Preferred Language
Articles
/
XRbFvYoBVTCNdQwCj6Qw
Four Char DNA Encoding for Anomaly Intrusion Detection System
...Show More Authors

Recent research has shown that a Deoxyribonucleic Acid (DNA) has ability to be used to discover diseases in human body as its function can be used for an intrusion-detection system (IDS) to detect attacks against computer system and networks traffics. Three main factor influenced the accuracy of IDS based on DNA sequence, which is DNA encoding method, STR keys and classification method to classify the correctness of proposed method. The pioneer idea on attempt a DNA sequence for intrusion detection system is using a normal signature sequence with alignment threshold value, later used DNA encoding based cryptography, however the detection rate result is very low. Since the network traffic consists of 41 attributes, therefore we proposed the most possible less character number (same DNA length) which is four-character DNA encoding that represented all 41 attributes known as DEM4all. The experiments conducted using standard data KDDCup 99 and NSL-KDD. Teiresias algorithm is used to extract Short Tandem Repeat (STR), which includes both keys and their positions in the network traffic, while Brute-force algorithm is used as a classification process to determine whether the network traffic is attack or normal. Experiment run 30 times for each DNA encoding method. The experiment result shows that proposed method has performed better accuracy (15% improved) compare with previous and state of the art DNA algorithms. With such results it can be concluded that the proposed DEM4all DNA encoding method is a good method that can used for IDS. More complex encoding can be proposed that able reducing less number of DNA sequence can possible produce more detection accuracy.

Scopus Clarivate Crossref
View Publication
Publication Date
Tue Oct 31 2023
Journal Name
College Of Islamic Sciences
Asking for permission and its legal ruling
...Show More Authors

Praise be to God, Lord of the Worlds, and the best blessings and peace be upon our master Muhammad and all his family and companions, and those who follow them with goodness until the Day of Judgment. . And after:

God created man in the best manner, and subjugated the universe to him and favored him over the rest of creation when he gave him a mind to contemplate and know how to distinguish between the harmful and the beneficial, the bad and the good, in order to exploit him in achieving the meaning of worship, because it is the highest goal of his creation. God Almighty said (And I did not create the jinn and mankind. Except that they worship them.” [Al-Dhariyat: 56]

If knowing what is harmful from what is beneficial a

... Show More
View Publication Preview PDF
Publication Date
Sat Dec 30 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
New Proposed Method For Web Services Security
...Show More Authors

TI1e Web service securi ty challenge is to understand  and  assess the risk  involved  in securing  a web-based  service  today, based on our existing security technology, and at the same time tmck emerging standards and  understand  how they will be used  to offset the risk in

new web services. Any  security model must  i llustrate  how data  can

now  through   an  application   and   network   topology  to  meet  the

requirements  defined  by the busi ness  wi thout exposing  the data  to undue  risk.  In this paper  we propose &n

... Show More
View Publication Preview PDF
Publication Date
Sun Mar 12 2017
Journal Name
Al-academy
Alienation form for ornament’s clouds in Quran
...Show More Authors

This research attend about Alienation form for ornament’s clouds in Quran, which includes four parts, the first part talks about the research problem, the researcher identified by following question :( what’s the Alienation form for ornament’s clouds in Quran?). And then the research importance. The research goal talks about Alienation form for ornament’s clouds in Quran. And also research borders, likes means objectives borders, places borders, As well as Terms Definitions, in second part talks about Theoretical framework and previous studies, includes two parts, the first one study Alienation form, meaning and understandable, the second one talks about Alienation form in Islamic arts, As well as the researcher find only one stu

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Mar 04 2023
Journal Name
Baghdad Science Journal
Exploration of CPCD number for power graph
...Show More Authors

Recently, complementary perfect corona domination in graphs was introduced. A dominating set S of a graph G is said to be a complementary perfect corona dominating set (CPCD – set) if each vertex in  is either a pendent vertex or a support vertex and  has a perfect matching. The minimum cardinality of a complementary perfect corona dominating set is called the complementary perfect corona domination number and is denoted by . In this paper, our parameter hasbeen discussed for power graphs of path and cycle.

