Preferred Language
Articles
/
XRbFvYoBVTCNdQwCj6Qw
Four Char DNA Encoding for Anomaly Intrusion Detection System
...Show More Authors

Recent research has shown that a Deoxyribonucleic Acid (DNA) has ability to be used to discover diseases in human body as its function can be used for an intrusion-detection system (IDS) to detect attacks against computer system and networks traffics. Three main factor influenced the accuracy of IDS based on DNA sequence, which is DNA encoding method, STR keys and classification method to classify the correctness of proposed method. The pioneer idea on attempt a DNA sequence for intrusion detection system is using a normal signature sequence with alignment threshold value, later used DNA encoding based cryptography, however the detection rate result is very low. Since the network traffic consists of 41 attributes, therefore we proposed the most possible less character number (same DNA length) which is four-character DNA encoding that represented all 41 attributes known as DEM4all. The experiments conducted using standard data KDDCup 99 and NSL-KDD. Teiresias algorithm is used to extract Short Tandem Repeat (STR), which includes both keys and their positions in the network traffic, while Brute-force algorithm is used as a classification process to determine whether the network traffic is attack or normal. Experiment run 30 times for each DNA encoding method. The experiment result shows that proposed method has performed better accuracy (15% improved) compare with previous and state of the art DNA algorithms. With such results it can be concluded that the proposed DEM4all DNA encoding method is a good method that can used for IDS. More complex encoding can be proposed that able reducing less number of DNA sequence can possible produce more detection accuracy.

Scopus Clarivate Crossref
View Publication
Publication Date
Fri Jun 24 2022
Journal Name
Iraqi Journal Of Science
Determination of Mefenamic Acid Using a New Mode of Irradiation (Array of Six Identical LEDs) and Detection( Twin Solar Cells) Through Turbidity Measurement by CFIA
...Show More Authors

A newly developed analytical method characterized by its speed and sensitivity for the determination of mefenamic acid (MFA) in pure and pharmaceutical preparation is established via turbidimetric measurement (0-180o) by Ayah 6SX1-ST-2D Solar cell CFI Analyser . The method was based on the reaction of
phosphomolybdic acid with mefenamic acid in aqueous medium to form blue color precipitate as an ion-pair complex . Turbidity was measured via the reflection of incident light that collides on the surface precipitated particles at 0-180o . The chemical and physical parameters were studied and optimized. The calibration graph was linear in the range of 0.3-7 or 0.3-10 mMol.L-1, with correlation coefficient r = 0.9907 or 0.9556 respectively

... Show More
View Publication Preview PDF
Publication Date
Mon Oct 25 2021
Journal Name
Iraqi Journal Of Science
Detection of Active Compounds in the Water Extract of Foeniculum Vulgare L. and Its Effects on Serum Estrogen and Prolactin Levels in Female Albino Rats
...Show More Authors

      The present study was designed to estimate the active ingredients in the aqueous extract of fennel Foeniculum vulgare L. fruits and test the effects of different concentrations of the extract on serum estrogen and prolactin levels in female rats.  The work was conducted to prepare the aqueous extract in the laboratory, while the secondary active substances in the extract were estimated using High-Performance Liquid Chromatography (HPLC) technology. The experiments were conducted in the animal house of the College of Science, Tikrit university,on a total of 12 adult albino virgin female rats divided into four groups, each having three rats.The aqueous extract of the fruit plant was administrate

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Wed Feb 08 2023
Journal Name
Iraqi Journal Of Science
A Modified Key Scheduling Algorithm for RC4
...Show More Authors

Rivest Cipher 4 (RC4) is an efficient stream cipher that is commonly used in internet protocols. However, there are several flaws in the key scheduling algorithm (KSA) of RC4. The contribution of this paper is to overcome some of these weaknesses by proposing a new version of KSA coined as modified KSA . In the initial state of the array is suggested to contain random values instead of the identity permutation. Moreover, the permutation of the array is modified to depend on the key value itself. The proposed performance is assessed in terms of cipher secrecy, randomness test and time under a set of experiments with variable key size and different plaintext size. The results show that the RC4 with improves the randomness and secrecy with

... Show More
View Publication Preview PDF
Publication Date
Sat Sep 30 2017
Journal Name
Al-khwarizmi Engineering Journal
A Cognitive Hybrid Tuning Control Algorithm Design for Nonlinear Path-Tracking Controller for Wheeled Mobile Robot
...Show More Authors

