Recent research has shown that a Deoxyribonucleic Acid (DNA) has ability to be used to discover diseases in human body as its function can be used for an intrusion-detection system (IDS) to detect attacks against computer system and networks traffics. Three main factor influenced the accuracy of IDS based on DNA sequence, which is DNA encoding method, STR keys and classification method to classify the correctness of proposed method. The pioneer idea on attempt a DNA sequence for intrusion detection system is using a normal signature sequence with alignment threshold value, later used DNA encoding based cryptography, however the detection rate result is very low. Since the network traffic consists of 41 attributes, therefore we proposed the most possible less character number (same DNA length) which is four-character DNA encoding that represented all 41 attributes known as DEM4all. The experiments conducted using standard data KDDCup 99 and NSL-KDD. Teiresias algorithm is used to extract Short Tandem Repeat (STR), which includes both keys and their positions in the network traffic, while Brute-force algorithm is used as a classification process to determine whether the network traffic is attack or normal. Experiment run 30 times for each DNA encoding method. The experiment result shows that proposed method has performed better accuracy (15% improved) compare with previous and state of the art DNA algorithms. With such results it can be concluded that the proposed DEM4all DNA encoding method is a good method that can used for IDS. More complex encoding can be proposed that able reducing less number of DNA sequence can possible produce more detection accuracy.
In this study, the energy charging mechanism is mathematically modeled to determine the impact of design modifications on the thermofluidic behavior of a phase change material (PCM) filled in a triplex tube containment geometry. The surface area of the middle tube, where the PCM is placed, is supported by single or multi-internal frustum tubes in vertical triplex tubes to increase the performance of the heating and cooling of the system. In addition to the ordinary straight triplex tubes, three more scenarios are considered: (1) changing the middle tube to the frustum tube, (2) changing the inner tube to the frustum tube, and (3) changing both the internal and central tubes to the frustum tubes. The impact of adopting the tube desig
... Show MoreIn this paper deals with the effect laser irradiation on the optical properties of cobalt oxide (CoO2) thin films and that was prepared using semi computerized spray pyrolysis technique. The films deposited on glass substrate using such as an ideal value concentration of (0.02)M with a total volume of 100 ml. With substrate temperature was (350 C), spray rate (15 ml/min).The XRD diffraction given polycrystalline nature with Crystal system trigonal (hexagonal axes). The obtained films were irradiated by continuous green laser (532.8 nm) with power 140 mW for different time periods is 10 min,20min and 30min. The result was that the optical properties of cobalt oxide thin films affe
This study aimed to determine the radioactivity and radiation hazard indicators of rice samples potentially for human consumption. Gamma spectroscopy was used to calculate the specific activity of natural and artificial radionuclides (238U, 232Th, 40K, and 137Cs) in local and imported rice samples collected from local markets in Baghdad Governorate, Iraq, in addition to various radiological hazard indices. The radionuclide concentrations in the samples varied from 2.123 ± 1.457 Bq/kg to 13.032 ± 3.610 Bq/kg for 238U, 2.906 ± 1.705 Bq/kg to 17.290 ± 4.158 Bq/kg for 232
The current research aims to study the extent to which the Independent High Electoral Commission applies to information security risk management by the international standard (ISO / IEC27005) in terms of policies, administrative and technical procedures, and techniques used in managing information security risks, based on the opinions of experts in the sector who occupy positions (General Manager The directorate, department heads and their agents, project managers, heads of divisions, and those authorized to access systems and software). The importance of the research comes by giving a clear picture of the field of information security risk management in the organization in question because of its significant role in identifying risks and s
... Show MoreThe study aimed to reveal the obstacles of administrative creativity among the leaders of secondary schools (the curriculum system) in the northern border region, which relate to the obstacles (organizational, motivational, and psychological). In addition, to identify the most important statistical differences between the responses of the members of the study sample, which attribute to the variables (educational qualification, year’s Administrative expertise). To achieve the goal of the study, the researcher used the descriptive analytical approach, and to verify the validity of the tool, it has presented to several referees and faculty members in the educational field. The validity of the internal consistency was also calculated for t
... Show MoreThe problem of rapid population growth is one of the main problems effecting countries of the world the reason for this the growth in different environment areas of life commercial, industrial, social, food and educational. Therefore, this study was conducted on the amount of potable water consumed using two models of the two satellite and aerial images of the Kadhimiya District-block 427 and Al-Shu,laa district-block 450 in Baghdad city for available years in the Secretariat of Baghdad (2005, 2011,2013,2015). Through the characteristics of geographic information systems, which revealed the spatial patterns of urban creep by determining the role and buildings to be created, which appear in the picture for the
... Show MoreThe efficient behavior of a low-concentrating photovoltaic-thermal system with a micro-jet channel (LCPV/T-JET) and booster mirror reflector is experimentally evaluated here. Micro-jets promote the thermal management of PV solar cells by implementing jet water as active cooling, which is still in the early stages of development. The booster mirror reflector concentrates solar irradiance into solar cells and improves the thermal, electrical, and combined efficiencies of the LCPV/T-JET system. The LCPV/T-JET system was tested under ambient weather conditions in the city of Bangi, Selangor, Malaysia, and all data was recorded between 10:00 a.m. and 4:00 p.m. Parametric studies were conducted to compare the performance of the LCPV/T-JET system
... Show MoreA twisted-fin array as an innovative structure for intensifying the charging response of a phase-change material (PCM) within a shell-and-tube storage system is introduced in this work. A three-dimensional model describing the thermal management with charging phase change process in PCM was developed and numerically analyzed by the enthalpy-porosity method using commercial CFD software. Efficacy of the proposed structure of fins for performing better heat communication between the active heating surface and the adjacent layers of PCM was verified via comparing with conventional longitudinal fins within the same design limitations of fin material and volume usage. Optimization of the fin geometric parameters including the pitch, numb
... Show More