Preferred Language
Articles
/
XRbFvYoBVTCNdQwCj6Qw
Four Char DNA Encoding for Anomaly Intrusion Detection System
...Show More Authors

Recent research has shown that a Deoxyribonucleic Acid (DNA) has ability to be used to discover diseases in human body as its function can be used for an intrusion-detection system (IDS) to detect attacks against computer system and networks traffics. Three main factor influenced the accuracy of IDS based on DNA sequence, which is DNA encoding method, STR keys and classification method to classify the correctness of proposed method. The pioneer idea on attempt a DNA sequence for intrusion detection system is using a normal signature sequence with alignment threshold value, later used DNA encoding based cryptography, however the detection rate result is very low. Since the network traffic consists of 41 attributes, therefore we proposed the most possible less character number (same DNA length) which is four-character DNA encoding that represented all 41 attributes known as DEM4all. The experiments conducted using standard data KDDCup 99 and NSL-KDD. Teiresias algorithm is used to extract Short Tandem Repeat (STR), which includes both keys and their positions in the network traffic, while Brute-force algorithm is used as a classification process to determine whether the network traffic is attack or normal. Experiment run 30 times for each DNA encoding method. The experiment result shows that proposed method has performed better accuracy (15% improved) compare with previous and state of the art DNA algorithms. With such results it can be concluded that the proposed DEM4all DNA encoding method is a good method that can used for IDS. More complex encoding can be proposed that able reducing less number of DNA sequence can possible produce more detection accuracy.

Scopus Clarivate Crossref
View Publication
Publication Date
Fri Jul 01 2022
Journal Name
International Journal Of Nonlinear Analysis And Applications
Survey on distributed denial of service attack detection using deep learning: A review
...Show More Authors

Distributed Denial of Service (DDoS) attacks on Web-based services have grown in both number and sophistication with the rise of advanced wireless technology and modern computing paradigms. Detecting these attacks in the sea of communication packets is very important. There were a lot of DDoS attacks that were directed at the network and transport layers at first. During the past few years, attackers have changed their strategies to try to get into the application layer. The application layer attacks could be more harmful and stealthier because the attack traffic and the normal traffic flows cannot be told apart. Distributed attacks are hard to fight because they can affect real computing resources as well as network bandwidth. DDoS attacks

... Show More
View Publication
Publication Date
Fri Jan 01 2016
Journal Name
Iraqi Journal Of Science
Diagnoses System of Varicose Disease
...Show More Authors

The diagnoses system of varicose disease has a good level of performance due to the complexity and uniqueness in patterns of vein of the leg. In addition, the patterns of vein are internal of the body, and its features are hard to duplicate, this reason make this method not easy to fake, and thus make it contains of a good features for varicose disease diagnoses. The proposed system used more than one type of algorithms to produce diagnoses system of varicose disease with high accuracy, in addition, this multi-algorithm technique based on veins as a factor to recognize varicose infection. The obtained results indicate that the design of varicose diagnoses system by applying multi- algorithms (Naïve Bayes and Back-Propagation) produced new

... Show More
Publication Date
Sun Feb 25 2024
Journal Name
Baghdad Science Journal
Hybrid CNN-based Recommendation System
...Show More Authors

Recommendation systems are now being used to address the problem of excess information in several sectors such as entertainment, social networking, and e-commerce. Although conventional methods to recommendation systems have achieved significant success in providing item suggestions, they still face many challenges, including the cold start problem and data sparsity. Numerous recommendation models have been created in order to address these difficulties. Nevertheless, including user or item-specific information has the potential to enhance the performance of recommendations. The ConvFM model is a novel convolutional neural network architecture that combines the capabilities of deep learning for feature extraction with the effectiveness o

... Show More
View Publication Preview PDF
Scopus (5)
Crossref (4)
Scopus Crossref
Publication Date
Sat Jun 01 2024
Journal Name
Al-rafidain Journal Of Computer Sciences And Mathematics
Braille Character Recognition System: Review
...Show More Authors

The Braille Recognition System is the process of capturing a Braille document image and turning its content into its equivalent natural language characters. The Braille Recognition System's cell transcription and Braille cell recognition are the two basic phases that follow one another. The Braille Recognition System is a technique for locating and recognizing a Braille document stored as an image, such as a jpeg, jpg, tiff, or gif image, and converting the text into a machine-readable format, such as a text file. BCR translates an image's pixel representation into its character representation. As workers at visually impaired schools and institutes, we profit from Braille recognition in a variety of ways. The Braille Recognition S

