Preferred Language
Articles
/
bsj-747
Detection capability Alttafaria for some materials using a bacterial mutagenesis system
...Show More Authors

Tested effective Alttafaria some materials used for different purposes, system a bacterial mutagenesis component of three bacterial isolates belonging to different races and materials tested included drug Briaktin

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Feb 25 2017
Journal Name
International Journal On Advanced Science, Engineering And Information Technology
A Novel DNA Sequence Approach for Network Intrusion Detection System Based on Cryptography Encoding Method
...Show More Authors

A novel method for Network Intrusion Detection System (NIDS) has been proposed, based on the concept of how DNA sequence detects disease as both domains have similar conceptual method of detection. Three important steps have been proposed to apply DNA sequence for NIDS: convert the network traffic data into a form of DNA sequence using Cryptography encoding method; discover patterns of Short Tandem Repeats (STR) sequence for each network traffic attack using Teiresias algorithm; and conduct classification process depends upon STR sequence based on Horspool algorithm. 10% KDD Cup 1999 data set is used for training phase. Correct KDD Cup 1999 data set is used for testing phase to evaluate the proposed method. The current experiment results sh

... Show More
View Publication
Scopus (9)
Crossref (5)
Scopus Crossref
Publication Date
Mon Dec 14 2020
Journal Name
2020 13th International Conference On Developments In Esystems Engineering (dese)
Anomaly Based Intrusion Detection System Using Hierarchical Classification and Clustering Techniques
...Show More Authors

With the rapid development of computers and network technologies, the security of information in the internet becomes compromise and many threats may affect the integrity of such information. Many researches are focused theirs works on providing solution to this threat. Machine learning and data mining are widely used in anomaly-detection schemes to decide whether or not a malicious activity is taking place on a network. In this paper a hierarchical classification for anomaly based intrusion detection system is proposed. Two levels of features selection and classification are used. In the first level, the global feature vector for detection the basic attacks (DoS, U2R, R2L and Probe) is selected. In the second level, four local feature vect

... Show More
View Publication
Scopus (3)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Sun Jun 01 2014
Journal Name
Baghdad Science Journal
A study for Bacterial Infection in Acute Diarrhea Patients
...Show More Authors

500 samples of diarrhea stool were collected from different ages(less than 1year –upto30years) and for both genders from some patients in (Alwiya hospital for children, Al-kendi, central health public laboratory and some gavernarated labs) period(1/11/2009—1/10/2010). Kinds of bacteria and parasites agents were isolated and identified from patients with diarrhea. Nine species of gram negative bacteria from enterobacteriaceae were isolated, E. coli isolated are the higher ratio 4.8% of all, then Salmonella typhi4.6% while the lowest ratios is Citrobacterfreundii 0.4%, while the other identified species were be among the previous rotios. also Plesomonasshigelloides was isolated which concedride one of the bacterial local studies.many met

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jul 01 2015
Journal Name
Journal Of Engineering
Studying of Some Mechanical Properties of Reactive Powder Concrete Using Local Materials
...Show More Authors

This research aims to investigate and evaluate a reactive powder concrete (RPC) cast using economical materials. Its mechanical properties were investigated and evaluated by studying the effects of using different cement and silica fume contents and locally steel fibers aspect ratios as reinforcement for this concrete. A compressive strength of about 155.2MPa, indirect tensile strength of 16.0MPa, modulus of elasticity of 48.7GPa, flexural strength of 43.5MPa, impact energy of 3294.4kN.m and abrasion loss 0.59%  have been achieved for reinforced RPC contains  910 kg/m3 cement content, silica fume content 185 kg/m3 of cement weight and fiber volume fraction 2%. The water absorption values w

... Show More
View Publication Preview PDF
Publication Date
Wed Jan 01 2020
Journal Name
Technologies And Materials For Renewable Energy, Environment And Sustainability: Tmrees20
Change detection of the land cover for three decades using remote sensing data and geographic information system
...Show More Authors

View Publication
Crossref (3)
Crossref
Publication Date
Sat Dec 01 2018
Journal Name
Journal Of Theoretical And Applied Information Technology
Matching Algorithms for Intrusion Detection System based on DNA Encoding
...Show More Authors

Pattern matching algorithms are usually used as detecting process in intrusion detection system. The efficiency of these algorithms is affected by the performance of the intrusion detection system which reflects the requirement of a new investigation in this field. Four matching algorithms and a combined of two algorithms, for intrusion detection system based on new DNA encoding, are applied for evaluation of their achievements. These algorithms are Brute-force algorithm, Boyer-Moore algorithm, Horspool algorithm, Knuth-Morris-Pratt algorithm, and the combined of Boyer-Moore algorithm and Knuth–Morris– Pratt algorithm. The performance of the proposed approach is calculated based on the executed time, where these algorithms are applied o

... Show More
Scopus (2)
Scopus
Publication Date
Fri May 17 2019
Journal Name
Lecture Notes In Networks And Systems
Features Selection for Intrusion Detection System Based on DNA Encoding
...Show More Authors

Intrusion detection systems detect attacks inside computers and networks, where the detection of the attacks must be in fast time and high rate. Various methods proposed achieved high detection rate, this was done either by improving the algorithm or hybridizing with another algorithm. However, they are suffering from the time, especially after the improvement of the algorithm and dealing with large traffic data. On the other hand, past researches have been successfully applied to the DNA sequences detection approaches for intrusion detection system; the achieved detection rate results were very low, on other hand, the processing time was fast. Also, feature selection used to reduce the computation and complexity lead to speed up the system

... Show More
Scopus (4)
Scopus
Publication Date
Thu Oct 01 2020
Journal Name
Biochemical And Cellular Archives
DETECTION OF BACTERIAL INFECTIONS AND THEIR RESISTANCE IN BURN WOUND OF SKIN
...Show More Authors

Scopus
Publication Date
Wed Jun 15 2022
Journal Name
Malaysian Journal Of Science
INVESTIGATION OF FAST NEURON ATTENUATION COEFFICIENTS FOR SOME IRAQI BUILDING MATERIALS
...Show More Authors

This research aims to improve the radiation shielding properties of polymer-based materials by mixing PVC with locally available building materials. Specifically, two key parameters of fast neutron attenuation (removal cross-section and half-value layer) were studied for composite materials comprising PVC reinforced with common building materials (cement, sand, gypsum and marble) in different proportions (10%, 30% and 50% by weight). To assess their effectiveness as protection against fast neutrons, the macroscopic neutron cross-section was calculated for each composite. Results show that neutron cross-section values are significantly affected by the reinforcement ratios, and that the composite material PVC + 50% gypsum is an effect

... Show More
View Publication
Scopus (1)
Scopus Crossref
Publication Date
Mon May 02 2022
Journal Name
International Journal For Research In Applied Sciences And Biotechnology
Article Review: Immune Response against Some Bacterial Toxins
...Show More Authors

Bacterial toxins are considered to be virulence factors due to the fact that they interfere with the normal processes of the host cell in which they are found. The interplay between the infectious processes of bacteria and the immune system is what causes this impact. In this discussion, we are going to focus on bacterial toxins that act in the extracellular environment, especially on those that impair the activity of macrophages and neutrophils. These toxins are of particular interest since they may be found in a wide variety of bacteria. We will be concentrating our efforts, in particular, on the toxins that are generated by Gram-positive and Gram-negative bacteria. These toxins are able to interact with and have an effect on the many dif

... Show More
View Publication Preview PDF