Until recently, researchers have utilized and applied various techniques for intrusion detection system (IDS), including DNA encoding and clustering that are widely used for this purpose. In addition to the other two major techniques for detection are anomaly and misuse detection, where anomaly detection is done based on user behavior, while misuse detection is done based on known attacks signatures. However, both techniques have some drawbacks, such as a high false alarm rate. Therefore, hybrid IDS takes advantage of combining the strength of both techniques to overcome their limitations. In this paper, a hybrid IDS is proposed based on the DNA encoding and clustering method. The proposed DNA encoding is done based on the UNSW-NB15
... Show MoreA multivariate multisite hydrological data forecasting model was derived and checked using a case study. The philosophy is to use simultaneously the cross-variable correlations, cross-site correlations and the time lag correlations. The case study is of two variables, three sites, the variables are the monthly rainfall and evaporation; the sites are Sulaimania, Dokan, and Darbandikhan.. The model form is similar to the first order auto regressive model, but in matrices form. A matrix for the different relative correlations mentioned above and another for their relative residuals were derived and used as the model parameters. A mathematical filter was used for both matrices to obtain the elements. The application of this model indicates i
... Show MorePlastic soil exhibits unfavorited geotechnical properties (when saturation), which causes negative defects to engineering structures. Different attempts (included various materials) were conducted to proffer solutions to such defects by experimenting in practical ways. On one hand, these attempts aimed to improve the engineering characteristics of plastic soil, and on the other hand, to use problematic waste materials as a stabilizer, like cement kiln dust, and to reduce environmental hazards. This paper explored the shrinkage, plasticity, and strength behavior of plastic soil enhanced with cement dust. The cement dust contents were 0%, 5%, 10%, 15% and 20% by dry weight of soil. An experimental series of shrinkage and p
... Show MoreIn this work, CdS/TiO2 nanotubes composite nanofilms were successfully synthesized via electrodeposition technique. TiO2 titania nanotube arrays (NTAs) are commonly used in photoelectrochemical cells as the photoelectrode due to their high surface area, excellent charge transfer between interfaces and fewer interfacial grain boundaries. The anodization technique of titanium foil was used to prepare TiO2 NTAs photoelectrode. The concentration of CdCl2 played an important role in the formation of CdS nanoparticles. Field emission scanning electron microscopy (FESEM) shows that the CdS nanoparticles were well deposited onto the outer and inner of nanotube at 40 mM of CdCl2. X-ray diffraction (XRD) and energy dispersive X-ray (EDX) analyses wer
... Show MoreThe Ant System Algorithm (ASA) is a member of the ant colony algorithms family in swarm intelligence methods (part of the Artificial Intelligence field), which is based on the behavior of ants seeking a path and a source of food in their colonies. The aim of This algorithm is to search for an optimal solution for Combinational Optimization Problems (COP) for which is extremely difficult to find solution using the classical methods like linear and non-linear programming methods.
The Ant System Algorithm was used in the management of water resources field in Iraq, specifically for Haditha dam which is one of the most important dams in Iraq. The target is to find out an efficient management system for
... Show MoreIn this paper, a method for hiding cipher text in an image file is introduced . The
proposed method is to hide the cipher text message in the frequency domain of the image.
This method contained two phases: the first is embedding phase and the second is extraction
phase. In the embedding phase the image is transformed from time domain to frequency
domain using discrete wavelet decomposition technique (Haar). The text message encrypted
using RSA algorithm; then Least Significant Bit (LSB) algorithm used to hide secret message
in high frequency. The proposed method is tested in different images and showed success in
hiding information according to the Peak Signal to Noise Ratio (PSNR) measure of the the
original ima
This study represents an optical biosensor for early skin cancer detection using cysteine-cupped CdSe/CdS Quantum Dots (QDs). The study optimizes QD synthesis, surface, optical functionalization, and bioconjugation to enhance specificity and sensitivity for early skin cancer cell detection. The research provides insights into QD interactions with skin cancer biomarkers, demonstrating high-contrast, precise cellular imaging. Cysteine-capped CdSe/CdS absorption spectra reveal characteristic peaks for undamaged DNA, while spectral shifts indicate structural changes in skin-cancer-damaged DNA. Additionally, fluorescence spectra show sharp peaks for undamaged DNA and notable shifts and intensity variations when interacting with skin cancer. This
... Show More