Preferred Language
Articles
/
XRbFvYoBVTCNdQwCj6Qw
Four Char DNA Encoding for Anomaly Intrusion Detection System
...Show More Authors

Recent research has shown that a Deoxyribonucleic Acid (DNA) has ability to be used to discover diseases in human body as its function can be used for an intrusion-detection system (IDS) to detect attacks against computer system and networks traffics. Three main factor influenced the accuracy of IDS based on DNA sequence, which is DNA encoding method, STR keys and classification method to classify the correctness of proposed method. The pioneer idea on attempt a DNA sequence for intrusion detection system is using a normal signature sequence with alignment threshold value, later used DNA encoding based cryptography, however the detection rate result is very low. Since the network traffic consists of 41 attributes, therefore we proposed the most possible less character number (same DNA length) which is four-character DNA encoding that represented all 41 attributes known as DEM4all. The experiments conducted using standard data KDDCup 99 and NSL-KDD. Teiresias algorithm is used to extract Short Tandem Repeat (STR), which includes both keys and their positions in the network traffic, while Brute-force algorithm is used as a classification process to determine whether the network traffic is attack or normal. Experiment run 30 times for each DNA encoding method. The experiment result shows that proposed method has performed better accuracy (15% improved) compare with previous and state of the art DNA algorithms. With such results it can be concluded that the proposed DEM4all DNA encoding method is a good method that can used for IDS. More complex encoding can be proposed that able reducing less number of DNA sequence can possible produce more detection accuracy.

Scopus Clarivate Crossref
View Publication
Publication Date
Fri Sep 15 2023
Journal Name
Al-academy
Four Women: The E. Cassirer’s Theory and Its Analytical Potential for Understanding Iraqi Symbolic Painting by J. Saleem
...Show More Authors

Based on the theoretical ideas of E. Cassirer, a methodology is developed and an analysis of the painting work by J. Saleem, a representative of modern Iraqi painting, is carried out. While comparing the artistic programme of J. Saleem and the views of E. Cassirer, the methodological potential of the theory of the symbol for the art criticism analysis of the regional painting is clarified. Comparative analysis with the inclusion of the works of B. Buffet, B. Turetsky, J. Miro helps to see the multiple meanings of the same cultural symbol in thematically similar works of different years, created in different socio-cultural circumstances. The article shows that for regions with a shorter history (France, Russia, Spain, etc.), which have lo

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Sep 22 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
A study of Geomagnetic Field and It's secular variation at the Location Brazilian Anomaly (25°S, 45°W).
...Show More Authors

ln this paper we study  and  analysis  the  total intensity  (P) .and the horizontal  component (H) of the geomagnetic field at the location na ly Brazilian    Anomaly  (Lat   25S,    long   4S·"W)    in  which   the geomagnetic field intensity  has a minimum  value. We examine the relationship. between  the { F , H) with altitude  at a certain latitude, and

.relationship  between  ( F,H ) with  the latitude  at  the certain  altitude

.We study  also  the nature  of the secular  variation  of the

... Show More
View Publication Preview PDF
Publication Date
Sat Jun 27 2020
Journal Name
Iraqi Journal Of Science
The Bouguer Anomaly Map of Iraq According to a New Local Theoretical Gravity Equation and Its Geological Importance
...Show More Authors

Four hundred and seventy eight gravity base stations in Iraq were used to obtain a new local theoretical gravity equation. The obtained equation was used to construct a Bouguer anomaly map of Iraq depending on the available gravity base stations. This map was compared with the Bouguer map constructed for the same stations using the international formula (1930). Good similarity in shapes and locations of the anomaly were observed, while the   gravity anomaly values in the new map were increased by about 30 mGal. The eastern zero gravity contour line of the new obtained gravity map coincides with the western  boundary of the tectonic Mesopotamian zone, while the main negative  gravity values coincide with the Mesopotami

... Show More
View Publication Preview PDF
Scopus (5)
Crossref (2)
Scopus Crossref
Publication Date
Sat Jan 01 2022
Journal Name
Journal Of Al-farabi For Engineering Sciences Vol
Prototyping of Multi-Factors Based Vehicle Accident Detection and Reporting System Relying on GPS and GSM
...Show More Authors

