Recent research has shown that a Deoxyribonucleic Acid (DNA) has ability to be used to discover diseases in human body as its function can be used for an intrusion-detection system (IDS) to detect attacks against computer system and networks traffics. Three main factor influenced the accuracy of IDS based on DNA sequence, which is DNA encoding method, STR keys and classification method to classify the correctness of proposed method. The pioneer idea on attempt a DNA sequence for intrusion detection system is using a normal signature sequence with alignment threshold value, later used DNA encoding based cryptography, however the detection rate result is very low. Since the network traffic consists of 41 attributes, therefore we proposed the
... Show MoreThe detection for Single Escherichia Coli Bacteria has attracted great interest and in biology and physics applications. A nanostructured porous silicon (PS) is designed for rapid capture and detection of Escherichia coli bacteria inside the micropore. PS has attracted more attention due to its unique properties. Several works are concerning the properties of nanostructured porous silicon. In this study PS is fabricated by an electrochemical anodization process. The surface morphology of PS films has been studied by scanning electron microscope (SEM) and atomic force microscope (AFM). The structure of porous silicon was studied by energy-dispersive X-ray spectroscopy (EDX). Details of experimental methods and results are given and discussed
... Show MoreSoftware-defined networks (SDN) have a centralized control architecture that makes them a tempting target for cyber attackers. One of the major threats is distributed denial of service (DDoS) attacks. It aims to exhaust network resources to make its services unavailable to legitimate users. DDoS attack detection based on machine learning algorithms is considered one of the most used techniques in SDN security. In this paper, four machine learning techniques (Random Forest, K-nearest neighbors, Naive Bayes, and Logistic Regression) have been tested to detect DDoS attacks. Also, a mitigation technique has been used to eliminate the attack effect on SDN. RF and KNN were selected because of their high accuracy results. Three types of ne
... Show MoreThe objective of this study is to explain the role of credit policies in agricultural development of Iraq during the period 1979-1989 which were represented by the policy of co-operative agricultural bank the organization that responsible to finance agricultural sector for various reasons. It has been shown that there was no clear credit policy existed during the period concerned due to the differences between loans from year. The loan growth rate was low in general comparing with objectives of the agricultural development plans, a low production rates comparing with loans paid, the growth rate of average number of trees in each donum and the growth rate of livestock number was also low.In conclusion there should be a clear plan for cred
... Show MoreThis is an open access by CC Attribution-Noncommercial-NoDerivatives 4.0
https://creativecommons.org/licenses/by-nc-nd/4.0
Takfir is an ancient phenomenon that accompanied the emergence of Islam, and this phenomenon took its political dimension during the time of the fourth Rashidi Caliph with the emergence ofthe Kharijites sect that disbelieved many Muslims.
The study started from the hypothesis that "contemporary Islamicmovements and organizations have relied in their takfir on the ideas and fatwas presented by the predecessors which applied ontocontemporary rea
... Show MoreThis study is about the role of the Internet in spreading rumors, especially through social networking sites "Facebook" model as the effectiveness of social networks lies in the speed of transmission of events; these two characteristics are important to the public, making the Internet a strong contender for television and its relationship with the public. That's why we find that the Internet today has become a fertile environment for the growth and spread of rumors. The more limited the platforms and places of publication, the greater the responsibility in the search for the original source in spreading this or that rumor, as the Internet is considered an easy means in the production, spreading and re-spreading of
... Show MoreThe Internet image retrieval is an interesting task that needs efforts from image processing and relationship structure analysis. In this paper, has been proposed compressed method when you need to send more than a photo via the internet based on image retrieval. First, face detection is implemented based on local binary patterns. The background is notice based on matching global self-similarities and compared it with the rest of the image backgrounds. The propose algorithm are link the gap between the present image indexing technology, developed in the pixel domain, and the fact that an increasing number of images stored on the computer are previously compressed by JPEG at the source. The similar images are found and send a few images inst
... Show MoreThe current paper was designed to find the possible synergic effect of EBV infection with the HPV-16 in Iraqi women suffering from cervical carcinoma. This retrospective study involved paraffinized blocks of two groups. The research included 30 carcinomatous cervical tissues and 15 samples from normal cervical biopsies. After sectioning using positively charged slides, immunohistochemistry (IHC) was performed to detect anti-Epstein Barr Virus LMP1 and Human papillomavirus type 16 primary antibodies. Sixty-three percentage (19 out of 30) of the studies group showed positive overexpression as shown in with a significant association of the expression with cervical cancer with a significant association (p = 0). The co-infection of the EBV and H
... Show MoreHeritage is considered as the civilization and cultural wealth accumulated over the . centuries, whereas architectural heritage is the physical witness of that civilization. Despite the fact that architectural heritage is the most important effort for economic development of any communit,، it suffers from deterioration and neglection especially in the Arab communities. Recently awareness has increased about the importance of investing on architectural heritage generally and sustainable investment particularly. The goal of investment process in heritage areas is to revive economic activity in addition to attempt to revive the heritage and community values. Research aims to examine the relationship between sustainable investment and
... Show More