Preferred Language
Articles
/
oxfd3ZEBVTCNdQwC1ZuG
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a new RNA encoding method and ResNet50 Model, where the encoding is done by splitting the training records into different groups. These groups are protocol, service, flag, and digit, and each group is represented by the number of RNA characters that can represent the group's values. The RNA encoding phase converts network traffic records into RNA sequences, allowing for a comprehensive representation of the dataset. The detection model, utilizing the ResNet architecture, effectively tackles training challenges and achieves high detection rates for different attack types. The KDD-Cup99 Dataset is used for both training and testing. The testing dataset includes new attacks that do not appear in the training dataset, which means the system can detect new attacks in the future. The efficiency of the suggested anomaly intrusion detection system is done by calculating the detection rate (DR), false alarm rate (FAR), and accuracy. The achieved DR, FAR, and accuracy are equal to 96.24%, 6.133%, and 95.99%. The experimental results exhibit that the RNA encoding method can improve intrusion detection.

Scopus Crossref
View Publication
Publication Date
Mon Jun 01 2015
Journal Name
Journal Of The College Of Languages (jcl)
Emotions conflict In Balzac’s novel The Father Goriot And Stendhal’s The Red and The Black
...Show More Authors

Au XIXe siècle, avec l’excès de la passion, le roman français commence à avoir de nouvelles figures. Il tend à être un reflet de la pensée et de la passion. Stendhal et Balzac révèlent ainsi le conflit de l’âme et donnent à leur héros l’impression que tout est permis.

                Ces protagonistes doivent, d’une part, subir des fluctuations psychologiques, et d’autre part, ces héros doivent être capables de faire face aux rancunes et aux conflits destructeurs. Les personnages stendhaliens et balzaciens finissent par croire que leur combat ne portera pas ses fruits, parce que toute passion déséquilibrée mènera, soit à la fol

... Show More
View Publication Preview PDF
Publication Date
Thu Sep 26 2019
Journal Name
International Journal Of Pharmaceutical Research
Synthesis and identification of novel 2-thioxoimidazolidin- 4-one derivatives containing azo and ester groups
...Show More Authors

The compounds 3-[4̄-(4˭-methoxybenzoyloxy) benzylideneamino]-2-thioxo-imidazolidine-4-one(3)aand 4-(1-(5-oxo- 2-thioxoimidazolidin-1-ylimino)ethyl)phenyl acetate(3)b were prepared from the reaction of aromatic aldehyde or ketone(1)a,bwith thiosemicarbazide to give aryl thiosemicarbazones(2)a,b ,followed by cyclization with ethylchloroacetate in the presence of fused sodium acetate. Treatment the compounds(3)a,bwith 4- hydroxybenzenediazoniumchloride yielded the correspondings4-((4-((4-hydroxyphenyl)diazenyl)-5-oxo-2- thioxoimidazolidin-1-ylimino)methyl)phenyl 4-methoxybenzoate(4)aand4-(1-(4-((4-hydroxyphenyl)diazenyl)-5-oxo-2- thioxoimidazolidin-1-ylimino)ethyl)phenyl acetate(4)b.The new 2-thioxo-imidazolidin-4-one with esters (5-7)a,b sy

... Show More
Publication Date
Thu Sep 26 2019
Journal Name
Journal Of Pharmaceutical Research International
Synthesis and identification of novel 2-thioxoimidazolidin-4-one derivatives containing azo and ester groups
...Show More Authors

The compounds 3-[4̄-(4˭-methoxybenzoyloxy) benzylideneamino]-2-thioxo-imidazolidine-4-one(3)aand 4-(1-(5-oxo- 2-thioxoimidazolidin-1-ylimino)ethyl)phenyl acetate(3)b were prepared from the reaction of aromatic aldehyde or ketone(1)a,bwith thiosemicarbazide to give aryl thiosemicarbazones(2)a,b ,followed by cyclization with ethylchloroacetate in the presence of fused sodium acetate. Treatment the compounds(3)a,bwith 4- hydroxybenzenediazoniumchloride yielded the correspondings4-((4-((4-hydroxyphenyl)diazenyl)-5-oxo-2- thioxoimidazolidin-1-ylimino)methyl)phenyl 4-methoxybenzoate(4)aand4-(1-(4-((4-hydroxyphenyl)diazenyl)-5-oxo-2- thioxoimidazolidin-1-ylimino)ethyl)phenyl acetate(4)b.The new 2-thioxo-imidazolidin-4-one with esters (5-7)a,b sy

... Show More
Preview PDF
Publication Date
Mon Sep 30 2024
Journal Name
Iraqi Journal Of Science
Overlapping Structure Detection in Protein-Protein Interaction Networks Using a Modified Version of Particle Swarm Optimization
...Show More Authors

In today's world, the science of bioinformatics is developing rapidly, especially with regard to the analysis and study of biological networks. Scientists have used various nature-inspired algorithms to find protein complexes in protein-protein interaction (PPI) networks. These networks help scientists guess the molecular function of unknown proteins and show how cells work regularly. It is very common in PPI networks for a protein to participate in multiple functions and belong to many complexes, and as a result, complexes may overlap in the PPI networks. However, developing an efficient and reliable method to address the problem of detecting overlapping protein complexes remains a challenge since it is considered a complex and har

