Recent research has shown that a Deoxyribonucleic Acid (DNA) has ability to be used to discover diseases in human body as its function can be used for an intrusion-detection system (IDS) to detect attacks against computer system and networks traffics. Three main factor influenced the accuracy of IDS based on DNA sequence, which is DNA encoding method, STR keys and classification method to classify the correctness of proposed method. The pioneer idea on attempt a DNA sequence for intrusion detection system is using a normal signature sequence with alignment threshold value, later used DNA encoding based cryptography, however the detection rate result is very low. Since the network traffic consists of 41 attributes, therefore we proposed the most possible less character number (same DNA length) which is four-character DNA encoding that represented all 41 attributes known as DEM4all. The experiments conducted using standard data KDDCup 99 and NSL-KDD. Teiresias algorithm is used to extract Short Tandem Repeat (STR), which includes both keys and their positions in the network traffic, while Brute-force algorithm is used as a classification process to determine whether the network traffic is attack or normal. Experiment run 30 times for each DNA encoding method. The experiment result shows that proposed method has performed better accuracy (15% improved) compare with previous and state of the art DNA algorithms. With such results it can be concluded that the proposed DEM4all DNA encoding method is a good method that can used for IDS. More complex encoding can be proposed that able reducing less number of DNA sequence can possible produce more detection accuracy.
A newly developed analytical method characterized by its speed and sensitivity for the determination of mefenamic acid (MFA) in pure and pharmaceutical preparation is established via turbidimetric measurement (0-180o) by Ayah 6SX1-ST-2D Solar cell CFI Analyser . The method was based on the reaction of
phosphomolybdic acid with mefenamic acid in aqueous medium to form blue color precipitate as an ion-pair complex . Turbidity was measured via the reflection of incident light that collides on the surface precipitated particles at 0-180o . The chemical and physical parameters were studied and optimized. The calibration graph was linear in the range of 0.3-7 or 0.3-10 mMol.L-1, with correlation coefficient r = 0.9907 or 0.9556 respectively
The present study was designed to estimate the active ingredients in the aqueous extract of fennel Foeniculum vulgare L. fruits and test the effects of different concentrations of the extract on serum estrogen and prolactin levels in female rats. The work was conducted to prepare the aqueous extract in the laboratory, while the secondary active substances in the extract were estimated using High-Performance Liquid Chromatography (HPLC) technology. The experiments were conducted in the animal house of the College of Science, Tikrit university,on a total of 12 adult albino virgin female rats divided into four groups, each having three rats.The aqueous extract of the fruit plant was administrate
... Show MoreRivest Cipher 4 (RC4) is an efficient stream cipher that is commonly used in internet protocols. However, there are several flaws in the key scheduling algorithm (KSA) of RC4. The contribution of this paper is to overcome some of these weaknesses by proposing a new version of KSA coined as modified KSA . In the initial state of the array is suggested to contain random values instead of the identity permutation. Moreover, the permutation of the array is modified to depend on the key value itself. The proposed performance is assessed in terms of cipher secrecy, randomness test and time under a set of experiments with variable key size and different plaintext size. The results show that the RC4 with improves the randomness and secrecy with
... Show MoreAbstract
This research presents a on-line cognitive tuning control algorithm for the nonlinear controller of path-tracking for dynamic wheeled mobile robot to stabilize and follow a continuous reference path with minimum tracking pose error. The goal of the proposed structure of a hybrid (Bees-PSO) algorithm is to find and tune the values of the control gains of the nonlinear (neural and back-stepping method) controllers as a simple on-line with fast tuning techniques in order to obtain the best torques actions of the wheels for the cart mobile robot from the proposed two controllers. Simulation results (Matlab Package 2012a) show that the nonlinear neural controller with hybrid Bees-PSO cognitive algorithm is m
... Show MoreThe integration of decision-making will lead to the robust of its decisions, and then determination optimum inventory level to the required materials to produce and reduce the total cost by the cooperation of purchasing department with inventory department and also with other company,s departments. Two models are suggested to determine Optimum Inventory Level (OIL), the first model (OIL-model 1) assumed that the inventory level for materials quantities equal to the required materials, while the second model (OIL-model 2) assumed that the inventory level for materials quantities more than the required materials for the next period. &nb
... Show MoreAs s widely use of exchanging private information in various communication applications, the issue to secure it became top urgent. In this research, a new approach to encrypt text message based on genetic algorithm operators has been proposed. The proposed approach follows a new algorithm of generating 8 bit chromosome to encrypt plain text after selecting randomly crossover point. The resulted child code is flipped by one bit using mutation operation. Two simulations are conducted to evaluate the performance of the proposed approach including execution time of encryption/decryption and throughput computations. Simulations results prove the robustness of the proposed approach to produce better performance for all evaluation metrics with res
... Show MoreIn this paper, we derive and prove the stability bounds of the momentum coefficient µ and the learning rate ? of the back propagation updating rule in Artificial Neural Networks .The theoretical upper bound of learning rate ? is derived and its practical approximation is obtained
Unknown subsurface leaking water sources and possible subsurface seepage from a sewage tank in a garden at Al-Khawarizmi engineering college, University of Baghdad, were detected in this study. The 2D electrical resistivity imaging. The ERI survey is carried out along two lines, 60m and 50m long, with an electrode spacing of 1 m, forming a cross using the Wenner-Schlumberger array configuration. Line 1 is 60m, while line 2 is 50m. Soil samples were collected from line 1 at positions of electrode 34, which shows a high resistivity value, and electrode 55, which shows low resistivity, for laboratory analysis. Robust inversion and modelling processes showed relative change and high contrast in interpreted resistivities. Soil analy
... Show MoreEnergy efficiency is a significant aspect in designing robust routing protocols for wireless sensor networks (WSNs). A reliable routing protocol has to be energy efficient and adaptive to the network size. To achieve high energy conservation and data aggregation, there are two major techniques, clusters and chains. In clustering technique, sensor networks are often divided into non-overlapping subsets called clusters. In chain technique, sensor nodes will be connected with the closest two neighbors, starting with the farthest node from the base station till the closest node to the base station. Each technique has its own advantages and disadvantages which motivate some researchers to come up with a hybrid routing algorit
... Show More