Preferred Language
Articles
/
XRbFvYoBVTCNdQwCj6Qw
Four Char DNA Encoding for Anomaly Intrusion Detection System
...Show More Authors

Recent research has shown that a Deoxyribonucleic Acid (DNA) has ability to be used to discover diseases in human body as its function can be used for an intrusion-detection system (IDS) to detect attacks against computer system and networks traffics. Three main factor influenced the accuracy of IDS based on DNA sequence, which is DNA encoding method, STR keys and classification method to classify the correctness of proposed method. The pioneer idea on attempt a DNA sequence for intrusion detection system is using a normal signature sequence with alignment threshold value, later used DNA encoding based cryptography, however the detection rate result is very low. Since the network traffic consists of 41 attributes, therefore we proposed the most possible less character number (same DNA length) which is four-character DNA encoding that represented all 41 attributes known as DEM4all. The experiments conducted using standard data KDDCup 99 and NSL-KDD. Teiresias algorithm is used to extract Short Tandem Repeat (STR), which includes both keys and their positions in the network traffic, while Brute-force algorithm is used as a classification process to determine whether the network traffic is attack or normal. Experiment run 30 times for each DNA encoding method. The experiment result shows that proposed method has performed better accuracy (15% improved) compare with previous and state of the art DNA algorithms. With such results it can be concluded that the proposed DEM4all DNA encoding method is a good method that can used for IDS. More complex encoding can be proposed that able reducing less number of DNA sequence can possible produce more detection accuracy.

Scopus Clarivate Crossref
View Publication
Publication Date
Tue Feb 01 2022
Journal Name
Int. J. Nonlinear Anal. Appl.
Computer-based plagiarism detection techniques: A comparative study
...Show More Authors

Plagiarism is becoming more of a problem in academics. It’s made worse by the ease with which a wide range of resources can be found on the internet, as well as the ease with which they can be copied and pasted. It is academic theft since the perpetrator has ”taken” and presented the work of others as his or her own. Manual detection of plagiarism by a human being is difficult, imprecise, and time-consuming because it is difficult for anyone to compare their work to current data. Plagiarism is a big problem in higher education, and it can happen on any topic. Plagiarism detection has been studied in many scientific articles, and methods for recognition have been created utilizing the Plagiarism analysis, Authorship identification, and

... Show More
Publication Date
Mon Feb 04 2019
Journal Name
Iraqi Journal Of Physics
Effects of Q-switched Nd: YAG laser irradiation on the aqueous solution of human albumin and calf-thymus double strand DNA (ctds)
...Show More Authors

Q-switched lasers widely used in management skin diseases and
sometimes its effect may be inadequate or associated with
cytotoxicity. The current study aimed to investigate the effect of
Q-switched Nd:YAG laser upon cellular elements using in vitro
experimental model. Aqueous solutions of human albumin and pure
calf thymus double strand deoxyribonucleic acid (ctdsDNA)
irradiated with Q-switched Nd:YAG laser at different rates (1, 3 Hz)
and time exposure (up to 60 seconds) using 532 nm (400 mJ) and
1064 (1200 mJ) nm wavelength with fixed spot size of 4 mm. The
effect of laser irradiation on the albumin solution also studied in the
presence of elemental salts of copper, zinc and iron.
Q-switched laser irrad

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Sep 22 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Effect of Alkaloids Extracts From Solanum nigrum L.(Solanaceae) in DNA -Plasmid PBR322 by Using Gel Electrophoresis
...Show More Authors

Four  alkaloids  compounds  were  extracted  from  the  fruits  and leaves, of plant known locally as (Anab AI-Thebe Solanum nigram), by various solvents systems, from an earlier study by the researcher. DNA tested its effect in plasmid PBR322 deportation  method using Gel Electrophoresis. Results showed that two of those extract for full effectiveness   digestible   pieces  of  RNA and  DNA  plasmid,   and digestive  partly  of  the  other  alternatives.  That  could  prove  results indicate that this type of alkaloids consist of   biological effectiveness of anti-twnors, through

