Preferred Language
Articles
/
XRbFvYoBVTCNdQwCj6Qw
Four Char DNA Encoding for Anomaly Intrusion Detection System
...Show More Authors

Recent research has shown that a Deoxyribonucleic Acid (DNA) has ability to be used to discover diseases in human body as its function can be used for an intrusion-detection system (IDS) to detect attacks against computer system and networks traffics. Three main factor influenced the accuracy of IDS based on DNA sequence, which is DNA encoding method, STR keys and classification method to classify the correctness of proposed method. The pioneer idea on attempt a DNA sequence for intrusion detection system is using a normal signature sequence with alignment threshold value, later used DNA encoding based cryptography, however the detection rate result is very low. Since the network traffic consists of 41 attributes, therefore we proposed the most possible less character number (same DNA length) which is four-character DNA encoding that represented all 41 attributes known as DEM4all. The experiments conducted using standard data KDDCup 99 and NSL-KDD. Teiresias algorithm is used to extract Short Tandem Repeat (STR), which includes both keys and their positions in the network traffic, while Brute-force algorithm is used as a classification process to determine whether the network traffic is attack or normal. Experiment run 30 times for each DNA encoding method. The experiment result shows that proposed method has performed better accuracy (15% improved) compare with previous and state of the art DNA algorithms. With such results it can be concluded that the proposed DEM4all DNA encoding method is a good method that can used for IDS. More complex encoding can be proposed that able reducing less number of DNA sequence can possible produce more detection accuracy.

Scopus Clarivate Crossref
View Publication
Publication Date
Fri Jan 01 2021
Journal Name
Microchemical Journal
A flow analysis system integrating an optoelectronic detector for the quantitative determination of active ingredients in pharmaceutical formulations
...Show More Authors

Scopus (24)
Crossref (17)
Scopus Clarivate Crossref
Publication Date
Sun Nov 07 2021
Journal Name
Review Of International Geographical Education Online
Requirements of Formulating a National Strategy for Developing the Cybersecurity System in Iraq According to GCI.v4(2019) Index
...Show More Authors

The present study aims to present a proposed realistic and comprehensive cyber strategy for the Communications Directorate for the next five years (2022-2026) based on the extent of application and documentation of cybersecurity measures in the Directorate and the scientific bases formulating the strategy. The present study is significant in that it provides an accurate diagnosis of the capabilities of the cyber directorate in terms of strengths and weaknesses in its internal environment and the opportunities and threats that surround it in the external environment, based on the results of the assessment of the reality of cybersecurity according to the global Cybersecurity index, which provides a strong basis for building its strategic dire

... Show More
Preview PDF
Scopus (3)
Scopus
Publication Date
Tue Dec 05 2023
Journal Name
Baghdad Science Journal
An improved neurogenetic model for recognition of 3D kinetic data of human extracted from the Vicon Robot system
...Show More Authors

These days, it is crucial to discern between different types of human behavior, and artificial intelligence techniques play a big part in that.  The characteristics of the feedforward artificial neural network (FANN) algorithm and the genetic algorithm have been combined to create an important working mechanism that aids in this field. The proposed system can be used for essential tasks in life, such as analysis, automation, control, recognition, and other tasks. Crossover and mutation are the two primary mechanisms used by the genetic algorithm in the proposed system to replace the back propagation process in ANN. While the feedforward artificial neural network technique is focused on input processing, this should be based on the proce

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Fri Feb 01 2019
Journal Name
Journal Of Economics And Administrative Sciences
A realistic vision of the ration card system in Iraq for the duration (1997-2003) and (2017-2003)
...Show More Authors

Abstract:

The researcher shed light on a diet in Iraq before 2003 became in this period. And how the ration card has a variety of vocabulary and cover the need of the population of commodities and have a key role in saving Iraq from a real crisis in the period of economic siege, especially in light of the State's direction to support the agricultural sector, which in that period able to fill half of the market needs of food the basic. As well as providing strategic storage at the Ministry of Commerce enough for six months But after the events of 2003 and the crises that hit the country and the unstable security situation began to rise voices calling for reform of the ration card system as a system that is a burden on the

