Recent research has shown that a Deoxyribonucleic Acid (DNA) has ability to be used to discover diseases in human body as its function can be used for an intrusion-detection system (IDS) to detect attacks against computer system and networks traffics. Three main factor influenced the accuracy of IDS based on DNA sequence, which is DNA encoding method, STR keys and classification method to classify the correctness of proposed method. The pioneer idea on attempt a DNA sequence for intrusion detection system is using a normal signature sequence with alignment threshold value, later used DNA encoding based cryptography, however the detection rate result is very low. Since the network traffic consists of 41 attributes, therefore we proposed the most possible less character number (same DNA length) which is four-character DNA encoding that represented all 41 attributes known as DEM4all. The experiments conducted using standard data KDDCup 99 and NSL-KDD. Teiresias algorithm is used to extract Short Tandem Repeat (STR), which includes both keys and their positions in the network traffic, while Brute-force algorithm is used as a classification process to determine whether the network traffic is attack or normal. Experiment run 30 times for each DNA encoding method. The experiment result shows that proposed method has performed better accuracy (15% improved) compare with previous and state of the art DNA algorithms. With such results it can be concluded that the proposed DEM4all DNA encoding method is a good method that can used for IDS. More complex encoding can be proposed that able reducing less number of DNA sequence can possible produce more detection accuracy.
Four alkaloids compounds were extracted from the fruits and leaves, of plant known locally as (Anab AI-Thebe Solanum nigram), by various solvents systems, from an earlier study by the researcher. DNA tested its effect in plasmid PBR322 deportation method using Gel Electrophoresis. Results showed that two of those extract for full effectiveness digestible pieces of RNA and DNA plasmid, and digestive partly of the other alternatives. That could prove results indicate that this type of alkaloids consist of biological effectiveness of anti-twnors, through
... Show MoreIn this paper we deal with the problem of ciphering and useful from group isomorphism for construct public key cipher system, Where construction 1-EL- Gamal Algorithm. 2- key- exchange Algorithm
Plagiarism is becoming more of a problem in academics. It’s made worse by the ease with which a wide range of resources can be found on the internet, as well as the ease with which they can be copied and pasted. It is academic theft since the perpetrator has ”taken” and presented the work of others as his or her own. Manual detection of plagiarism by a human being is difficult, imprecise, and time-consuming because it is difficult for anyone to compare their work to current data. Plagiarism is a big problem in higher education, and it can happen on any topic. Plagiarism detection has been studied in many scientific articles, and methods for recognition have been created utilizing the Plagiarism analysis, Authorship identification, and
... Show MoreBackground: He-Ne laser (632.8 nm) pre-irradiation may lead to modulate the damaging effects of ionizing radiation and decreasing in radiation damage on cells, by the induction of antioxidant defence mechanisms and accelerated the repair.
Objective: To study the protection properties of He-Ne laser (632.8 nm) pre-irradiation against UV light (253.7 nm) damage on human lymphocyte blood cells and its DNA.
Subject & Methods: 27 samples were processed only for lymphocyte blood cells separation, while a 45 samples for the extracted DNA from lymphocyte. The total of 72 sampleswere employed to evaluate the influence of He-Ne laser pre- irradiation against UV-light.
Results: The results showed that He-Ne laser (632.8 nm) pre-irradia
In this work a fragile watermarking scheme is presented. This scheme is applied to digital color images in spatial domain. The image is divided into blocks, and each block has its authentication mark embedded in it, we would be able to insure which parts of the image are authentic and which parts have been modified. This authentication carries out without need to exist the original image. The results show the quality of the watermarked image is remaining very good and the watermark survived some type of unintended modification such as familiar compression software like WINRAR and ZIP
Although text document images authentication is difficult due to the binary nature and clear separation between the background and foreground but it is getting higher demand for many applications. Most previous researches in this field depend on insertion watermark in the document, the drawback in these techniques lie in the fact that changing pixel values in a binary document could introduce irregularities that are very visually noticeable. In this paper, a new method is proposed for object-based text document authentication, in which I propose a different approach where a text document is signed by shifting individual words slightly left or right from their original positions to make the center of gravity for each line fall in with the m
... Show MoreThis paper proposes a new structure for a Fractional Order Sliding Mode Controller (FOSMC) to control a Twin Rotor Aerodynamic System (TRAS). The new structure is composed by defining two 3-dimensional sliding mode surfaces for the TRAS model and introducing fractional order derivative integral in the state variables as well as in the control action. The parameters of the controller are determined so as to minimize the Integral of Time multiplied by Absolute Error (ITAE) performance index. Through comparison, this controller outperforms its integer counterpart in many specifications, such as reducing the delay time, rise time, percentage overshoot, settling time, time to reach the sliding surface, and amplitude of chattering in control inpu
... Show MoreThis paper deals with a Twin Rotor Aerodynamic System (TRAS). It is a Multi-Input Multi-Output (MIMO) system with high crosscoupling between its two channels. It proposes a hybrid design procedure that combines frequency response and root locus approaches. The proposed controller is designated as PID-Lead Compensator (PIDLC); the PID controller was designed in previous work using frequency response design specifications, while the lead compensator is proposed in this paper and is designed using the root locus method. A general explicit formula for angle computations in any of the four quadrants is also given. The lead compensator is designed by shifting the dominant closed-loop poles slightly to the left in the s-plane. This has the effect
... Show More