As s widely use of exchanging private information in various communication applications, the issue to secure it became top urgent. In this research, a new approach to encrypt text message based on genetic algorithm operators has been proposed. The proposed approach follows a new algorithm of generating 8 bit chromosome to encrypt plain text after selecting randomly crossover point. The resulted child code is flipped by one bit using mutation operation. Two simulations are conducted to evaluate the performance of the proposed approach including execution time of encryption/decryption and throughput computations. Simulations results prove the robustness of the proposed approach to produce better performance for all evaluation metrics with respect to the conventional encryption techniques like RSA, DES, etc.
Background: Thalassemia is characterized by the decrease or absence of the synthesis of one or more globin chains of hemoglobin. Thalassemia is distributed worldwide and is characterized by; regular blood transfusion which is creating alloimmunization to erythrocyte antigens is one of the major complications of regular blood transfusions in thalassemia, particularly in patients who are chronically transfused.Objectives: The aims of this study are to understand the immune system profile as the triggering factor for thalassemia.Methods: Thirty patients aging between one year and four months and twenty two years, twenty two of them were boys and eight were girls. Twenty nine patients, their parents are relative except one and studied in the
... Show MoreThis study aimed to detect Anaplasma phagocytophilum in horses through hematological and molecular tests. The 16S rRNA gene of the Anaplasma phagocytophilum parasite was amplified by polymerase chain reaction (PCR), then sequenced, and subjected to phylogenetic analysis to explore "Equine Granulocytic Anaplasmosis" (EGA) infection in three important gathering race horses areas in Baghdad governorate, Iraq. Blood samples were obtained from 160 horses of varying ages, three breeds, and both sexes, between January and December 2021. Prevalence and risk variables for anaplasmosis were analyzed using statistical odds ratio and chi-square tests. Results demonstrated that clinical anaplasmosis symptoms comprised jaundice, wei
... Show MoreThe imperative of achieving financial stability has transcended national boundaries, necessitating heightened attention from both researchers and policymakers. Consequently, this article delves into an examination of the impact of government debt and public debt on financial development within the context of Iraq. The study employs monetary policy, interest rate, inflation, and population growth as control variables to prognosticate financial development. Utilizing data extracted from the World Development Indicators (WDI) spanning the period from 1995 to 2022, the study employs the dynamic autoregressive distributed lag (DARDL) approach to scrutinize the associations under investigation. The findings underscore a negative association betwe
... Show MoreSteganography art is a technique for hiding information where the unsuspicious cover signal carrying the secret information. Good steganography technique must be includes the important criterions robustness, security, imperceptibility and capacity. The improving each one of these criterions is affects on the others, because of these criterions are overlapped each other. In this work, a good high capacity audio steganography safely method has been proposed based on LSB random replacing of encrypted cover with encrypted message bits at random positions. The research also included a capacity studying for the audio file, speech or music, by safely manner to carrying secret images, so it is difficult for unauthorized persons to suspect
... Show Morel
Background: CYP1A1 gene polymorphisms and tobacco smoking are among several risk factors for various types of cancers, but their influence on breast cancer remains controversial. We analyzed the possible association of CYP1A1 gene polymorphisms and tobacco smoking-related breast cancer in women from Iraq. Materials and methods: In this case-control study, gene polymorphism of CYP1A1 gene (CYP1A1m1, T6235C and CYP1A1m2, A4889G) of 199 histologically verified breast cancer patients' and 160 cancer-free control women's specimens were performed by using PCR-based restriction fragment length polymorphism. Results: Three genotype frequencies (TT, TC, and CC) of CYP1A1m1T/C appeared in 16.1, 29.6, and 54.3% of women with breast cancer, respectiv
... Show MoreThis study was aimed to investigate the genetic variability of 26 rice genotypes and evaluation at two locations in Sulaimani governorate, Gaba and Chawtan which were completely different in their environmental condition during the season of 2019. The performances of the genotypes were analyzed at both locations as well as the average of both. Simple coefficients of correlation were used to assess the grain yield components and their relationships. Path analysis was used to determine the direct and indirect effects of such components on grain yield plant-1. The genotypes were grouped based on the agro-morphological features using cluster analysis. Almost all of the traits at both locat
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreDocument clustering is the process of organizing a particular electronic corpus of documents into subgroups of similar text features. Formerly, a number of conventional algorithms had been applied to perform document clustering. There are current endeavors to enhance clustering performance by employing evolutionary algorithms. Thus, such endeavors became an emerging topic gaining more attention in recent years. The aim of this paper is to present an up-to-date and self-contained review fully devoted to document clustering via evolutionary algorithms. It firstly provides a comprehensive inspection to the document clustering model revealing its various components with its related concepts. Then it shows and analyzes the principle research wor
... Show MoreThe interests toward developing accurate automatic face emotion recognition methodologies are growing vastly, and it is still one of an ever growing research field in the region of computer vision, artificial intelligent and automation. However, there is a challenge to build an automated system which equals human ability to recognize facial emotion because of the lack of an effective facial feature descriptor and the difficulty of choosing proper classification method. In this paper, a geometric based feature vector has been proposed. For the classification purpose, three different types of classification methods are tested: statistical, artificial neural network (NN) and Support Vector Machine (SVM). A modified K-Means clustering algorithm
... Show More