Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a new RNA encoding method and ResNet50 Model, where the encoding is done by splitting the training records into different groups. These groups are protocol, service, flag, and digit, and each group is represented by the number of RNA characters that can represent the group's values. The RNA encoding phase converts network traffic records into RNA sequences, allowing for a comprehensive representation of the dataset. The detection model, utilizing the ResNet architecture, effectively tackles training challenges and achieves high detection rates for different attack types. The KDD-Cup99 Dataset is used for both training and testing. The testing dataset includes new attacks that do not appear in the training dataset, which means the system can detect new attacks in the future. The efficiency of the suggested anomaly intrusion detection system is done by calculating the detection rate (DR), false alarm rate (FAR), and accuracy. The achieved DR, FAR, and accuracy are equal to 96.24%, 6.133%, and 95.99%. The experimental results exhibit that the RNA encoding method can improve intrusion detection.
The goal of this research is to develop a numerical model that can be used to simulate the sedimentation process under two scenarios: first, the flocculation unit is on duty, and second, the flocculation unit is out of commission. The general equation of flow and sediment transport were solved using the finite difference method, then coded using Matlab software. The result of this study was: the difference in removal efficiency between the coded model and operational model for each particle size dataset was very close, with a difference value of +3.01%, indicating that the model can be used to predict the removal efficiency of a rectangular sedimentation basin. The study also revealed
Internet of Things (IoT) is one of the newest matters in both industry and academia of the communication engineering world. On the other hand, wireless mesh networks, a network topology that has been debate for decades that haven’t been put into use in great scale, can make a transformation when it arises to the network in the IoT world nowadays. A Mesh IoT network is a local network architecture in which linked devices cooperate and route data using a specified protocol. Typically, IoT devices exchange sensor data by connecting to an IoT gateway. However, there are certain limitations if it involves to large number of sensors and the data that should be received is difficult to analyze. The aim of the work here is to implement a self-
... Show MoreThis article investigates the relationship between foot angle and jump stability, focusing on minimizing injury risk. Here are the key points: Importance: Understanding foot angle is crucial for improving jump stability, athletic performance, and reducing jump-related injuries like ankle sprains. Ideal Foot Angle: Research suggests a forward foot angle of around 15 degrees might be ideal for many people during jumps. This angle distributes forces evenly across the foot, lowers the center of gravity, and provides more surface area for pushing off the ground. Factors Affecting Ideal Angle: The optimal angle can vary depending on the type of jump (vertical vs. long jump), fitness level, and personal preference. Incorrect Foot Angles: Landing w
... Show MoreChurning of employees from organizations is a serious problem. Turnover or churn of employees within an organization needs to be solved since it has negative impact on the organization. Manual detection of employee churn is quite difficult, so machine learning (ML) algorithms have been frequently used for employee churn detection as well as employee categorization according to turnover. Using Machine learning, only one study looks into the categorization of employees up to date. A novel multi-criterion decision-making approach (MCDM) coupled with DE-PARETO principle has been proposed to categorize employees. This is referred to as SNEC scheme. An AHP-TOPSIS DE-PARETO PRINCIPLE model (AHPTOPDE) has been designed that uses 2-stage MCDM s
... Show MoreThe research (Anthropology and Representations of magic in Arab Theatrical Text, Harut and Marut's play as a Model) is concerned with studying magic and the forms of its presence in the theatrical text in different human cultures where it belongs. The research consists of four chapters.
The first chapter includes the research problem that revolves around the following questions: (what is the mechanism of employing magic anthropology and its representations in the Arab theatrical text Harut and Marut's play as a model?), and the research importance which is attributed to the necessity of studying (magic) in the Arab theatrical text as it is considered the inauguration of one of the social phenomena that many researchers in the field o
This research means a study (the impact of the Arab-Islamic environment on contemporary painting, the artist Abd al-Rahman al-Suleiman as a model). The research falls into two axes: the first: the theoretical axis, and the second: the applied axis. The first axis dealt with an introduction that contained: (the research problem, its importance, its goal, its limits, and the definition of terms). This research aims to uncover (the impact of the Arab-Islamic environment on contemporary painting, and the artist Suleiman was a model). And the research limits spatially: Saudi Arabia, and temporally: 2010-2014. This theme included two topics: The first: the characteristics of the Saudi environment and its impact on art. The second: the s
... Show MoreThe adsorption ability of Iraqi initiated calcined granulated montmorillonite to adsorb of 4-(4-Nitrobenzeneazo) 3-Aminobenzoic Acid from aqueous solutions has been investigated through columnar method. The azo dye adsorption found to be dependent on adsorbent dosage, initial concentration and contact time. All columnar experiments were carried out at three different pH values (5.5, 7and 8) using buffer solutions at flow rate of (3 drops/ min.), at room temperature (25±2) °C. The experimental isotherm data were analyzed using Langmuir, Freundlich and Temkin equations. The monolayer adsorption capacity is 6.4066 mg Azo ligand per 1g calcined Montmorillonite. The experiments showed that highest removal rate 90.5 % for azo dye at pH 5.5.The
... Show MoreThe first chapter the importance of research and need for education scientists see that the roots of the use of a specimen Wheatley in learning and teaching back to Grayson Wheatley, one of the largest supporters of a modern construction, which lay the groundwork for the specimen stage and the form in which it is. That was attributed to him, often called his name called while some educators based learning strategy on the issue. He sees the learner in this model make him a meaningful understanding of problems during his progress, thereby acting with his colleagues to find solutions to them in small groups. He
Borders Search: Search by students is determined by th
... Show More