Abstract

This research presents a on-line cognitive tuning control algorithm for the nonlinear controller of path-tracking for dynamic wheeled mobile robot to stabilize and follow a continuous reference path with minimum tracking pose error. The goal of the proposed structure of a hybrid (Bees-PSO) algorithm is to find and tune the values of the control gains of the nonlinear (neural and back-stepping method) controllers as a simple on-line with fast tuning techniques in order to obtain the best torques actions of the wheels for the cart mobile robot from the proposed two controllers. Simulation results (Matlab Package 2012a) show that the nonlinear neural controller with hybrid Bees-PSO cognitive algorithm is m

... Show More
View Publication Preview PDF
Publication Date
Sun Jan 14 2018
Journal Name
Journal Of Engineering
Determination Optimum Inventory Level for Material Using Genetic Algorithm
...Show More Authors

The integration of decision-making will lead to the robust of its decisions, and then determination optimum inventory level to the required materials to produce and reduce the total cost by the cooperation of purchasing department with inventory department and also with other company,s departments. Two models are suggested to determine Optimum Inventory Level (OIL), the first model (OIL-model 1) assumed that the inventory level for materials quantities equal to the required materials, while the second model (OIL-model 2) assumed that the inventory level for materials quantities more than the required materials for the next period.             &nb

... Show More
View Publication Preview PDF
Publication Date
Mon Jan 02 2017
Journal Name
European Journal Of Scientific Research
Fast approach for arabic text encryption using genetic algorithm
...Show More Authors

As s widely use of exchanging private information in various communication applications, the issue to secure it became top urgent. In this research, a new approach to encrypt text message based on genetic algorithm operators has been proposed. The proposed approach follows a new algorithm of generating 8 bit chromosome to encrypt plain text after selecting randomly crossover point. The resulted child code is flipped by one bit using mutation operation. Two simulations are conducted to evaluate the performance of the proposed approach including execution time of encryption/decryption and throughput computations. Simulations results prove the robustness of the proposed approach to produce better performance for all evaluation metrics with res

... Show More
Publication Date
Sun Dec 02 2012
Journal Name
Baghdad Science Journal
Stability of Back Propagation Training Algorithm for Neural Networks
...Show More Authors

In this paper, we derive and prove the stability bounds of the momentum coefficient µ and the learning rate ? of the back propagation updating rule in Artificial Neural Networks .The theoretical upper bound of learning rate ? is derived and its practical approximation is obtained

View Publication Preview PDF
Crossref
Publication Date
Thu Jun 15 2023
Journal Name
Journal Of Population Therapeutics And Clinical Pharmacology
Detection the Phylogenetic groups of E. coli that isolated from diarrheal in children under five years and study their relationship of common serotypes in Baghdad hospitals.
...Show More Authors

Preview PDF
Publication Date
Sun Apr 30 2023
Journal Name
Iraqi Journal Of Science
Detection of A Possible Subsurface Water Seepage Using 2D Electrical Resistivity Imaging Survey at a site in Al-Khwarizmi College of Engineering, University of Baghdad, Iraq
...Show More Authors

     Unknown subsurface leaking water sources and possible subsurface seepage from a sewage tank in a garden at Al-Khawarizmi engineering college, University of Baghdad, were detected in this study. The 2D electrical resistivity imaging. The ERI survey is carried out along two lines, 60m and 50m long, with an electrode spacing of 1 m, forming a cross using the Wenner-Schlumberger array configuration. Line 1 is 60m, while line 2 is 50m. Soil samples were collected from line 1 at positions of electrode 34, which shows a high resistivity value, and electrode 55, which shows low resistivity, for laboratory analysis. Robust inversion and modelling processes showed relative change and high contrast in interpreted resistivities. Soil analy

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Fri Jan 01 2016
Journal Name
Journal Of Engineering
Enhanced Chain-Cluster Based Mixed Routing Algorithm for Wireless Sensor Networks
...Show More Authors

Energy efficiency is a significant aspect in designing robust routing protocols for wireless sensor networks (WSNs). A reliable routing protocol has to be energy efficient and adaptive to the network size. To achieve high energy conservation and data aggregation, there are two major techniques, clusters and chains. In clustering technique, sensor networks are often divided into non-overlapping subsets called clusters. In chain technique, sensor nodes will be connected with the closest two neighbors, starting with the farthest node from the base station till the closest node to the base station. Each technique has its own advantages and disadvantages which motivate some researchers to come up with a hybrid routing algorit

... Show More
View Publication Preview PDF