Intrusion detection systems detect attacks inside computers and networks, where the detection of the attacks must be in fast time and high rate. Various methods proposed achieved high detection rate, this was done either by improving the algorithm or hybridizing with another algorithm. However, they are suffering from the time, especially after the improvement of the algorithm and dealing with large traffic data. On the other hand, past researches have been successfully applied to the DNA sequences detection approaches for intrusion detection system; the achieved detection rate results were very low, on other hand, the processing time was fast. Also, feature selection used to reduce the computation and complexity lead to speed up the system. A new features selection method is proposed based on DNA encoding and on DNA keys positions. The current system has three phases, the first phase, is called pre-processing phase, which is used to extract the keys and their positions, the second phase is training phase; the main goal of this phase is to select features based on the key positions that gained from pre-processing phase, and the third phase is the testing phase, which classified the network traffic records as either normal or attack by using specific features. The performance is calculated based on the detection rate, false alarm rate, accuracy, and also on the time that include both encoding time and matching time. All these results are based on using two or three keys, and it is evaluated by using two datasets, namely, KDD Cup 99, and NSL-KDD. The achieved detection rate, false alarm rate, accuracy, encoding time, and matching time for all corrected KDD Cup records (311,029 records) by using two and three keys are equal to 96.97, 33.67, 91%, 325, 13 s, and 92.74, 7.41, 92.71%, 325 and 20 s, respectively. The results for detection rate, false alarm rate, accuracy, encoding time, and matching time for all NSL-KDD records (22,544 records) by using two and three keys are equal to 89.34, 28.94, 81.46%, 20, 1 s and 82.93, 11.40, 85.37%, 20 and 1 s, respectively. The proposed system is evaluated and compared with previous systems and these comparisons are done based on encoding time and matching time. The outcomes showed that the detection results of the present system are faster than the previous ones.
The aim of this research is to study the influence of additives on the properties of soap greases, such as lithium, calcium, sodium, lithium-calcium grease, by adding varies additives, such as graphite, molybdenum disulfide, carbon black, corrosion inhibitor, and extreme pressure.
These additives have been added to grease to obtain the best percentages that improve the properties of grease such as load carrying, wear resistance, corrosion resistance, drop point, and penetration.
The results showed the best weight percentages to all types of grease which give good properties are 1.5% extreme pressure additive, 3% graphite, 1% molybdenum disulfide, 2.5% carbon black.
The other hand, the best weight percentage for corrosion inhibit
In the present research, the chemical washing method has been selected using three chelating agents: citric acid, acetic acid and Ethylene Diamine Tetraacetic Acid (EDTA) to remove 137Cs from two different contaminated soil samples were classified as fine and coarse grained. The factors that affecting removal efficiency such as type of soil, mixing ratio and molarity have been investigated. The results revealed that no correlation relation was found between removal efficiency and the studied factors. The results also showed that conventional chemical washing method was not effective in removing 137Cs and that there are further studies still need to achieve this objective.
Background: Manuka honey (MH) is a mono-floral honey derived from the Manuka tree (Leptospermum scoparium). MH is a highly recognized for its non-peroxide antibacterial activities, which are mostly related to its unique methylglyoxal content (MGO) in MH. The beneficial phytochemicals in MH is directly related to their favorable health effects, which include wound healing, anticancer, antioxidant, and anti-inflammatory properties. Aims: The purpose of this study was to evaluate the effect of MH on pro-inflammatory cytokines (IL-8 and TNF-α) in patients with gingivitis and compare it with chlorhexidine (CHX) and distilled water (DW). Materials and Methods: This study was a randomized, double blinded, and parallel clinical trial. Forty-fiv
... Show MoreThe purpose of this study is to evaluate the hydraulic performance and efficiency of using direction diverting blocks, DDBs, fixed on the surface on an Ogee spillway in reducing the acceleration and dissipating the energy of the incoming supercritical flow. Fifteen types of DDB models were made from wood with a triangulate shape and different sizes were used. Investigation tests on pressure distribution at the DDBs boundaries were curried out to insure there is no negative pressures is developed that cause cavitation. In these tests, thirty six test runs were accomplished by using six types of blocks with the same size but differ in apex angle. Results of these test showed no negative pressures developed at the boundarie
... Show MoreFaintly continuous (FC) functions, entitled faintly S-continuous and faintly δS-continuous functions have been introduced and investigated via a -open and -open sets. Several characterizations and properties of faintly S-continuous and faintly -Continuous functions were obtained. In addition, relationships between faintly s- Continuous and faintly S-continuous function and other forms of FC function were investigated. Also, it is shown that every faintly S-continuous is weakly S-continuous. The Convers is shown to be satisfied only if the co-domain of the function is almost regular.
With the vast usage of network services, Security became an important issue for all network types. Various techniques emerged to grant network security; among them is Network Intrusion Detection System (NIDS). Many extant NIDSs actively work against various intrusions, but there are still a number of performance issues including high false alarm rates, and numerous undetected attacks. To keep up with these attacks, some of the academic researchers turned towards machine learning (ML) techniques to create software that automatically predict intrusive and abnormal traffic, another approach is to utilize ML algorithms in enhancing Traditional NIDSs which is a more feasible solution since they are widely spread. To upgrade t
... Show MoreFor over a century, the global consumption of asphalt binder in asphalt mixture production has been substantial. In the Heet region (west of Iraq), two distinct forms of natural asphalt (NA) deposits exist: rock asphalt and sulfur spring asphalt. This study focused on using NA sourced from sulfur springs. The aim was to investigate the potential of incorporating NA into local asphalt mixtures. To achieve this, NA was heated to 163°C for varying durations. After heat treatment, laboratory tests were conducted on NA. The findings suggest that by heating NA for 20 hours, it conforms to Iraqi specifications in terms of physical properties. Furthermore, compared to conventional petroleum asphalt, treated NA showed greater
... Show MoreThis work involves the calculation of the cooling load in Iraqi building constructions taking in account the effect of the convective heat transfer inside the buildings. ASHRAE assumptions are compared with the Fisher and Pedersen model of estimation of internal convective heat transfer coefficient when the high rate of ventilation from ceiling inlet configuration is used. Theoretical calculation of cooling load using the Radiant Time Series Method (RTSM) is implemented on the actual tested spaces. Also the theoretical calculated cooling loads are experimentally compared by measuring the cooling load in these tested spaces. The comparison appears that using the modified Fisher and Pedersen model when large ventilation ra
... Show MoreThis research is devoted to investigate the behavior and performance of reinforced concrete beams strengthened with externally bonded Carbon Fiber Reinforced Polymer (CFRP) laminates under the effect of torsion. In this study a theoretical analysis has been conducted using finite element code ANSYS. Six previously tested beams are used to investigate reinforced concrete beams behavior
under torsion, two of them are solid and the rest are box-section beams. Also, two beams are without CFRP reinforcement, which are used as control beams for the strengthened one, and the other four beams are strengthened with CFRP laminates with different number of layers and spacing. Numerical investigation is conducted on these beams, and comparisons b