions increase with increasing of salt concentration and phase ratio, and slightly de
... Show MoreThe international system that established the United Nations after the end of the Second World War witnessed many changes. These changes overshadowed the nature of the work of the international organization, especially its first and most important executive organ (the Security Council). This has sometimes weakened and dulled the Security Council's role in performing the tasks stipulated in the Charter of the Organization, which has led the Organization itself to work on reforms within it in general and to seek reforms in the Security Council in particular. Academic and advisory efforts were made to submit proposals for amendment to be reflected on the Council's performance effectiveness.