Recent research has shown that a Deoxyribonucleic Acid (DNA) has ability to be used to discover diseases in human body as its function can be used for an intrusion-detection system (IDS) to detect attacks against computer system and networks traffics. Three main factor influenced the accuracy of IDS based on DNA sequence, which is DNA encoding method, STR keys and classification method to classify the correctness of proposed method. The pioneer idea on attempt a DNA sequence for intrusion detection system is using a normal signature sequence with alignment threshold value, later used DNA encoding based cryptography, however the detection rate result is very low. Since the network traffic consists of 41 attributes, therefore we proposed the most possible less character number (same DNA length) which is four-character DNA encoding that represented all 41 attributes known as DEM4all. The experiments conducted using standard data KDDCup 99 and NSL-KDD. Teiresias algorithm is used to extract Short Tandem Repeat (STR), which includes both keys and their positions in the network traffic, while Brute-force algorithm is used as a classification process to determine whether the network traffic is attack or normal. Experiment run 30 times for each DNA encoding method. The experiment result shows that proposed method has performed better accuracy (15% improved) compare with previous and state of the art DNA algorithms. With such results it can be concluded that the proposed DEM4all DNA encoding method is a good method that can used for IDS. More complex encoding can be proposed that able reducing less number of DNA sequence can possible produce more detection accuracy.
Texture is an important characteristic for the analysis of many types of images because it provides a rich source of information about the image. Also it provides a key to understand basic mechanisms that underlie human visual perception. In this paper four statistical feature of texture (Contrast, Correlation, Homogeneity and Energy) was calculated from gray level Co-occurrence matrix (GLCM) of equal blocks (30×30) from both tumor tissue and normal tissue of three samples of CT-scan image of patients with lung cancer. It was found that the contrast feature is the best to differentiate between textures, while the correlation is not suitable for comparison, the energy and homogeneity features for tumor tissue always greater than its valu
... Show MoreThe main objective of this paper is to develop and validate flow injection method, a precise, accurate, simple, economic, low cost and specific turbidimetric method for the quantitative determination of mebeverine hydrochloride (MbH) in pharmaceutical preparations. A homemade NAG Dual & Solo (0-180º) analyser which contains two identical detections units (cell 1 and 2) was applied for turbidity measurements. The developed method was optimized for different chemical and physical parameters such as perception reagent concentrations, aqueous salts solutions, flow rate, the intensity of the sources light, sample volume, mixing coil and purge time. The correlation coefficients (r) of the developed method were 0.9980 and 0.9986 for cell
... Show MoreThe Sebkha is considered the evaporative geomorphological features, where climate plays an active role. It forms part of the surface features in Mesopotamia plain of Iraqi, which is the most fertile lands, and because of complimentary natural and human factors turned most of the arable land to the territory of Sebkha lands. The use satellite image (Raw Data), Landsat 30M Mss for the year 1976 Landsat 7 ETM, and the Landsat 8 for year 2013 (LDCM) for the summer Landsat Data Continuity Mission and perform geometric correction, enhancements, and Subset image And a visual analysis Space visuals based on the analysis of spectral fingerprints earth's This study has shown that the best in the discrimination of Sebkha Remote sensing techniques a
... Show MoreObjectives: The present study aims at detecting the depression among nurses who provide care for infected patients with corona virus phenomenon and to find out relationships between the depression and their demographic characteristics of age, gender, marital status, type of family, education, and years of experience of nurses in heath institutions, infection by corona virus, and their participation in training courses.
Methodology: A descriptive study is established for a period from October 10th, 2020 to April 15th, 2021. The study is conducted on a purposive (non-probability) sample of (100) nurse who are providing care for patients with COVID-19 and they are selected from the isolation wards. The instrument of the study is develope
Breast cancer is the commonest cancer affecting women worldwide. Different studies have dealt with the etiological factors of that cancer aiming to find a way for early diagnosis and satisfactory therapy. The present study clarified the relationship between genetic polymorphisms of BRCA1 & BRCA2 genes and some etiological risk factors among breast cancer patients in Iraq. This investigation was carried out on 25 patients (all were females) who were diagnosed as breast cancer patients attended AL-Kadhemya Teaching Hospital in Baghdad and 10 apparently healthy women were used as a control, all women (patients and control) aged above 40 years. The Wizard Promega kit was used for DNA isolation from breast patients and normal individuals. B
... Show MoreIn this paper we deal with the problem of ciphering and useful from group isomorphism for construct public key cipher system, Where construction 1-EL- Gamal Algorithm. 2- key- exchange Algorithm
Although text document images authentication is difficult due to the binary nature and clear separation between the background and foreground but it is getting higher demand for many applications. Most previous researches in this field depend on insertion watermark in the document, the drawback in these techniques lie in the fact that changing pixel values in a binary document could introduce irregularities that are very visually noticeable. In this paper, a new method is proposed for object-based text document authentication, in which I propose a different approach where a text document is signed by shifting individual words slightly left or right from their original positions to make the center of gravity for each line fall in with the m
... Show More