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Sep 01 2020
Journal Name
Journal Of Engineering
An Adaptive Digital Neural Network-Like-PID Control Law Design for Fuel Cell System Based on FPGA Technique
...Show More Authors

This paper proposes an on-line adaptive digital Proportional Integral Derivative (PID) control algorithm based on Field Programmable Gate Array (FPGA) for Proton Exchange Membrane Fuel Cell (PEMFC) Model. This research aims to design and implement Neural Network like a digital PID using FPGA in order to generate the best value of the hydrogen partial pressure action (PH2) to control the stack terminal output voltage of the (PEMFC) model during a variable load current applied. The on-line Particle Swarm Optimization (PSO) algorithm is used for finding and tuning the optimal value of the digital PID-NN controller (kp, ki, and kd) parameters that improve the dynamic behavior of the closed-loop digital control fue

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sun Dec 03 2017
Journal Name
Baghdad Science Journal
On the Connection between the Dynamical System and the Ellis Compactification with Transitive Pointed System
...Show More Authors

In this paper, some relations between the flows and the Enveloping Semi-group were studied. It allows to associate some properties on the topological compactification to any pointed flows. These relations enable us to study a number of the properties of the principles of flows corresponding with using algebric properties. Also in this paper proofs to some theorems of these relations are given.

View Publication Preview PDF
Scopus (3)
Scopus Crossref
Publication Date
Wed Jun 19 2019
Journal Name
Biochemical And Cellular Archives
SYNTHESIS, CHARACTERIZATION, STRUCTURAL, THERMAL, POM STUDIES, ANTIMICROBIAL AND DNA CLEAVAGE ACTIVITY OF A NEW SCHIFF BASE-AZO LIGAND AND ITS COMPLEXATION WITH SELECTED METAL IONS
...Show More Authors

SYNTHESIS, CHARACTERIZATION, STRUCTURAL, THERMAL, POM STUDIES, ANTIMICROBIAL AND DNA CLEAVAGE ACTIVITY OF A NEW SCHIFF BASE-AZO LIGAND AND ITS COMPLEXATION WITH SELECTED METAL IONS

Scopus (3)
Scopus
Publication Date
Tue Nov 13 2018
Journal Name
Biochemical And Cellular Archives
Synthesis, characterization, structural, thermal, POM, studies, antimicrobial, and DNA cleavage activity of a new schiff base-azo lighand and its complexation with selected metal ions
...Show More Authors

RKRAS L. K. Abdul Karem, F. H. Ganim, Biochemical and Cellular Archives, 2018 - Cited by 2

View Publication
Publication Date
Sat Jun 15 2024
Journal Name
Iraqi Journal Of Laser
Estimation of mean photon number based on single photon detection of weak coherent pulses
...Show More Authors

The demand for single photon sources in quantum key distribution (QKD) systems has necessitated the use of weak coherent pulses (WCPs) characterized by a Poissonian distribution. Ensuring security against eavesdropping attacks requires keeping the mean photon number (µ) small and known to legitimate partners. However, accurately determining µ poses challenges due to discrepancies between theoretical calculations and practical implementation. This paper introduces two experiments. The first experiment involves theoretical calculations of µ using several filters to generate the WCPs. The second experiment utilizes a variable attenuator to generate the WCPs, and the value of µ was estimated from the photons detected by the BB

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jan 05 2025
Journal Name
Science Journal Of University Of Zakho
DETECTION AND RECOGNITION OF IRAQI LICENSE PLATES USING CONVOLUTIONAL NEURAL NETWORKS
...Show More Authors

Due to the large population of motorway users in the country of Iraq, various approaches have been adopted to manage queues such as implementation of traffic lights, avoidance of illegal parking, amongst others. However, defaulters are recorded daily, hence the need to develop a mean of identifying these defaulters and bring them to book. This article discusses the development of an approach of recognizing Iraqi licence plates such that defaulters of queue management systems are identified. Multiple agencies worldwide have quickly and widely adopted the recognition of a vehicle license plate technology to expand their ability in investigative and security matters. License plate helps detect the vehicle's information automatically ra

... Show More
View Publication Preview PDF
Crossref