Recent research has shown that a Deoxyribonucleic Acid (DNA) has ability to be used to discover diseases in human body as its function can be used for an intrusion-detection system (IDS) to detect attacks against computer system and networks traffics. Three main factor influenced the accuracy of IDS based on DNA sequence, which is DNA encoding method, STR keys and classification method to classify the correctness of proposed method. The pioneer idea on attempt a DNA sequence for intrusion detection system is using a normal signature sequence with alignment threshold value, later used DNA encoding based cryptography, however the detection rate result is very low. Since the network traffic consists of 41 attributes, therefore we proposed the most possible less character number (same DNA length) which is four-character DNA encoding that represented all 41 attributes known as DEM4all. The experiments conducted using standard data KDDCup 99 and NSL-KDD. Teiresias algorithm is used to extract Short Tandem Repeat (STR), which includes both keys and their positions in the network traffic, while Brute-force algorithm is used as a classification process to determine whether the network traffic is attack or normal. Experiment run 30 times for each DNA encoding method. The experiment result shows that proposed method has performed better accuracy (15% improved) compare with previous and state of the art DNA algorithms. With such results it can be concluded that the proposed DEM4all DNA encoding method is a good method that can used for IDS. More complex encoding can be proposed that able reducing less number of DNA sequence can possible produce more detection accuracy.
To study and understand the mechanism of living systems, and how it works, it is quite important to investigate it at molecular level (like genomic, proteomic) as well as the methodologies, and how to apply and imply it on different branch of sciences and how can use it in developing medical diagnosis, treatments, drugs, and increased it in the future. Additionally it can also be applied in forensic techniques, food production and agriculture, as well as genetic profiling. This can be well understand by interfering and combinations of all branches of life sciences such as chemistry, physics, biotechnology, genetic evolution, and minimize the gap between them, this
... Show MoreTitanium dioxide TiO2 has been widely utilized in cleaning and sterilizing material for many clinical tools sanitary ware, food tableware and cooking and items for use in hospitals. Titanium dioxide TiO2 non toxicity and long term physical and chemical stability. It has been widely used decomposition of organic compounds and microbial organisms such as cancer cell, viruses and bacteria as well as its potential application in sterilization of medical devices. The aim of the study the effect of titanium dioxide TiO2 on some Gram negative bacteria and study their effects on some virulence factors and chromosomal DNA.In this study, we obtained (E. coli ? Proteus mirabilis, Proteus vulgaris ? Pseudomonas aeruginosa ? Klebsiella pneumonia and Ac
... Show MoreThe present study aims at answering the following questions:.
1-Which is more effective in enriching students. Vocabulary ,the use of short stories or the traditional way?
2-What extent has the use of short stories an effect upon the students. achievement in vocabulary test?
3- Is there any significant difference between the male and female student of the experimental group in vocabulary achievement test?
 
... Show MoreIn this research, the focus was placed on estimating the parameters of the Hypoexponential distribution function using the maximum likelihood method and genetic algorithm. More than one standard, including MSE, has been adopted for comparison by Using the simulation method
In this research, the focus was on estimating the parameters on (min- Gumbel distribution), using the maximum likelihood method and the Bayes method. The genetic algorithmmethod was employed in estimating the parameters of the maximum likelihood method as well as the Bayes method. The comparison was made using the mean error squares (MSE), where the best estimator is the one who has the least mean squared error. It was noted that the best estimator was (BLG_GE).
Most recognition system of human facial emotions are assessed solely on accuracy, even if other performance criteria are also thought to be important in the evaluation process such as sensitivity, precision, F-measure, and G-mean. Moreover, the most common problem that must be resolved in face emotion recognition systems is the feature extraction methods, which is comparable to traditional manual feature extraction methods. This traditional method is not able to extract features efficiently. In other words, there are redundant amount of features which are considered not significant, which affect the classification performance. In this work, a new system to recognize human facial emotions from images is proposed. The HOG (Histograms of Or
... Show MoreAtomic Force Microscope is an efficient tool to study the topography of precipitate. A study using Continuous Flow Injection via the use of Ayah 6SX1-T-2D Solar cell CFI Analyser . It was found that Cyproheptadine –HCl form precipitates of different quality using a precipitating agent's potassium hexacyanoferrate (III) and sodium nitroprusside. The formed precipitates are collected as they are formed in the usual sequence of forming the precipitate via the continuous flow .The precipitates are collected and dried under normal atmospheric pressure. The precipitates are subjected to atomic force microscope scanning to study the variation and differences of these precipitates relating them to the kind of response to both precipitates give
... Show MoreOptical burst switching (OBS) network is a new generation optical communication technology. In an OBS network, an edge node first sends a control packet, called burst header packet (BHP) which reserves the necessary resources for the upcoming data burst (DB). Once the reservation is complete, the DB starts travelling to its destination through the reserved path. A notable attack on OBS network is BHP flooding attack where an edge node sends BHPs to reserve resources, but never actually sends the associated DB. As a result the reserved resources are wasted and when this happen in sufficiently large scale, a denial of service (DoS) may take place. In this study, we propose a semi-supervised machine learning approach using k-means algorithm
... Show MoreSome maps of the chaotic firefly algorithm were selected to select variables for data on blood diseases and blood vessels obtained from Nasiriyah General Hospital where the data were tested and tracking the distribution of Gamma and it was concluded that a Chebyshevmap method is more efficient than a Sinusoidal map method through mean square error criterion.
Technological advances have yielded new molecular biology-based methods for the diagnosis of infectious diseases. The newest and most powerful molecular diagnostic tests are available at regional and national reference laboratories, as well as at specialized centers that are certified to conduct metagenomic testing. Metagenomic assays utilize advances in DNA extraction technology, DNA sequence library construction, high throughput DNA sequencing and automated data analysis to identify millions of individual strands of DNA extracted from clinical samples. At present, metagenomic assays are only possible at a small number of special research, academic and commercial laboratories. Continued research in human and path
... Show More