Preview PDF
Publication Date
Thu Jan 12 2017
Journal Name
Water
UV-LEDs Efficiently Inactivate DNA and RNA Coliphages
...Show More Authors

View Publication
Scopus (11)
Crossref (8)
Scopus Clarivate Crossref
Publication Date
Fri Mar 01 2024
Journal Name
Baghdad Science Journal
Comparative Study of Genomic DNA Extraction Protocols from Whole Blood for P53 Gene Polymorphism in Persons with and without Prostate Cancer
...Show More Authors

In latest decades, genetic methods have developed into a potent tool in a number of life-attaching applications. In research looking at demographic genetic diversity, QTL detection, marker-assisted selection, and food traceability, DNA-based technologies like PCR are being employed more and more. These approaches call for extraction procedures that provide efficient nucleic acid extraction and the elimination of PCR inhibitors. The first and most important stage in molecular biology is the extraction of DNA from cells. For a molecular scientist, the high quality and integrity of the isolated DNA as well as the extraction method's ease of use and affordability are crucial factors. The present study was designed to establish a simple, fast

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Fri Jun 30 2023
Journal Name
Iraqi Journal Of Science
Using Retrieved Sources for Semantic and Lexical Plagiarism Detection
...Show More Authors

     Plagiarism is described as using someone else's ideas or work without their permission. Using lexical and semantic text similarity notions, this paper presents a plagiarism detection system for examining suspicious texts against available sources on the Web. The user can upload suspicious files in pdf or docx formats. The system will search three popular search engines for the source text (Google, Bing, and Yahoo) and try to identify the top five results for each search engine on the first retrieved page. The corpus is made up of the downloaded files and scraped web page text of the search engines' results. The corpus text and suspicious documents will then be encoded as vectors. For lexical plagiarism detection, the system will

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Sun Jul 01 2012
Journal Name
Journal Of The Faculty Of Medicine Baghdad
The effect of laser radiation on DNA damage and repair
...Show More Authors

Background: The effect of Helium Neon laser (He-Ne 632.8 nm) was reported to protect cells from damage. We studied lymphocyte cells pre irradiated with (UVC 260 nm) to induce DNA damage. Investigations were carried using gel electrophoresis and test for cell viability. It has also been reported that effect depends on incubation period after damage. The extent of damage to the cells depends on the period of irradiation with UVC also on its intensity.
Objective: In this work we studied the effect of UVC on DNA damage and cell survival
Also study of the effect of He-Ne laser on cell survival after all being pre irradiated with UVC light and its protective effect on DNA post UV damage.
Method: This study was conducted in pathology d

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sun Jan 16 2022
Journal Name
Iraqi Journal Of Science
Simulations of Four Types of Optical Aberrations using Zernik Polynomials
...Show More Authors

In this paper, a computer simulation is implemented to generate of an optical aberration by means of Zernike polynomials. Defocus, astigmatism, coma, and spherical Zernike aberrations were simulated in a subroutine using MATLAB function and applied as a phase error in the aperture function of an imaging system. The studying demonstrated that the Point Spread Function (PSF) and Modulation Transfer Function (MTF) have been affected by these optical aberrations. Areas under MTF for different radii of the aperture of imaging system have been computed to assess the quality and efficiency of optical imaging systems. Phase conjugation of these types aberration has been utilized in order to correct a distorted wavefront. The results showed that

... Show More
View Publication Preview PDF
Publication Date
Sat Oct 20 2018
Journal Name
Journal Of Economics And Administrative Sciences
Bayesian Tobit Quantile Regression Model Using Four Level Prior Distributions
...Show More Authors

Abstract:

      In this research we discussed the parameter estimation and variable selection in Tobit quantile regression model in present of multicollinearity problem. We used elastic net technique as an important technique for dealing with both multicollinearity and variable selection. Depending on the data we proposed Bayesian Tobit hierarchical model with four level prior distributions . We assumed both tuning parameter are random variable and estimated them with the other unknown parameter in the model .Simulation study was used for explain the efficiency of the proposed method and then we compared our approach with (Alhamzwi 2014 & standard QR) .The result illustrated that our approach

... Show More
View Publication Preview PDF
Crossref