... Show More
View Publication Preview PDF
Publication Date
Thu Mar 30 2017
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Genetic Variations of Echinococcus granulosus Isolated from Sheep and Cows by Using Fingerprint DNA Method in Iraq
...Show More Authors

The fingerprinting DNA method which depends on the unique pattern in this study was employed to detect the hydatid cyst of Echinococcus granulosus and to determine the genetic variation among their strains in different intermediate hosts (cows and sheep).  The unique pattern represents the number of amplified bands and their molecular weights with specialized sequences to one sample which different from the other samples.   Five hydatitd cysts samples  from cows and sheep were  collected, genetic analysis for  isolated DNA was done using PCR technique and  Random Amplified Polymorphic DNA reaction(RAPD) depending on (4) random primers, and the results showed:      

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Feb 01 2020
Journal Name
Journal Of Global Pharma Technology,
Doppler study and cell free DNA biomarkers by using PCR in hypertensive and diabetic pregnant iraqi women
...Show More Authors

Scopus
Publication Date
Sun Jun 30 2024
Journal Name
Academia Open
Lactobacillus, Bifidobacterium and Streptococcus, Probiotic Bacteria Supplements, Induce DNA Repair of Local Breast Cancer Cell Line AMJ13
...Show More Authors

General Background: Breast cancer is the most prevalent cancer affecting women, with increasing incidence worldwide. Specific Background: Recent research has focused on the role of epigenetic changes in DNA damage, repair mechanisms, and the potential therapeutic effects of probiotics. Probiotics have shown promise in promoting tissue regeneration and DNA repair. Knowledge Gap: However, the precise impact of probiotics on DNA repair in cancer cells, specifically breast cancer cells, remains underexplored. Aims: This study aimed to evaluate the effects of probiotics on DNA damage repair in AMJ13 Iraqi breast cancer cells and assess the cytotoxic effects of probiotics on these cells. Results: Using the comet assay, we found significan

... Show More
View Publication
Crossref
Publication Date
Wed Jan 01 2025
Journal Name
Journal Of Computer Sciences And Informatics
Edge Detection Methods: A Review
...Show More Authors

This article studies a comprehensive methods of edge detection and algorithms in digital images which is reflected a basic process in the field of image processing and analysis. The purpose of edge detection technique is discovering the borders that distinct diverse areas of an image, which donates to refining the understanding of the image contents and extracting structural information. The article starts by clarifying the idea of an edge and its importance in image analysis and studying the most noticeable edge detection methods utilized in this field, (e.g. Sobel, Prewitt, and Canny filters), besides other schemes based on distinguishing unexpected modifications in light intensity and color gradation. The research as well discuss

... Show More
View Publication
Crossref
Publication Date
Sun Mar 02 2008
Journal Name
Baghdad Science Journal
Tamper Detection in Color Image
...Show More Authors

In this work a fragile watermarking scheme is presented. This scheme is applied to digital color images in spatial domain. The image is divided into blocks, and each block has its authentication mark embedded in it, we would be able to insure which parts of the image are authentic and which parts have been modified. This authentication carries out without need to exist the original image. The results show the quality of the watermarked image is remaining very good and the watermark survived some type of unintended modification such as familiar compression software like WINRAR and ZIP

View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sun Jun 01 2008
Journal Name
Baghdad Science Journal
Tamper Detection in Text Document
...Show More Authors

Although text document images authentication is difficult due to the binary nature and clear separation between the background and foreground but it is getting higher demand for many applications. Most previous researches in this field depend on insertion watermark in the document, the drawback in these techniques lie in the fact that changing pixel values in a binary document could introduce irregularities that are very visually noticeable. In this paper, a new method is proposed for object-based text document authentication, in which I propose a different approach where a text document is signed by shifting individual words slightly left or right from their original positions to make the center of gravity for each line fall in with the m

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Jan 01 2022
Journal Name
Aip Conference Proceedings
Appraisal of intelligent notification system for smart university campus based internet of objects for social activities
...Show More Authors

View Publication
Scopus (1)
Scopus Crossref