Preferred Language
Articles
/
WBbCvYoBVTCNdQwCM6Q9
Features Selection for Intrusion Detection System Based on DNA Encoding
...Show More Authors

Intrusion detection systems detect attacks inside computers and networks, where the detection of the attacks must be in fast time and high rate. Various methods proposed achieved high detection rate, this was done either by improving the algorithm or hybridizing with another algorithm. However, they are suffering from the time, especially after the improvement of the algorithm and dealing with large traffic data. On the other hand, past researches have been successfully applied to the DNA sequences detection approaches for intrusion detection system; the achieved detection rate results were very low, on other hand, the processing time was fast. Also, feature selection used to reduce the computation and complexity lead to speed up the system. A new features selection method is proposed based on DNA encoding and on DNA keys positions. The current system has three phases, the first phase, is called pre-processing phase, which is used to extract the keys and their positions, the second phase is training phase; the main goal of this phase is to select features based on the key positions that gained from pre-processing phase, and the third phase is the testing phase, which classified the network traffic records as either normal or attack by using specific features. The performance is calculated based on the detection rate, false alarm rate, accuracy, and also on the time that include both encoding time and matching time. All these results are based on using two or three keys, and it is evaluated by using two datasets, namely, KDD Cup 99, and NSL-KDD. The achieved detection rate, false alarm rate, accuracy, encoding time, and matching time for all corrected KDD Cup records (311,029 records) by using two and three keys are equal to 96.97, 33.67, 91%, 325, 13 s, and 92.74, 7.41, 92.71%, 325 and 20 s, respectively. The results for detection rate, false alarm rate, accuracy, encoding time, and matching time for all NSL-KDD records (22,544 records) by using two and three keys are equal to 89.34, 28.94, 81.46%, 20, 1 s and 82.93, 11.40, 85.37%, 20 and 1 s, respectively. The proposed system is evaluated and compared with previous systems and these comparisons are done based on encoding time and matching time. The outcomes showed that the detection results of the present system are faster than the previous ones.

Scopus
Publication Date
Sun Feb 10 2019
Journal Name
Journal Of The College Of Education For Women
Social Medical Care for the Deformed Children: A Field Study in Baghdad City
...Show More Authors

The Child is the first sedum for the human society performing, and we deal in our
research to explain the nature of the mutual relations in between the form and the medicine
social caring foundation. So the motherhood and the childhood nowadays become the most
dedicated in the researchers works, whom interesting in the social affairs, and that whom
work in the medicine field as scientists.
So the child is the future man and must be in wright body construction that need to great
care and interest to make him wright mind through capability of performing anything support
to him.
In our research we deal with the main factors in which lead to infect the child by the
creative malfunction, like the environmental and m

... Show More
View Publication Preview PDF
Publication Date
Wed May 01 2013
Journal Name
Journal Of Computer Science
PROTOCOLS FOR SECURE ROUTING AND TRANSMISSION IN MOBILE AD HOC NETWORK: A REVIEW
...Show More Authors

Mobile ad hoc network security is a new area for research that it has been faced many difficulties to implement. These difficulties are due to the absence of central authentication server, the dynamically movement of the nodes (mobility), limited capacity of the wireless medium and the various types of vulnerability attacks. All these factor combine to make mobile ad hoc a great challenge to the researcher. Mobile ad hoc has been used in different applications networks range from military operations and emergency disaster relief to community networking and interaction among meeting attendees or students during a lecture. In these and other ad hoc networking applications, security in the routing protocol is necessary to protect against malic

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (5)
Scopus Crossref
Publication Date
Wed Feb 25 2026
Journal Name
Economics And Administrative Studies Journal (easj) (formerly Al-dananeer Journal)
The use of the MADC indicator for entry and exit from financial market.
...Show More Authors

View Publication
Publication Date
Sun Mar 01 2020
Journal Name
Baghdad Science Journal
Dynamic Response of a Nonlinear Fabry-Perot Etalon for Various Medium Response Times
...Show More Authors

     In this work, the switching nonlinear dynamics of a Fabry-Perot etalon are studied. The method used to complete the solution of the differential equations for the nonlinear medium. The Debye relaxation equations solved numerically to predict the behavior of the cavity for modulated input power. The response of the cavity filled with materials of different response time is depicted. For a material with a response time equal to = 50 ns, the cavity switches after about (100 ns). Notice that there is always a finite time delay before the cavity switches. The switch up time is much longer than the cavity build-up time of the corresponding linear cavity which was found to be of the order of a few round-trip ti

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Tue Sep 29 2020
Journal Name
Reaction Kinetics, Mechanisms And Catalysis
Development of two-step noncatalytic esterification of waste cooking oil for biodiesel preparation
...Show More Authors