... Show More
View Publication
Scopus Crossref
Publication Date
Fri Jan 01 2016
Journal Name
Advances In Computing
A New Abnormality Detection Approach for T1-Weighted Magnetic Resonance Imaging Brain Slices Using Three Planes
...Show More Authors

Generally, radiologists analyse the Magnetic Resonance Imaging (MRI) by visual inspection to detect and identify the presence of tumour or abnormal tissue in brain MR images. The huge number of such MR images makes this visual interpretation process, not only laborious and expensive but often erroneous. Furthermore, the human eye and brain sensitivity to elucidate such images gets reduced with the increase of number of cases, especially when only some slices contain information of the affected area. Therefore, an automated system for the analysis and classification of MR images is mandatory. In this paper, we propose a new method for abnormality detection from T1-Weighted MRI of human head scans using three planes, including axial plane, co

... Show More
Publication Date
Sun Sep 22 2019
Journal Name
Baghdad Science Journal
Detection of CTX-M-type ESBLs from Escherichia coli Clinical Isolates from a Tertiary Hospital, Malaysia
...Show More Authors

The present study aims to detect CTX-M-type ESBL from Escherichia coli clinical isolates and to analyze their antibotic susceptibility patterns. One hundred of E. coli isolates were collected from different clinical samples from a tertiary hospital. ESBL positivity was determined by the disk diffusion method. PCR used for amplification of CTX-M-type ESBL produced by E. coli. Out of 100 E. coli isolates, twenty-four isolates (24%) were ESBL-producers. E. coli isolated from pus was the most frequent clinical specimen that produced ESBL (41.66%) followed by urine (34.21%), respiratory (22.23%), and blood (19.05%).  After PCR amplification of these 24 isolates, 10 (41.66%) isolates were found to possess CTX-M genes. The CTX-M type ESBL

... Show More
View Publication Preview PDF
Scopus (5)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Mon Apr 24 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Adaptive Canny Algorithm Using Fast Otsu Multithresholding Method
...Show More Authors

   In this research, an adaptive Canny algorithm using fast Otsu multithresholding method is presented, in which fast Otsu multithresholding method is used to calculate the optimum maximum and minimum hysteresis values and used as automatic thresholding for the fourth stage of the Canny algorithm.      The new adaptive Canny algorithm and the standard Canny algorithm (manual hysteresis value) was tested on standard image (Lena) and satellite image. The results approved the validity and accuracy of the new algorithm to find the images edges for personal and satellite images as pre-step for image segmentation.  
 

View Publication Preview PDF
Publication Date
Thu Dec 15 2022
Journal Name
Arab World English Journal
Genre-Based Analysis of Selected Political Debates: A Discourse Analysis Study
...Show More Authors

The researchers of the present study have conducted a genre analysis of two political debates between American presidential nominees in the 2016 and 2020 elections. The current study seeks to analyze the cognitive construction of political debates to evaluate the typical moves and strategies politicians use to express their communicative intentions and to reveal the language manifestations of those moves and strategies. To achieve the study’s aims, the researchers adopt Bhatia’s (1993) framework of cognitive construction supported by van Emeren’s (2010) pragma-dialectic framework. The study demonstrates that both presidents adhere to this genre structuring to further their political agendas. For a positive and promising image

... Show More
View Publication Preview PDF
Clarivate Crossref
Publication Date
Fri Jul 12 2024
Journal Name
International Journal Of Advances In Scientific Research And Engineering (ijasre), Issn:2454-8006, Doi: 10.31695/ijasre
A Proposed Blockchain-Based Digital-Identity Management using ERC 725/735
...Show More Authors

In modern technology, the ownership of electronic data is the key to securing their privacy and identity from any trace or interference. Therefore, a new identity management system called Digital Identity Management, implemented throughout recent years, acts as a holder of the identity data to maintain the holder’s privacy and prevent identity theft. Therefore, an overwhelming number of users have two major problems, users who own data and third-party applications will handle it, and users who have no ownership of their data. Maintaining these identities will be a challenge these days. This paper proposes a system that solves the problem using blockchain technology for Digital Identity Management systems. Blockchain is a powerful techniqu

... Show More
View Publication Preview PDF
Publication Date
Tue Dec 05 2023
Journal Name
Baghdad Science Journal
AlexNet-Based Feature Extraction for Cassava Classification: A Machine Learning Approach
...Show More Authors

Cassava, a significant crop in Africa, Asia, and South America, is a staple food for millions. However, classifying cassava species using conventional color, texture, and shape features is inefficient, as cassava leaves exhibit similarities across different types, including toxic and non-toxic varieties. This research aims to overcome the limitations of traditional classification methods by employing deep learning techniques with pre-trained AlexNet as the feature extractor to accurately classify four types of cassava: Gajah, Manggu, Kapok, and Beracun. The dataset was collected from local farms in Lamongan Indonesia. To collect images with agricultural research experts, the dataset consists of 1,400 images, and each type of cassava has

... Show More
View Publication Preview PDF
Scopus (2)
Scopus Crossref