Preferred Language
Articles
/
WBbCvYoBVTCNdQwCM6Q9
Features Selection for Intrusion Detection System Based on DNA Encoding
...Show More Authors

Intrusion detection systems detect attacks inside computers and networks, where the detection of the attacks must be in fast time and high rate. Various methods proposed achieved high detection rate, this was done either by improving the algorithm or hybridizing with another algorithm. However, they are suffering from the time, especially after the improvement of the algorithm and dealing with large traffic data. On the other hand, past researches have been successfully applied to the DNA sequences detection approaches for intrusion detection system; the achieved detection rate results were very low, on other hand, the processing time was fast. Also, feature selection used to reduce the computation and complexity lead to speed up the system. A new features selection method is proposed based on DNA encoding and on DNA keys positions. The current system has three phases, the first phase, is called pre-processing phase, which is used to extract the keys and their positions, the second phase is training phase; the main goal of this phase is to select features based on the key positions that gained from pre-processing phase, and the third phase is the testing phase, which classified the network traffic records as either normal or attack by using specific features. The performance is calculated based on the detection rate, false alarm rate, accuracy, and also on the time that include both encoding time and matching time. All these results are based on using two or three keys, and it is evaluated by using two datasets, namely, KDD Cup 99, and NSL-KDD. The achieved detection rate, false alarm rate, accuracy, encoding time, and matching time for all corrected KDD Cup records (311,029 records) by using two and three keys are equal to 96.97, 33.67, 91%, 325, 13 s, and 92.74, 7.41, 92.71%, 325 and 20 s, respectively. The results for detection rate, false alarm rate, accuracy, encoding time, and matching time for all NSL-KDD records (22,544 records) by using two and three keys are equal to 89.34, 28.94, 81.46%, 20, 1 s and 82.93, 11.40, 85.37%, 20 and 1 s, respectively. The proposed system is evaluated and compared with previous systems and these comparisons are done based on encoding time and matching time. The outcomes showed that the detection results of the present system are faster than the previous ones.

Scopus
Publication Date
Mon Jun 01 2015
Journal Name
Journal Of Engineering
Using Nanoparticles for Enhance Thermal Conductivity of Latent Heat Thermal Energy Storage
...Show More Authors

Phase change materials (PCMs) such as paraffin wax can be used to store or release large amount of energy at certain temperature at which their solid-liquid phase changes occurs. Paraffin wax that used in latent heat thermal energy storage (LHTES) has low thermal conductivity. In this study, the thermal conductivity of paraffin wax has been enhanced by adding different mass concentration (1wt.%, 3wt.%, 5wt.%) of (TiO2) nano-particles with about (10nm) diameter. It is found that the phase change temperature varies with adding (TiO2) nanoparticles in to the paraffin wax. The thermal conductivity of the composites is found to decrease with increasing temperature. The increase in thermal conductivity ha

... Show More
View Publication Preview PDF
Publication Date
Sun Oct 05 2025
Journal Name
Mesopotamian Journal Of Computer Science
DGEN: A Dynamic Generative Encryption Network for Adaptive and Secure Image Processing
...Show More Authors

Cyber-attacks keep growing. Because of that, we need stronger ways to protect pictures. This paper talks about DGEN, a Dynamic Generative Encryption Network. It mixes Generative Adversarial Networks with a key system that can change with context. The method may potentially mean it can adjust itself when new threats appear, instead of a fixed lock like AES. It tries to block brute‑force, statistical tricks, or quantum attacks. The design adds randomness, uses learning, and makes keys that depend on each image. That should give very good security, some flexibility, and keep compute cost low. Tests still ran on several public image sets. Results show DGEN beats AES, chaos tricks, and other GAN ideas. Entropy reached 7.99 bits per pix

... Show More
View Publication
Scopus Crossref
Publication Date
Mon Oct 01 2018
Journal Name
Iraqi Journal Of Physics
Using the plastic wastes in fabrication of composite materials for different applications
...Show More Authors

This study suggests using the recycled plastic waste to prepare the polymer matrix composite (PMCs) to use in different applications. Composite materials were prepared by mixing the polyester resin (UP) with plastic waste, two types of plastic waste were used in this work included polyethylene-terephthalate (PET) and Polyvinyl chloride (PVC) with varies weight fractions (0, 5, 10, 15, 20 and 25 %) added as a filler in flakes form. Charpy impact test was performed on the prepared samples to calculate the values of impact strength (I.S). Flexural and hardness tests were carried out to calculate the values of flexural strength and hardness. Acoustic insulation and optical microscope tests were carried out. In general, it is found that UP/PV

