Preferred Language
Articles
/
XRbFvYoBVTCNdQwCj6Qw
Four Char DNA Encoding for Anomaly Intrusion Detection System
...Show More Authors

Recent research has shown that a Deoxyribonucleic Acid (DNA) has ability to be used to discover diseases in human body as its function can be used for an intrusion-detection system (IDS) to detect attacks against computer system and networks traffics. Three main factor influenced the accuracy of IDS based on DNA sequence, which is DNA encoding method, STR keys and classification method to classify the correctness of proposed method. The pioneer idea on attempt a DNA sequence for intrusion detection system is using a normal signature sequence with alignment threshold value, later used DNA encoding based cryptography, however the detection rate result is very low. Since the network traffic consists of 41 attributes, therefore we proposed the most possible less character number (same DNA length) which is four-character DNA encoding that represented all 41 attributes known as DEM4all. The experiments conducted using standard data KDDCup 99 and NSL-KDD. Teiresias algorithm is used to extract Short Tandem Repeat (STR), which includes both keys and their positions in the network traffic, while Brute-force algorithm is used as a classification process to determine whether the network traffic is attack or normal. Experiment run 30 times for each DNA encoding method. The experiment result shows that proposed method has performed better accuracy (15% improved) compare with previous and state of the art DNA algorithms. With such results it can be concluded that the proposed DEM4all DNA encoding method is a good method that can used for IDS. More complex encoding can be proposed that able reducing less number of DNA sequence can possible produce more detection accuracy.

Scopus Clarivate Crossref
View Publication
Publication Date
Tue Feb 01 2022
Journal Name
Baghdad Science Journal
Retina Based Glowworm Swarm Optimization for Random Cryptographic Key Generation
...Show More Authors

The biometric-based keys generation represents the utilization of the extracted features from the human anatomical (physiological) traits like a fingerprint, retina, etc. or behavioral traits like a signature. The retina biometric has inherent robustness, therefore, it is capable of generating random keys with a higher security level compared to the other biometric traits. In this paper, an effective system to generate secure, robust and unique random keys based on retina features has been proposed for cryptographic applications. The retina features are extracted by using the algorithm of glowworm swarm optimization (GSO) that provides promising results through the experiments using the standard retina databases. Additionally, in order t

... Show More
View Publication Preview PDF
Scopus (10)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Wed Sep 13 2023
Journal Name
Aip Conference Proceedings
Results for the (b,t)-blocking sets in PG(2,8)
...Show More Authors

View Publication
Scopus (2)
Scopus Crossref
Publication Date
Wed Feb 01 2023
Journal Name
Practice Periodical On Structural Design And Construction
Best Practice Strategies for Workforce Development and Sustainability in Construction
...Show More Authors

View Publication
Scopus (11)
Crossref (8)
Scopus Clarivate Crossref
Publication Date
Sat Aug 27 2022
Journal Name
Egyptian Journal Of Chemistry
Evaluation of Zinc Chelation Ability for Non-Hydroxamic Organic Moieties
...Show More Authors

View Publication
Scopus (8)
Scopus Clarivate Crossref
Publication Date
Fri Mar 31 2023
Journal Name
Iraqi Geological Journal
Glass Wastes Sorption Efficiency for Removing Cadmium from Aqueous Solutions
...Show More Authors

This research aims to test the ability of glass waste powder to adsorb cadmium from aqueous solutions. The glass wastes were collected from the Glass Manufacturing Factory in Ramadi. The effect of concentration and reaction time on sorption was tested through a series of laboratory experiments. Four Cd concentrations (20, 40, 60, and 80) as each concentration was tested ten times for 5, 10, 15, 20, 25, 30, 35, 40, 45, and 50 min. Solid (glass wastes) to liquid was 2g to 30ml was fixed in each experiment where the total volume of the solution was 30ml. The pH, total dissolved salts and electrical conductivity were measured at 30ºC. The equilibrium concentration was determined at 25 minutes, thereafter it was noted that the sorption

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Jul 21 2025
Journal Name
Journal Of Engineering
Construction of a General-Purpose Infrastructure for Rfid – Based Applications
...Show More Authors

View Publication
Publication Date
Sat Jan 03 2015
Journal Name
Journal Of Engineering And Development
3D Presentation for Baghdad University Buildings Using Total Station Device
...Show More Authors

capable of the measuring with a high degree of precision in a single instrument. Total stations device are used for station setting up, setting-outmany points from one station. Their major purpose of this work is to take advantage of total station for setting up building and to establish 3D representation using AutoCAD program. The area of the study was Civil Engineering Department at Baghdad University campus AL Jadiriyah. The completion of the work is done in two stages; 1. The field work: In this stage, the Total Station Nikon Nivo-5C was selected for the current study. This device was measured horizontal and vertical distance, elevations, and coordinates from a single set up. This data directly stored on memory. 2. The office work: In t

... Show More
Publication Date
Tue Sep 30 2014
Journal Name
Iosr Journal Of Mathematics
Modification Adomian Decomposition Method for solving Seventh OrderIntegro-Differential Equations
...Show More Authors

In this paper, a method based on modified adomian decomposition method for solving Seventh order integro-differential equations (MADM). The distinctive feature of the method is that it can be used to find the analytic solution without transformation of boundary value problems. To test the efficiency of the method presented two examples are solved by proposed method.

View Publication
Publication Date
Sun Sep 05 2010
Journal Name
Baghdad Science Journal
Volterra Runge- Kutta Methods for Solving Nonlinear Volterra Integral Equations
...Show More Authors

In this paper Volterra Runge-Kutta methods which include: method of order two and four will be applied to general nonlinear Volterra integral equations of the second kind. Moreover we study the convergent of the algorithms of Volterra Runge-Kutta methods. Finally, programs for each method are written in MATLAB language and a comparison between the two types has been made depending on the least square errors.

View Publication Preview PDF
Crossref
Publication Date
Sat Jan 01 2005
Journal Name
Iraqi Journal Of Science
Comparison between Zernike moment and central moments for matching problem
...Show More Authors

Moment invariants have wide applications in image recognition since they were proposed.