Recent research has shown that a Deoxyribonucleic Acid (DNA) has ability to be used to discover diseases in human body as its function can be used for an intrusion-detection system (IDS) to detect attacks against computer system and networks traffics. Three main factor influenced the accuracy of IDS based on DNA sequence, which is DNA encoding method, STR keys and classification method to classify the correctness of proposed method. The pioneer idea on attempt a DNA sequence for intrusion detection system is using a normal signature sequence with alignment threshold value, later used DNA encoding based cryptography, however the detection rate result is very low. Since the network traffic consists of 41 attributes, therefore we proposed the most possible less character number (same DNA length) which is four-character DNA encoding that represented all 41 attributes known as DEM4all. The experiments conducted using standard data KDDCup 99 and NSL-KDD. Teiresias algorithm is used to extract Short Tandem Repeat (STR), which includes both keys and their positions in the network traffic, while Brute-force algorithm is used as a classification process to determine whether the network traffic is attack or normal. Experiment run 30 times for each DNA encoding method. The experiment result shows that proposed method has performed better accuracy (15% improved) compare with previous and state of the art DNA algorithms. With such results it can be concluded that the proposed DEM4all DNA encoding method is a good method that can used for IDS. More complex encoding can be proposed that able reducing less number of DNA sequence can possible produce more detection accuracy.
This research is an initial attempt to explore the reality of education and its concept in Islam, and to describe the presence of educational practices in the Arab-Islamic heritage. The importance of this research lies in addressing a set of important issues related to the contemporary Islamic educational system. The research revealed the extent of the need for authentic educational values that draw their reference from the origins of Islam, and it emphasized the analysis of the reality of education in the Islamic world and the identification of its problems and the finding of solutions through a quick and comprehensive look at the diverse contributions of Muslimthinkers to Islamic educational thought, and their active ro
... Show MoreHiding secret information in the image is a challenging and painstaking task in computer security and steganography system. Certainly, the absolute intricacy of attacks to security system makes it more attractive.in this research on steganography system involving information hiding,Huffman codding used to compress the secret code before embedding which provide high capacity and some security. Fibonacci decomposition used to represent the pixels in the cover image, which increase the robustness of the system. One byte used for mapping all the pixels properties. This makes the PSNR of the system higher due to random distribution of embedded bits. Finally, three kinds of evaluation are applied such as PSNR, chi-square attack, a
... Show MoreThis Paper assesses the knowledge management system (KMS) requirements at Al-Ameed University concerning ISO 30401:2022. Specifically, the research aims to ascertain the degree to which international standards have been complied with and gaps that have been identified. A case study was conducted using field observations, interviews, and checklists to assess the institution's compliance with the KMS framework. The level of implementation and documentation of knowledge management processes was assessed using a seven-point scale. The findings reveal that Al-Ameed University has severe gaps in knowledge creation, sharing, and support for knowledge management in terms of strategic leadership. While certain elements like availability of r
... Show More—Medical images have recently played a significant role in the diagnosis and detection of various diseases. Medical imaging can provide a means of direct visualization to observe through the human body and notice the small anatomical change and biological processes associated by different biological and physical parameters. To achieve a more accurate and reliable diagnosis, nowadays, varieties of computer aided detection (CAD) and computer-aided diagnosis (CADx) approaches have been established to help interpretation of the medical images. The CAD has become among the many major research subjects in diagnostic radiology and medical imaging. In this work we study the improvement in accuracy of detection of CAD system when comb
... Show MoreStenography is the art of hiding the very presence of communication by embedding secret message into innocuous looking cover document, such as digital image, videos, sound files, and other computer files that contain perceptually irrelevant or redundant information as covers or carriers to hide secret messages.
In this paper, a new Least Significant Bit (LSB) nonsequential embedding technique in wave audio files is introduced. To support the immunity of proposed hiding system, and in order to recover some weak aspect inherent with the pure implementation of stego-systems, some auxiliary processes were suggested and investigated including the use of hidden text jumping process and stream ciphering algorithm. Besides, the suggested
... Show MoreIn this present paper, an experimental study of some plasma characteristics in dielectric barrier discharge (DBD) system using several variables, such as different frequencies and using two different electrodes metals(aluminium (Al) and copper (Cu)), is represented. The discharge plasma was produced by an AC power supply source of 6 and 7 kHz frequencies for the nitrogen gas spectrum and for two different electrodes metals(Al and Cu). Optical emission spectrometer was used to study plasma properties (such as electron temperature ( ), electron number density ( ), Debye length ( ), and plasma frequency ( )). In addition, images were analysed for the plasma emission intensity at atmospheric air pressure.
Fluid-structure interaction method is performed to predict the dynamic characteristics of axial fan system. A fluid-structure interface physical environment method (monolithic method) is used to couple the fluid flow solver with the structural solver. The integration of the three-dimensional Navier-Stokes equations is performed in the time Doman, simultaneously to the integration of the three dimensional structural model. The aerodynamic loads are transfer from the flow to structure and the coupling step is repeated within each time step, until the flow solution and the structural solution have converged to yield a coupled solution of the aeroelastic set of equations. Finite element method is applied to solve numerically
... Show MoreThe MTS-88. c trainer is a training system targeting students in the microprocessors course. It has a built in single-line assembler allowing the users to enter programs in assembly. It has the problem that long programs cannot be traced and tested efficiently. A simple error may cause all the code to be erased and the system to stop responding. Also, this system lacks the ability to be connected to the PC. The aim of this work is to modify the system to make it possible to be connected to the PC through the parallel port. This gives the capability to download long programs to the system after being developed in the PC. The 8255 Programmable Peripheral Interface available in the teaching system is interfaced to the parallel port and used as
... Show MoreIn this paper the effect of mixing TiO2 nanoparticles with epoxy resin is studied. The TiO2 nanoparticles would be synthesis and characterized by scanning electron microscopy (SEM), XRD FTIR, for two particle sizes of 50 and 25 nm. The thermal conductivity is measured with and without composite epoxy resin; the results showed that the thermal conductivity was increased as nanoparticle concentration increased too. The thermal conductivity was increased as particle size decreased.