An innovative two-step noncatalytic esterifcation technique was proposed to synthesize alkyl esters from free fatty acids simulated in waste cooking oil, as a pretreatment process for biodiesel production, without adding any catalyst under normal conditions of pressure and temperature. The efect of methanol:oil molar ratio, reaction time, mixing rate, and reaction temperature were investigated. The results confrmed that the conversion of the reaction was increased when increasing the methanol molar ratio and decreased in prolonged reaction temperature. High conversion (94.545%) was successfully achieved at optimized conditions of 115:1, 65:1 methanol:oil molar ratio in the frst step and second step, respectively, other conditions i

... Show More
Crossref (7)
Crossref
Publication Date
Wed Jun 27 2018
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Building Geological Model for Tertiary Reservoir of Exploration Ismail Oil Field, North Iraq
...Show More Authors

Geologic modeling is the art of constructing a structural and stratigraphic model of a reservoir from analyses and interpretations of seismic data, log data, core data, etc. ‎[1].

   A static reservoir model typically involves four main stages, these stages are Structural modeling, Stratigraphic modeling, Lithological modeling and Petrophysical modeling ‎[2].

   Ismail field is exploration structure, located in the north Iraq, about 55 km north-west of Kirkuk city, to the north-west of the Bai Hassan field, the distance between the Bai Hassan field and Ismael field is about one kilometer ‎[3].

   Tertiary period reservoir sequences (Main Limestone), which comprise many economica

... Show More
View Publication Preview PDF
Publication Date
Wed Nov 01 2017
Journal Name
Journal Of Economics And Administrative Sciences
Estimate missing value by use analyses of covariance method for split block-design
...Show More Authors

The research aims to estimate missing values using covariance analysis method Coons way to the variable response or dependent variable that represents the main character studied in a type of multi-factor designs experiments called split block-design (SBED) so as to increase the accuracy of the analysis results and the accuracy of statistical tests based on this type of designs. as it was noted in the theoretical aspect to the design of dissident sectors and statistical analysis have to analyze the variation in the experience of experiment )SBED) and the use of covariance way coons analysis according to two methods to estimate the missing value, either in the practical side of it has been implemented field experiment wheat crop in

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Dec 03 2017
Journal Name
Baghdad Science Journal
Bayes and Non-Bayes Estimation Methods for the Parameter of Maxwell-Boltzmann Distribution
...Show More Authors

In this paper, point estimation for parameter ? of Maxwell-Boltzmann distribution has been investigated by using simulation technique, to estimate the parameter by two sections methods; the first section includes Non-Bayesian estimation methods, such as (Maximum Likelihood estimator method, and Moment estimator method), while the second section includes standard Bayesian estimation method, using two different priors (Inverse Chi-Square and Jeffrey) such as (standard Bayes estimator, and Bayes estimator based on Jeffrey's prior). Comparisons among these methods were made by employing mean square error measure. Simulation technique for different sample sizes has been used to compare between these methods.

View Publication Preview PDF
Scopus (5)
Crossref (1)
Scopus Crossref
Publication Date
Sun Mar 01 2020
Journal Name
Journal Of Engineering
Evaluation of Fatigue Behavior of Epoxy Coatings used for Potable Water Storage Tanks
...Show More Authors

In this paper, three types of epoxy-based coatings (Polyamide, pure Polyamine, and Polyamine reinforced by glass-flake) used as a lining for potable water tanks were studied using experimental and finite element methods. Tensile, impact, and fatigue tests were conducted on uncoated and coated AISI 316 stainless steel. The test results show that the applied epoxy based coating improves the mechanical properties, increases of fatigue crack resistance, and enhance the dynamic fracture toughness. The fatigue crack propagation is influenced by the compositions of epoxy coating, and the glass-flake improves the coating resistance to fatigue crack propagation compared to other types.

View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Mon Aug 01 2022
Journal Name
Monatshefte Für Chemie - Chemical Monthly
Al-, Ga-, and In-decorated BP nanotubes as chemical sensors for 2-chloroethanol
...Show More Authors

B3LYP density functional is utilized for probing the effect of decorating Al, Ga, and In on the sensing performance of a boron phosphide nanotube (BPNT) in detecting the 2-chloroethanol (CHE) molecule. We predict that the interaction of pure BPNT with CHE is physisorption, and the sensing response (SR) of BPNT is approximately 6.3. The adsorption energy of CHE is about − 26.3 to − 91.1, − 96.6, and − 100.3 kJ/mol, when the Al, Ga, and In metals are decorated on the BPNT surface, respectively. This indicates that the decorated metals significantly strength the interaction. Also, the corresponding SR meaningfully rises to 19.4, 41.0, and 93.4, indicating that by increasing the atomic number of metals, the sensitivity i

... Show More
View Publication
Scopus (14)
Crossref (11)
Scopus Clarivate Crossref