View Publication Preview PDF
Scopus Clarivate Crossref
Publication Date
Sat Jun 30 2012
Journal Name
Al-kindy College Medical Journal
Isosorbide Mononitrate versus Misoprostol for Cervical Ripening
...Show More Authors

Objective: To compare the efficacy and safety of isosorbide mononitrate (IMN) versus misoprostol used to induce labour for overdue pregnancy.
Setting: A prospective randomized clinical study conducted at AL-Elwiya Maternity Teaching Hospital in Baghdad from Jan. 2008 to Dec. 2008.
Method: One hundred and fifty women with over due pregnancy (past date and posterm pregnancy) referred for induction of labour with Bishop scores <_ 5 were randomly allocated to receive either forty mg isosorbide mononitrate (IMN) tablet as a single vaginal dose (n=75) or fifty mcg misoprostol vaginally (n=75) every six hrs for a maximum of three doses. Amniotomy and/or oxytocin infusion is considered when Bishop scores frankly progressed (augmentation

... Show More
View Publication Preview PDF
Publication Date
Fri Jan 19 2024
Journal Name
Turkish Journal Of Pharmaceutical Sciences
Taste Masking of Steroids for Oral Formulations
...Show More Authors

View Publication
Scopus (3)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Tue Nov 30 2021
Journal Name
Iraqi Journal Of Science
Intelligent Approaches for Enhancing Networked Routing Protocol
...Show More Authors

     The rapid evolution of wireless networking technologies opens the door to the evolution of the Wireless Sensor Networks (WSNs) and their applications in different fields. The WSN consists of small energy sensor nodes used in a harsh environment. The energy needed to communicate between the sensors networks can be identified as one of the major challenges. It is essential to avoid massive loss, or loss of packets, as well as rapid energy depletion and grid injustice, which lead to lower node efficiency and higher packet delivery delays. For this purpose, it was very important to track the usage of energy by nodes in order to improve general network efficiency by the use of intelligent methods to reduce the energy

... Show More
View Publication Preview PDF
Scopus (2)
Scopus Crossref
Publication Date
Mon Jun 01 2009
Journal Name
Al-khwarizmi Engineering Journal
Modeling and Filtering for Tracking Maneuvering Targets
...Show More Authors

     A new mathematical model describing the motion of manned maneuvering targets is presented. This model is simple to be implemented and closely represents the motion of maneuvering targets. The target maneuver or acceleration is correlated in time. Optimal Kalman filter is used as a tracking filter which results in effective tracker that prevents the loss of track or filter divergency that often occurs with conventional tracking filter when the target performs a moderate or heavy maneuver. Computer simulation studies show that the proposed tracker provides sufficient accuracy.

 

View Publication Preview PDF
Publication Date
Sun Dec 07 2014
Journal Name
Baghdad Science Journal
New Iterative Method for Solving Nonlinear Equations
...Show More Authors

The aim of this paper is to propose an efficient three steps iterative method for finding the zeros of the nonlinear equation f(x)=0 . Starting with a suitably chosen , the method generates a sequence of iterates converging to the root. The convergence analysis is proved to establish its five order of convergence. Several examples are given to illustrate the efficiency of the proposed new method and its comparison with other methods.

View Publication Preview PDF
Crossref
Publication Date
Fri Jun 01 2018
Journal Name
Journal Of Engineering
Derivation of Operation Rule for Ilisu Dam
...Show More Authors

Tigris River water that comes from Turkey represents the main water resource of this river in Iraq. The expansion in water river implementations has formed a source of trouble for the workers in the water resources management field in Iraqi. Unfortunately, there is no agreement between Iraq and Turkey till now to share the water of this international river. Consequently, the optimal operation of water resources systems, particularly a multi-objective, multi-reservoir, is of the most necessity at the present time.

 In this research two approaches, were used the dynamic programming (DP) approach and simulation model to find the optimal monthly operation of Ilisu Dam (from an Iraqi point of view) through a comp

... Show More
View Publication Preview PDF
Crossref (1)
Crossref