... Show More
View Publication Preview PDF
Publication Date
Wed Oct 04 2023
Journal Name
Exergy - New Technologies And Applications
High Synthetic Image Coding System
...Show More Authors

Compressing an image and reconstructing it without degrading its original quality is one of the challenges that still exist now a day. A coding system that considers both quality and compression rate is implemented in this work. The implemented system applies a high synthetic entropy coding schema to store the compressed image at the smallest size as possible without affecting its original quality. This coding schema is applied with two transform-based techniques, one with Discrete Cosine Transform and the other with Discrete Wavelet Transform. The implemented system was tested with different standard color images and the obtained results with different evaluation metrics have been shown. A comparison was made with some previous rel

... Show More
View Publication
Crossref
Publication Date
Tue Jun 01 2010
Journal Name
Al-khwarizmi Engineering Journal
Enhancement of Hoisting System Performance
...Show More Authors

In this paper it is required to enhance the performance of a mechanical system (here: a Hoisting System) where it is preferred to lift a different payloads with approximately the same speed of lifting and keeping at the same time the good performance, and this of course needs some intelligence of the system which will be responsible on measuring the present load and taking into account the speed and performance desired in order to achieve the requirements or the criteria. The process therefore is a Mechatronics System design which includes a measuring system, a control or automation technique, and an actuating system. The criteria built here in this research using a given Hoist system's characteristics and parameters and changing one of

... Show More
View Publication Preview PDF
Publication Date
Fri Apr 01 2016
Journal Name
Journal Of Economics And Administrative Sciences
: financial fraud ,Audit risks ,inherent risk ,Detection risk, Data Mining .
...Show More Authors

Abstract

The study seeks to use one of the techniques (Data mining) a (Logic regression) on the inherited risk through the use of style financial ratios technical analysis and then apply for financial fraud indicators,Since higher scandals exposed companies and the failure of the audit process has shocked the community and affected the integrity of the auditor and the reason is financial fraud practiced by the companies and not to the discovery of the fraud by the auditor, and this fraud involves intentional act aimed to achieve personal and harm the interests of to others, and doing (administration, staff) we can say that all frauds carried out through the presence of the motives and factors that help th

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Dec 12 2018
Journal Name
Iraqi National Journal Of Nursing Specialties
Detection of Polyomavirus BK and JC in kidney Transplant Recipients
...Show More Authors

objectives: To investigate the polyomaviruses (BK, JC) in asymptomatic kidney transplant recipients and healthy persons as control. It is one of the first reports on serological detection and molecular characterization that describes the circulation of polyomaviruses (BKV, JCV) have been done in Iraq recently. Methodology: The present study was designed as prospective case control study was done during the period from November 2015 to August 2016. Total of 97 serum and urine samples were collected randomly from 25 healthy control person and 72 renal transplant recipients, attending Iraqi Renal Transplantatio

... Show More
View Publication Preview PDF
Publication Date
Sun Jul 01 2018
Journal Name
Current Research In Microbiology And Biotechnology
Detection of anti-Helicobacter pylori in patients with Multiple Sclerosis
...Show More Authors

To determine the relationship between Helicobacter pylori infection and Multiple Sclerosis (MS) disorder, 20 patients with MS aged (25-60) years have been investigated from the period of 2016/12/1 to 2017/3/1 and compared to 15 apparently healthy individuals. All study groups were carried out to measure anti H.pylori IgA and H.pylori IgG antibodies by enzyme linked immunosorbent assay (ELISA) technique. There was a significant elevation (p<0.05) in the concentration of anti H.pylori IgG and IgA antibodies (Abs) compared to control group, and there was no significant difference (p>0.05) in the concentration of IgA and IgG (Abs) of H.pylori according to gender, and there was no significant difference (p>0.05) in the concentration of IgA and I

... Show More
Publication Date
Tue Oct 26 2021
Journal Name
Remote Sensing Technologies And Applications In Urban Environments Vi
DTM Extraction and building detection in DSMs having large holes
...Show More Authors

View Publication
Scopus (3)
Crossref (1)
Scopus Clarivate Crossref