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Mon Aug 01 2016
Journal Name
2016 38th Annual International Conference Of The Ieee Engineering In Medicine And Biology Society (embc)
Myoelectric feature extraction using temporal-spatial descriptors for multifunction prosthetic hand control
...Show More Authors

View Publication
Scopus (11)
Crossref (9)
Scopus Crossref
Publication Date
Sat Jan 19 2019
Journal Name
Iraqi Journal Of Agricultural Sciences
ESTIMATING CONSTANT ELASTICITY OF SUBSTITUTION PRODUCTION FUNCTION FOR AGRICULTURAL COMPANIES IN IRAQ
...Show More Authors

This research aims to estimate production functions through which production relations, possibilities for production elements substitution, measurement of its substitution elasticity, and efficiency and distribution coefficients can be analyzed. This would be done through estimation of constant elasticity of substitution production function for agricultural companies in Iraq depending on data from Iraqi Stock Exchange reports of 2005-2016. The researcher had used panel data model and estimated its three models: the Pooled Regression Model (PRM), the Fixed Effect Model (FEM) and the Random Effect Model (REM). A comparison was made for theses three models using F, LM, Husman tests. Tests show that Fixed Effect Model (FEM) is the best

... Show More
View Publication
Crossref
Publication Date
Thu Oct 31 2019
Journal Name
Al-kindy College Medical Journal
Stethoscope as potential occupational hazards for intra hospital carries of pathogenic microorganisms
...Show More Authors

Background: The stethoscope is a tool that doctors use daily in the examination of patients and  it  can take part in the transmission of health care-associated infections. In a single day it may come in direct contact with multiple patients and the intra hospital environment  may be contaminated by various type of bacteria and possibly transmit to others.

Objective:- The study was to know the attitude and knowledge about   the stethoscope hygiene behavior among physicians  and to determine the types of  bacterial agents that can contaminate stethoscopes.

Type of the study: The study was a cross-sectional study

Metho

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Mar 30 2021
Journal Name
Journal Of Economics And Administrative Sciences
Trends of Women's Economic Empowerment in Iraq for the Period 1990-2018
...Show More Authors

This research aims to study the economic, social, and political reality of Iraqi women by identifying the obstacles and diagnosing their empowerment trends in various fields, assessing the extent of their participation in economic activity, and re-achieving balance between women and men by reducing the gender gap between them and reducing the percentage of female unemployment to the lowest possible level. Is achieved by enhancing confidence in Iraqi women by enacting laws and making decisions that allow them to access resources freely. The researcher used the descriptive and analytical method to deal with information and data related to the research topic over a specific period (1990-2018), using local, Arab, and international re

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Feb 20 2026
Journal Name
Technical University Of Munich
Conditions for Applying Public Private Partnership PPP in Iraq Infrastructure Projects Successfully
...Show More Authors

Public private partnership PPP is a method to procure public projects in order to achieve additional value for money in terms of efficiency and quality of services. This thesis studies the concepts of PPP, advantages and disadvantages of PPP. In addition, current Iraq infrastructure projects situations and needs, as well as, some aspects relating to the Iraq’s construction market, legal and contract systems were discussed. A financial model was carried out and applied to a real-life case study project. Finally, a survey targeted researchers; public and private- sectors were applied.

View Publication
Publication Date
Mon May 15 2023
Journal Name
Revistabionatura
Prevalence and Risk Factors for Giardia Species in Livestock Animals of Iraq
...Show More Authors

Giardiasis is an infection caused by the protozoan flagellate parasite Giardia spp. in the intestine. G duodenalis, a species complex of diverse genotypes that tend to demonstrate host specificity, is responsible for most veterinary health related infections; production animals, companion animals, and wildlife can all be infected. Abdominal pain and diarrhea, typically accompanied by steatorrhea, are the most common symptoms of Giardiasis. Cysts or antigens in feces are commonly used to diagnose the disease. Treatment regimens vary and are dependent on the indication. Control methods must include hygiene measures. Despite direct evidence of Giardia sp transmission to humans via polluted water supplies, our analysis will focus on some r

... Show More
View Publication Preview PDF
Publication Date
Sun Jan 01 2023
Journal Name
Aip Conference Proceedings
Efficient computational methods for solving the nonlinear initial and boundary value problems
...Show More Authors

Scopus (2)
Crossref (1)
Scopus Crossref