Until recently, researchers have utilized and applied various techniques for intrusion detection system (IDS), including DNA encoding and clustering that are widely used for this purpose. In addition to the other two major techniques for detection are anomaly and misuse detection, where anomaly detection is done based on user behavior, while misuse detection is done based on known attacks signatures. However, both techniques have some drawbacks, such as a high false alarm rate. Therefore, hybrid IDS takes advantage of combining the strength of both techniques to overcome their limitations. In this paper, a hybrid IDS is proposed based on the DNA encoding and clustering method. The proposed DNA encoding is done based on the UNSW-NB15 database by dividing the record's attributes into four groups, including State, Protocol, Service, and the rest of the features is Digits. Four DNA characters were used to represent each protocol attribute values. While two DNA characters are used to represent State, Service and Digits attributes values. Then, the clustering method is applied to classify the records into two clusters, either attack or normal. The current experiment results showed that the proposed system has achieved a good detection rate and accuracy results equal to 81.22% and 82.05% respectively. Also, the system achieved fast encoding and clustering time that equal 0.385 seconds and 0.00325 seconds respectively for each record.
In the present work, different remote sensing techniques have been used to analyze remote sensing data spectrally using ENVI software. The majority of algorithms used in the Spectral Processing can be organized as target detection, change detection and classification. In this paper several methods of target detection have been studied such as matched filter and constrained energy minimization.
The water body mapping have been obtained and the results showed changes on the study area through the period 1995-2000. Also the results that obtained from applying constrained energy minimization were more accurate than other method comparing with the real situation.
Building Information Modeling (BIM) is extensively used in the construction industry due to its benefits throughout the Project Life Cycle (PLC). BIM can simulate buildings throughout PLC, detect and resolve problems, and improve building visualization that contributes to the representation of actual project details in the construction stage. BIM contributes to project management promotion by detecting problems that lead to conflicts, cost overruns, and time delays. This work aims to implement an effective BIM for the Iraqi construction projects’ life cycle. The methodology used is a literature review to collect the most important factors contributing to the success of BIM implementation, interview the team of the Cent
... Show MoreDue to the significant role in understanding cellular processes, the decomposition of Protein-Protein Interaction (PPI) networks into essential building blocks, or complexes, has received much attention for functional bioinformatics research in recent years. One of the well-known bi-clustering descriptors for identifying communities and complexes in complex networks, such as PPI networks, is modularity function. The contribution of this paper is to introduce heuristic optimization models that can collaborate with the modularity function to improve its detection ability. The definitions of the formulated heuristics are based on nodes and different levels of their neighbor properties. The modulari
... Show MoreThe gravity and magnetic data of Tikrit-Kirkuk area in central Iraq were considered to study the tectonic situation in the area. The residual anomalies were separated from regional using space windows method with space of about 24, 12 and 10km to delineate the source level of the residual anomalies. The Total Horizontal Derivative (THD) is used to identify the fault trends in the basement and sedimentary rocks depending upon gravity and magnetic data. The identified faults in the study area show (NW-SE), less common (NE-SW) and rare (N-S) trends. Some of these faults extending from the basement to the upper most layer of the sedimentary rocks. It was found that the depth of some gravity and magnetic source range 12-13Km, which confirm th
... Show MoreBreast cancer constitutes about one fourth of the registered cancer cases among the Iraqi population (1)
and it is the leading cause of death among Iraqi women (2)
. Each year more women are exposed to the vicious
ramifications of this disease which include death if left unmanaged or the negative sequels that they would
experience, cosmetically and psychologically, after exposure to radical mastectomy.
The World Health Organization (WHO) documented that early detection and screening, when coped
with adequate therapy, could offer a reduction in breast cancer mortality; displaying that the low survival rates
in less developed countries, including Iraq, is mainly attributed to the lack of early detection programs couple
Performance of gas-solid spouted bed benefit from solids uniformity structure (UI).Therefore, the focus of this work is to maximize UI across the bed based on process variables. Hence, UI is to be considered as the objective of the optimization process .Three selected process variables are affecting the objective function. These decision variables are: gas velocity, particle density and particle diameter. Steady-state solids concentration measurements were carried out in a narrow 3-inch cylindrical spouted bed made of Plexiglas that used 60° conical shape base. Radial concentration of particles (glass and steel beads) at various bed heights and different flow patterns were measured using sophisticated optical probes. Stochastic Genetic
... Show MoreThe aim of this paper is to design feed forward neural network to determine the effects of
cold pills and cascades from simulation the problem to system of first order initial value
problem. This problem is typical of the many models of the passage of medication throughout
the body. Designer model is an important part of the process by which dosage levels are set.
A critical factor is the need to keep the levels of medication high enough to be effective, but
not so high that they are dangerous.
Computer science has evolved to become the basis for evolution and entered into all areas of life where the use of computer has been developed in all scientific, military, commercial and health institutions. In addition, it has been applied in residential and industrial projects due to the high capacity and ability to achieve goals in a shorter time and less effort. In this research, the computer, its branches, and algorithms will be invested in the psychological field. In general, in psychological fields, a questionnaire model is created according to the requirements of the research topic. The model contains many questions that are answered by the individuals of the sample space chosen by the researcher. Often,
... Show MoreThe Internet is the hallmark of the age of technology and this technology is complemented by the presence of software which is one of the basic components of the operation of the network and it is used in almost all daily life aspects such as industry, commerce and others. Because the digital documents and objects can be easily replicated and distributed at an economically low cost and as the software is a type of digital object, the problem of software watermarking risen as related to how to protect data from piracy. Therefore, various techniques have been developed to protect codes from misusing and unauthorized alteration. Each of them is known as watermarking technology that protects data by inserting secret information into software
... Show More