Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a new RNA encoding method and ResNet50 Model, where the encoding is done by splitting the training records into different groups. These groups are protocol, service, flag, and digit, and each group is represented by the number of RNA characters that can represent the group's values. The RNA encoding phase converts network traffic records into RNA sequences, allowing for a comprehensive representation of the dataset. The detection model, utilizing the ResNet architecture, effectively tackles training challenges and achieves high detection rates for different attack types. The KDD-Cup99 Dataset is used for both training and testing. The testing dataset includes new attacks that do not appear in the training dataset, which means the system can detect new attacks in the future. The efficiency of the suggested anomaly intrusion detection system is done by calculating the detection rate (DR), false alarm rate (FAR), and accuracy. The achieved DR, FAR, and accuracy are equal to 96.24%, 6.133%, and 95.99%. The experimental results exhibit that the RNA encoding method can improve intrusion detection.
Objective: To measure the effect of the pharmacist-led medication reconciliation service before hospital discharge on preventing potential medication errors. Methods: This behavioral interventional study took place in a public teaching hospital in Iraq between December 2022 and January 2023. It included inpatients who were taking four or more medications upon discharge from the internal medicine ward and the cardiac care unit. The researcher provided the patients with a medication reconciliation form and reconciliation form (including medication regimen and pharmacist instructions) before discharging them home. Any discrepancies between the patients’ understanding and the actual medication recommendations prescribed by the physici
... Show MoreThe main intention of this study was to investigate the development of a new optimization technique based on the differential evolution (DE) algorithm, for the purpose of linear frequency modulation radar signal de-noising. As the standard DE algorithm is a fixed length optimizer, it is not suitable for solving signal de-noising problems that call for variability. A modified crossover scheme called rand-length crossover was designed to fit the proposed variable-length DE, and the new DE algorithm is referred to as the random variable-length crossover differential evolution (rvlx-DE) algorithm. The measurement results demonstrate a highly efficient capability for target detection in terms of frequency response and peak forming that was isola
... Show MoreIn this paper, a single link flexible joint robot is used to evaluate a tracking trajectory control and vibration reduction by a super-twisting integral sliding mode (ST-ISMC). Normally, the system with joint flexibility has inevitably some uncertainties and external disturbances. In conventional sliding mode control, the robustness property is not guaranteed during the reaching phase. This disadvantage is addressed by applying ISMC that eliminates a reaching phase to ensure the robustness from the beginning of a process. To design this controller, the linear quadratic regulator (LQR) controller is first designed as the nominal control to decide a desired performance for both tracking and vibration responses. Subsequently, discontinuous con
... Show MoreThe semiotic trend of recent monetary trends task that took a wide range of attention of critics and readers alike, especially after the deployment, which accompanied him after widespread acts critic Grimas and powers applicable to the literary texts and is thus expanded its care circle, hence the choice of the novel (absent) woman Iraqi novelist (Mahdi ‘Issa falcon) model to be applied to the study chose to be a semiotic approach through the use of procedural mechanisms for its critical tool (Paris School of semiotics), cash and views of its founder critic Grimas.The research in the introduction and pave came we made it a vision for literary semiotic and its impact trend in cash and cash is and what it desire to clarify some poked suc
... Show MoreTwo novel demountable shear connectors for precast steel-concrete composite bridges are presented. The connectors use high-strength steel bolts, which are fastened to the steel beam with the aid of a special locking configuration that prevents slip of bolts within their holes. Moreover, the connectors promote accelerated construction and overcome typical construction tolerances issues of precast structures. Most importantly, the connectors allow bridge disassembly, and therefore, can address different bridge deterioration scenarios with minimum disturbance to traffic flow, i.e. (1) precast deck panels can be rapidly uplifted and replaced; (2) connectors can be rapidly removed and replaced; and (3) steel beams can be replaced, while precast
... Show MoreThis research deals with the study of the identity lost in the novel (handcuffs of paper) by Writer (Kuwaiti / Iraqi ) Yousif Hadi Mays.This is because of The strange subject presented by the writer ,Kuwait has chosen a sbace for his novel and chose apurely Kuwaiti theme. Hence the importance of the novel, as it came to the subject of identity completely dntdiffere from what we wwrote after the fall off the regime (2003), Which is related to the last coming from outside the country, which remained oscillataing between his mother,s identity where language, religion and history and the identity of the other by virtue and dazzling, and integration and here con not belong to either party. This is a violation of the taboos of
... Show MoreBackground: Pseudomonas aeruginosa is a devious pathogen with the tendency to prompt many acute and serious chronic diseases. This study aims to detect novel genes (Toxins-Antitoxins II system), especially; higB and higA encoded from P. aeruginosa by PCR technique and the relation between these genes and antibiotic resistance of P. aeruginosa. Methods: This study detected 50 isolates of P. aeruginosa from distinct clinical sources. The most common origin of isolates was (44%) burn swabs, (22%) urine culture, (12%) wound swabs, (14%) sputum, and (8%) ear swabs. The bacteria were isolated using implantation MacConkey agar and blood agar, as well as biochemical tests including oxidase test, catalase test then VITEK-2 System of P. aerug
... Show MoreThe identity of the cultural identity of the party (the ego and the other) during a series of questions subject to the transformations of history and the process of culture, the search of identity and its characteristics within the novel discourse calls to address the cultural impact communication discourse aims to reveal the functional and intellectual benefits that contributed to the formation of cultural identity, and stand at the most important manifestations And the secretions that mimic a world remains part of it present in the imagination of the producer of the text is moving in accordance with the holistic perception of the world embedded between the lines of the trial.The question of identity as an intellectual dimension in orde
... Show More