Preferred Language
Articles
/
oxfd3ZEBVTCNdQwC1ZuG
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a new RNA encoding method and ResNet50 Model, where the encoding is done by splitting the training records into different groups. These groups are protocol, service, flag, and digit, and each group is represented by the number of RNA characters that can represent the group's values. The RNA encoding phase converts network traffic records into RNA sequences, allowing for a comprehensive representation of the dataset. The detection model, utilizing the ResNet architecture, effectively tackles training challenges and achieves high detection rates for different attack types. The KDD-Cup99 Dataset is used for both training and testing. The testing dataset includes new attacks that do not appear in the training dataset, which means the system can detect new attacks in the future. The efficiency of the suggested anomaly intrusion detection system is done by calculating the detection rate (DR), false alarm rate (FAR), and accuracy. The achieved DR, FAR, and accuracy are equal to 96.24%, 6.133%, and 95.99%. The experimental results exhibit that the RNA encoding method can improve intrusion detection.

Scopus Crossref
View Publication
Publication Date
Wed Dec 30 2015
Journal Name
College Of Islamic Sciences
Medical evidence in matters of proof between Sharia and law: A model
...Show More Authors

Praise be to God, prayer, and peace be upon the Messenger of Allah and his God and his companions. The field of the judiciary to prove or invalidate some cases in the field of proof of descent and attachment to the plaintiff or exile, and other legal and judicial issues, especially in this era where the spread of previously unknown evidence, such as DNA, which was discovered in 1953, and the genetic fingerprint discovered 1984, blood analysis and a Saliva, sweat, poetry, etc. in the field of forensic evidence, in forensic medicine or medical expertise, it can be used to identify the killer, or verify his identity, using all the evidence in the scene, such as a point of blood or sweat, and the like So, as well as to prove the lineage is u

... Show More
View Publication Preview PDF
Publication Date
Tue Jun 01 2021
Journal Name
Political Sciences Journal
The European Union and the Extremist Right Phenomenon: Brexit as a Model
...Show More Authors

The European Unit has never been affected by a serious phenomena as the phenomena of the advancing of the far right parties. Though these parties vary in their impact in their original countries, they agree on one important issue which is the deconstruction of the European unit and limiting its supernational powers. These increasing popular parties aim at more national independence in decision making away from the decisions taken by Brussels. Moreover, they criticize the financial and administrative corruption accompanied many of the rescuing procedures directed for example towards countries like Greece and Spain during the international economic crisis. This failure nourishes many of the negative feelings against the European unit which

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jan 01 2023
Journal Name
Communications In Mathematical Biology And Neuroscience
The dynamics of a delayed ecological model with predator refuge and cannibalism
...Show More Authors

This study has contributed to understanding a delayed prey-predator system involving cannibalism. The system is assumed to use the Holling type II functional response to describe the consuming process and incorporates the predator’s refuge against the cannibalism process. The characteristics of the solution are discussed. All potential equilibrium points have been identified. All equilibrium points’ local stability analyses for all time delay values are investigated. The system exhibits a Hopf bifurcation at the coexistence equilibrium, which is further demonstrated. The center manifold and normal form theorems for functional differential equations are then used to establish the direction of Hopf bifurcation and the stability of the per

... Show More
View Publication Preview PDF
Scopus (2)
Scopus Clarivate Crossref
Publication Date
Wed Sep 01 2021
Journal Name
Applications And Applied Mathematics: An International Journal (aam)
Stability and Bifurcation of a Cholera Epidemic Model with Saturated Recovery Rate
...Show More Authors

In this paper, a Cholera epidemic model is proposed and studied analytically as well as numerically. It is assumed that the disease is transmitted by contact with Vibrio cholerae and infected person according to dose-response function. However, the saturated treatment function is used to describe the recovery process. Moreover, the vaccine against the disease is assumed to be utterly ineffective. The existence, uniqueness and boundedness of the solution of the proposed model are discussed. All possible equilibrium points and the basic reproduction number are determined. The local stability and persistence conditions are established. Lyapunov method and the second additive compound matrix are used to study the global stability of the system.

... Show More
View Publication
Publication Date
Wed Oct 09 2019
Journal Name
Journal Of The College Of Education For Women
Naber and toning in the modern Arab poetry Mahmoud Darwish, a model
...Show More Authors

Naber and toning in the modern Arab poetry Mahmoud Darwish, a model

View Publication Preview PDF
Publication Date
Wed Jan 13 2021
Journal Name
Egyptian Journal Of Chemistry
Development of a nanostructured double-layer coated tablet based on polyethylene glycol/gelatin as a platform for hydrophobic molecules delivery
...Show More Authors

The aim of the current study was to develop a nanostructured double-layer for hydrophobic molecules delivery system. The developed double-layer consisted of polyethylene glycol-based polymeric (PEG) followed by gelatin sub coating of the core hydrophobic molecules containing sodium citrate. The polymeric composition ratio of PEG and the amount of the sub coating gelatin were optimized using the two-level fractional method. The nanoparticles were characterized using AFM and FT-IR techniques. The size of these nano capsules was in the range of 39-76 nm depending on drug loading concentration. The drug was effectively loaded into PEG-Gelatin nanoparticles (≈47%). The hydrophobic molecules-release characteristics in terms of controlled-releas

... Show More
View Publication Preview PDF
Scopus (16)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Tue Dec 01 2020
Journal Name
Baghdad Science Journal
Detection of Suicidal Ideation on Twitter using Machine Learning & Ensemble Approaches
...Show More Authors

Suicidal ideation is one of the most severe mental health issues faced by people all over the world. There are various risk factors involved that can lead to suicide. The most common & critical risk factors among them are depression, anxiety, social isolation and hopelessness. Early detection of these risk factors can help in preventing or reducing the number of suicides. Online social networking platforms like Twitter, Redditt and Facebook are becoming a new way for the people to express themselves freely without worrying about social stigma. This paper presents a methodology and experimentation using social media as a tool to analyse the suicidal ideation in a better way, thus helping in preventing the chances of being the victim o

... Show More
View Publication Preview PDF
Scopus (44)
Crossref (33)
Scopus Clarivate Crossref
Publication Date
Sat Sep 01 2012
Journal Name
2012 International Conference On Statistics In Science, Business And Engineering (icssbe)
A proposal method for selecting smoothing parameter with missing values
...Show More Authors

In this paper we proposed a new method for selecting a smoothing parameter in kernel estimator to estimate a nonparametric regression function in the presence of missing values. The proposed method is based on work on the golden ratio and Surah AL-E-Imran in the Qur'an. Simulation experiments were conducted to study a small sample behavior. The results proved the superiority the proposed on the competition method for selecting smoothing parameter.

View Publication
Scopus (1)
Scopus Crossref
Publication Date
Wed Dec 30 2009
Journal Name
Iraqi Journal Of Physics
Characterization of CdS quantum dots prepared by a Chemical Method
...Show More Authors

The CdS quantum dots were prepared by chemical reaction
of cadmium oleylamine (Cd –oleylamine complex) with the
sulfite-oleylamine (S-oleylamine) with 1:6 mole ratios. The
optical properties structure and spectroscopy of the product
quantum dot were studied. The results show the dependence of the
optical properties on the crystal dimension and the formation of
the trap states in the energy band gap.

View Publication Preview PDF
Publication Date
Sat Dec 01 2018
Journal Name
Ain Shams Engineering Journal
A semi-analytical iterative method for solving differential algebraic equations
...Show More Authors

View Publication
Crossref (9)
Crossref