Regarding to the computer system security, the intrusion detection systems are fundamental components for discriminating attacks at the early stage. They monitor and analyze network traffics, looking for abnormal behaviors or attack signatures to detect intrusions in early time. However, many challenges arise while developing flexible and efficient network intrusion detection system (NIDS) for unforeseen attacks with high detection rate. In this paper, deep neural network (DNN) approach was proposed for anomaly detection NIDS. Dropout is the regularized technique used with DNN model to reduce the overfitting. The experimental results applied on NSL_KDD dataset. SoftMax output layer has been used with cross entropy loss function to enforce the proposed model in multiple classification, including five labels, one is normal and four others are attacks (Dos, R2L, U2L and Probe). Accuracy metric was used to evaluate the model performance. The proposed model accuracy achieved to 99.45%. Commonly the recognition time is reduced in the NIDS by using feature selection technique. The proposed DNN classifier implemented with feature selection algorithm, and obtained on accuracy reached to 99.27%.
This research aims to know the role of transformational leadership in the organizational success of the College of Education at Samarra University. The researcher adopted the analytical descriptive method in analyzing the research problem. The research included two main hypotheses that resulted in four hypotheses that were subjected to statistical tests. A sample of (54) The researcher used the survey method as a main tool for collecting data and information as well as visits and structured interviews that took place during the period of application. The research reached a set of conclusions and recommendations among the conclusions that there is an art relationship There is a strong and moral impact between transformational lead
... Show More5-((2,4-dibromo-6-((cyclohexyl(methyl)amino)methyl)phenyl)diazenyl)quinolin-8-ol azo ligand (L) has been synthesized through the reaction of diazonium salt for 2,4-dibromo-6-((cyclohexyl(methyl)amino)methyl)aniline with 8-hydroxyquinoline. The azo ligand (L) was characterized utilizing spectroscopic techniques, including FTIR, UV-Vis, 1H and 13C NMR, as well as mass spectrometry and micro-elemental analysis (C.H.N). Metal complexes containing Co(II), Ni(II), Cu(II), and Zn(II) were synthesized and analyzed through mass spectrometry, flame atomic absorption, elemental analysis (C.H.N), infrared and UV-Vis spectroscopy, along with measurements of conductivity and magnetic properties. The experimental findings suggested that all met
... Show MoreAntibiotic resistance is a problem of deep scientific concern both in hospital and community settings. Rapid detection in clinical laboratories is essential for the judicious recognition of antimicrobial resistant organisms. So, the growth of Uropathgenic Escherichia coli (UPEC) isolates with Multidrug-resistant (MDR) and Extensively Drug-resistant (XDR) profiles that thwart therapy for (UTIs) has been detected and has straight squeezed costs and extended hospital stays. This study aims to detect MDR- and XDR-UPEC isolates. Out of 42 UPEC clinical isolates were composed from UTI patients. The bacterial strains were recognized by standard laboratory protocols. Susceptibility to antibiotic was measured by the standard disk diffusi
... Show MoreCities have witnessed great changes since the planning of the first cities. This is due to the increase in population and problems in services which affect urban security. As such, urban security is directed and affected by the nature of city planning and the types of services. Besides, the kind of services plays an imminent place in providing urban security at all levels. Other factors that influence urban security can be limited to the increase of population, economic and social changes. This leads to losing urban control. This study will explore the historical chronology to identify weaknesses in urban planning since its dawn and reaching solutions to protect urban security. The importance of the research lies in achieving urban secur
... Show MoreRecently, all over the world mechanism of cloud computing is widely acceptable and used by most of the enterprise businesses in order increase their productivity. However there are still some concerns about the security provided by the cloud environment are raises. Thus in this our research project, we are discussing over the cloud computing paradigm evolvement for the large business applications like CRM as well as introducing the new framework for the secure cloud computing using the method of IT auditing. In this case our approach is basically directed towards the establishment of the cloud computing framework for the CRM applications with the use of checklists by following the data flow of the CRM application and its lifecycle. Those ch
... Show MoreCities have witnessed great changes since the planning of the first cities. This is due to the increase in population and problems in services that affect urban security. As such, urban security is directed and affected by the nature of city planning and the types of services. Besides, the kind of services plays an imminent place in providing urban security at all levels. Other factors that influence urban security can be limited to the increase of population, economic and social changes. This leads to losing urban control. This study will explore the historical chronology to identify weaknesses in urban planning since its dawn and reaching solutions to protect urban security. The importance of the research lies in achieving urban securi
... Show MoreImage is an important digital information that used in many internet of things (IoT) applications such as transport, healthcare, agriculture, military, vehicles and wildlife. etc. Also, any image has very important characteristic such as large size, strong correlation and huge redundancy, therefore, encrypting it by using single key Advanced Encryption Standard (AES) through IoT communication technologies makes it vulnerable to many threats, thus, the pixels that have the same values will be encrypted to another pixels that have same values when they use the same key. The contribution of this work is to increase the security of transferred image. This paper proposed multiple key AES algorithm (MECCAES) to improve the security of the tran
... Show MoreMeasuring university teachers attitudes towards the security man Summary This research aims to study the measurement of university teachers attitudes towards the security man, and represented the research sample (196) of teachers, including 124 males and 72 females from different faculties of Salah al-Din - Erbil University. The researchers adopted on a scale (Al-Tarawneh 2008), as amended, and its development, the scale consists of four areas and (28) paragraph covers paragraphs measure the beliefs and feelings of the individual towards the security man as the theme of direction. The research sample answered all the paragraphs of the scale grade five similar styles (Likert) (strongly OK, OK, neutral, non-OK, Strongly Disagree). The rese
... Show MoreAbstract
The current research aims to identify the psychological security of students in the kindergarten department and identify if there is a significant difference between stage one and stage four students. To do this, the researcher adopted the psychological research scale of (Al-mohamdawi, 2007) that consisted of (30) items. It was administered to (120) female students chosen randomly from the kindergarten department in the college of education for women for the academic year (2029-2021). The results revealed that students in the kindergarten department have psychological security. There is a significant difference between stage one and four students in favor of stage four students.