Preferred Language
Articles
/
XRbFvYoBVTCNdQwCj6Qw
Four Char DNA Encoding for Anomaly Intrusion Detection System
...Show More Authors

Recent research has shown that a Deoxyribonucleic Acid (DNA) has ability to be used to discover diseases in human body as its function can be used for an intrusion-detection system (IDS) to detect attacks against computer system and networks traffics. Three main factor influenced the accuracy of IDS based on DNA sequence, which is DNA encoding method, STR keys and classification method to classify the correctness of proposed method. The pioneer idea on attempt a DNA sequence for intrusion detection system is using a normal signature sequence with alignment threshold value, later used DNA encoding based cryptography, however the detection rate result is very low. Since the network traffic consists of 41 attributes, therefore we proposed the most possible less character number (same DNA length) which is four-character DNA encoding that represented all 41 attributes known as DEM4all. The experiments conducted using standard data KDDCup 99 and NSL-KDD. Teiresias algorithm is used to extract Short Tandem Repeat (STR), which includes both keys and their positions in the network traffic, while Brute-force algorithm is used as a classification process to determine whether the network traffic is attack or normal. Experiment run 30 times for each DNA encoding method. The experiment result shows that proposed method has performed better accuracy (15% improved) compare with previous and state of the art DNA algorithms. With such results it can be concluded that the proposed DEM4all DNA encoding method is a good method that can used for IDS. More complex encoding can be proposed that able reducing less number of DNA sequence can possible produce more detection accuracy.

Scopus Clarivate Crossref
View Publication
Publication Date
Tue May 05 2015
Journal Name
The 16th Science Conference/ College Of Basic Education.
Detection of Microbial and Chemical Contamination in Canned Meat Available in Baghdad Local Markets
...Show More Authors

Publication Date
Sat Oct 04 2025
Journal Name
Mesopotamian Journal Of Computer Science
Enhanced IOT Cyber-Attack Detection Using Grey Wolf Optimized Feature Selection and Adaptive SMOTE
...Show More Authors

The Internet of Things (IoT) has significantly transformed modern systems through extensive connectivity but has also concurrently introduced considerable cybersecurity risks. Traditional rule-based methods are becoming increasingly insufficient in the face of evolving cyber threats.  This study proposes an enhanced methodology utilizing a hybrid machine-learning framework for IoT cyber-attack detection. The framework integrates a Grey Wolf Optimizer (GWO) for optimal feature selection, a customized synthetic minority oversampling technique (SMOTE) for data balancing, and a systematic approach to hyperparameter tuning of ensemble algorithms: Random Forest (RF), XGBoost, and CatBoost. Evaluations on the RT-IoT2022 dataset demonstrat

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Fri Apr 30 2021
Journal Name
Al-kindy College Medical Journal
The Role of MRI-US Fusion Techniques in Detection of Clinically Significant Prostate Cancer
...Show More Authors

Prostate cancer is the commonest male cancer and the second leading cause of cancer-related death in men. Over many decades, prostate cancer detection represented a continuous challenge to urologists. Although all urologists and pathologists agree that tissue diagnosis is essential especially before commencing active surgical or radiation treatment, the best way to obtain the biopsy was always the big hurdle. The heterogenicity of the tumor pathology is very well seen in its radiological appearance. Ultrasound has been proven to be of limited sensitivity and specificity in detecting prostate cancer. However, it was the only available targeting technique for years and was used to guide biopsy needle passed transrectally or transperineally

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Jan 01 2013
Journal Name
Baghdad Science Journal
Detection of Type 2 Diabetes Mellitus in Serum from Women with Polycystic Ovarian Syndrome
...Show More Authors

Polycystic ovary syndrome (PCOS) is one of the most common endocrine disorder. To determine the metabolic disorders in women with PCOS, (25) women with PCOS ages (15 - 47) years have been investigated and compared with (20) healthy individuals. All the studied groups were carried out to measure fasting blood sugar, (anti-GAD Ab, anti β-islet cell Ab by IFAT) and measured insulin level by ELISA. There was significant elevation in the concentration of fasting blood sugar than in control groups (p ≤ 0.05) and there was negative results for anti-GAD Ab and anti β-islet cell Ab by IFAT test for serum of women with PCOS, while there was significant differences in the insulin level for women with PCOS compared with control groups (p ≤ 0.05),

... Show More
Publication Date
Mon Jul 15 2024
Journal Name
2024 46th Annual International Conference Of The Ieee Engineering In Medicine And Biology Society (embc)
Automatic COVID-19 Detection from Chest X-ray using Deep MobileNet Convolutional Neural Network
...Show More Authors

View Publication
Scopus (3)
Crossref (2)
Scopus Crossref
Publication Date
Fri Mar 15 2024
Journal Name
2024 International Conference On Distributed Computing And Optimization Techniques (icdcot)
Reconfigurable Microstrip Antenna Design Fifth Generation (5G) System
...Show More Authors

View Publication
Scopus (2)
Scopus Crossref
Publication Date
Sun Jun 03 2012
Journal Name
Baghdad Science Journal
On The Queuing System M/Er/1/N
...Show More Authors

In this paper the queuing system (M/Er/1/N) has been considered in equilibrium. The method of stages introduced by Erlang has been used. The system of equations which governs the equilibrium probabilities of various stages has been given. For general N the probability of j stages of service are left in the system, has been introduced. And the probability for the empty system has been calculated in the explicit form.

View Publication Preview PDF
Crossref
Publication Date
Fri Mar 31 2017
Journal Name
Al-khwarizmi Engineering Journal
Emergency Fuel Rationing system using RFID Smart Cards
...Show More Authors

Rationing is a commonly used solution for shortages of resources and goods that are vital for the citizens of a country. This paper identifies some common approaches and policies used in rationing as well asrisks that associated to suggesta system for rationing fuelwhichcan work efficiently. Subsequently, addressing all possible security risks and their solutions. The system should theoretically be applicable in emergency situations, requiring less than three months to implement at a low cost and minimal changes to infrastructure.

View Publication Preview PDF
Crossref
Publication Date
Mon Apr 15 2019
Journal Name
Proceedings Of The International Conference On Information And Communication Technology
Hybrid LDPC-STBC communications system based on chaos
...Show More Authors

View Publication
Scopus Clarivate Crossref
Publication Date
Thu Jun 20 2019
Journal Name
Baghdad Science Journal
Analysis and Development of Customer Billing Telephony System
...Show More Authors

The telecommunications industry has gone through series of development efforts to provide quality services to their consumers. Generally, telecommunication industry provides two main services such as telephony and internet which involved customer registration, billing and payment. However, the challenge confronting telecommunications industry is to meet the customer satisfaction in the billing system such as accuracy, easy to understand and unambiguous billing issue. In order to develop Customer Billing Telephony System,a user experience study is conducted to gather the user requirements. Hence, the CBTS was developed that takes into consideration user’s value experience that provides a support for managing and monitoring billing proce

... Show More
View Publication Preview PDF
Crossref