Recent research has shown that a Deoxyribonucleic Acid (DNA) has ability to be used to discover diseases in human body as its function can be used for an intrusion-detection system (IDS) to detect attacks against computer system and networks traffics. Three main factor influenced the accuracy of IDS based on DNA sequence, which is DNA encoding method, STR keys and classification method to classify the correctness of proposed method. The pioneer idea on attempt a DNA sequence for intrusion detection system is using a normal signature sequence with alignment threshold value, later used DNA encoding based cryptography, however the detection rate result is very low. Since the network traffic consists of 41 attributes, therefore we proposed the most possible less character number (same DNA length) which is four-character DNA encoding that represented all 41 attributes known as DEM4all. The experiments conducted using standard data KDDCup 99 and NSL-KDD. Teiresias algorithm is used to extract Short Tandem Repeat (STR), which includes both keys and their positions in the network traffic, while Brute-force algorithm is used as a classification process to determine whether the network traffic is attack or normal. Experiment run 30 times for each DNA encoding method. The experiment result shows that proposed method has performed better accuracy (15% improved) compare with previous and state of the art DNA algorithms. With such results it can be concluded that the proposed DEM4all DNA encoding method is a good method that can used for IDS. More complex encoding can be proposed that able reducing less number of DNA sequence can possible produce more detection accuracy.
This paper proposes and tests a computerized approach for constructing a 3D model of blood vessels from angiogram images. The approach is divided into two steps, image features extraction and solid model formation. In the first step, image morphological operations and post-processing techniques are used for extracting geometrical entities from the angiogram image. These entities are the middle curve and outer edges of the blood vessel, which are then passed to a computer-aided graphical system for the second phase of processing. The system has embedded programming capabilities and pre-programmed libraries for automating a sequence of events that are exploited to create a solid model of the blood vessel. The gradient of the middle c
... Show MoreIn Present study, 25 clinical isolates of Proteus spp. of clinical samples, urine, wounds and burns collected from different hospitals in Baghdad city, all isolates were identified as Proteus mirabilis using different bacteriological media, biochemical assays and Vitek-2 system. It was found that 15 (60%) isolates were identifying as P. mirabilis. The susceptibility of P. mirabilis isolates to cefotaxime was 66.6 %, while to ceftazidime was 20%. Extended spectrum β-lactamses producing Proteus was 30.7 %. DNA of 5 isolates of P. mirabilis was extracted and detection for blaVEB-1 gene by using multiplex polymerase chain reaction (PCR). Results showed that the presence of this gene in all tested isolates, as an important indicator for increas
... Show MoreBackground: Although mammography is a powerful screening tool in detection of early breast cancer, it is imperfect, particularly for women with dense breast, which have a higher risk to develop cancer and decrease the sensitivity of mammogram, Automated breast ultrasound is a recently introduced ultrasonography technique, developed with the purpose to standardize breast ultrasonography and overcome some limitations of handheld ultrasound, this study aims to evaluate the diagnostic efficacy of Automated breast ultrasound and compare it with handheld ultrasound in the detection and characterization of breast lesions in women with dense breasts. Objectives: To evaluate the diagnostic efficacy of Automated breast ultrasound and compare
... Show MoreDiarrhea is a real disease in childhood which could cause death. Therefore, this study was conducted to isolate Salmonella from 350 stool samples taken from children under five years in age, suffering from diarrhea during the period from March 2019 to March 2020 in Tikrit city / Iraq. The results showed the possibility to isolate ten isolates of Salmonella enterica subsp. Enterica, an infection rate, represents 2.875% of the total rate of patients who suffer from diarrhea. The virulence genes were investigated for ten isolates of S. enterica subsp. enterica, the result is that all isolates possessed the genes stn, invA, lpfA with an appearance percentage of 100%, whi
... Show MoreBotnet is a malicious activity that tries to disrupt traffic of service in a server or network and causes great harm to the network. In modern years, Botnets became one of the threads that constantly evolving. IDS (intrusion detection system) is one type of solutions used to detect anomalies of networks and played an increasing role in the computer security and information systems. It follows different events in computer to decide to occur an intrusion or not, and it used to build a strategic decision for security purposes. The current paper
Background: Osteoporosis is denoted by low bone mass and microarchitectural breakdown of bone tissue, directing to increased fracture risk and bone fragility. Fractures may lead to a decreased quality of life and increased medical costs. Thus, osteoporosis is widely considered a significant health concern.
Objective. This study aimed to compare quantitative computed tomography (QCT) and dual-energy X-Ray absorptiometry (DXA) to detect osteoporosis in postmenopausal women.
Subjects and Methods. We measured spinal volumetric bone mineral density (BMD) with QCT and areal spinal and hip BMD with DXA in 164 postmenopausal women. We calculated the osteo
... Show MoreThis study was done to evaluate a new technique to determine the presence of methamphetamine in the hair using nano bentonite-based adsorbent as the filler of extraction column. The state of the art of this study was based on the presence of silica in the nano bentonite that was assumed can interact with methamphetamine. The hair used was treated using methanol to extract the presence of methamphetamine, then it was continued by sonicating the hair sample. Qualitative analysis using Marquish reagent was performed to confirm the presence of methamphetamine in the isolate.The hair sample that has been taken in a different period confirmed that this current developing method can be used to analyzed methamphetamine. This m
... Show MoreThe virulent genes are the key players in the ability of the bacterium to cause disease. The products of such genes that facilitate the successful colonization and survival of the bacterium in or cause damage to the host are pathogenicity determinants. This study aimed to investigate the prevalence of virulence factors (esp, agg, gelE, CylA) in E. faecalis isolated from diverse human clinical collected in Iraqi patient , as well as to assess their ability to form biofilm and to determine their haemolytic and gelatinase activities. Thirty-two isolates of bacteria Enterococcus faecalis were obtained, including 15 isolates (46.87%) of the urine, 6 isolates (18.75%) for each of the stool and uterine secretions, and 5 isolates (15.62%) of the wo
... Show More