Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a new RNA encoding method and ResNet50 Model, where the encoding is done by splitting the training records into different groups. These groups are protocol, service, flag, and digit, and each group is represented by the number of RNA characters that can represent the group's values. The RNA encoding phase converts network traffic records into RNA sequences, allowing for a comprehensive representation of the dataset. The detection model, utilizing the ResNet architecture, effectively tackles training challenges and achieves high detection rates for different attack types. The KDD-Cup99 Dataset is used for both training and testing. The testing dataset includes new attacks that do not appear in the training dataset, which means the system can detect new attacks in the future. The efficiency of the suggested anomaly intrusion detection system is done by calculating the detection rate (DR), false alarm rate (FAR), and accuracy. The achieved DR, FAR, and accuracy are equal to 96.24%, 6.133%, and 95.99%. The experimental results exhibit that the RNA encoding method can improve intrusion detection.
Solar energy has significant advantages compared to conventional sources such as coal and natural gas, including no emissions, no need for fuel, and the potential for installation in a wide range of locations with access to sunlight. In this investigation, heterocyclic derivatives were synthesized from several porphyrin derivatives (4,4',4",4"'-(porphyrin-5,10,15,20-tetrayl) tetra benzoic acid) compound (3), obtained by reaction Pyrrole with 4-formyl benzoic acid. Subsequently, porphyrin derivative-component amides 5a, 5b, and 5c were produced by reacting compound (3) with amine derivatives at a 1:4 molar ratio. These derivatives exhibited varying sensitivities for utilization in solar cells, with compound 5a displaying the highest power
... Show MoreThe compounds 3-[4̄-(4˭-methoxybenzoyloxy) benzylideneamino]-2-thioxo-imidazolidine-4-one(3)aand 4-(1-(5-oxo- 2-thioxoimidazolidin-1-ylimino)ethyl)phenyl acetate(3)b were prepared from the reaction of aromatic aldehyde or ketone(1)a,bwith thiosemicarbazide to give aryl thiosemicarbazones(2)a,b ,followed by cyclization with ethylchloroacetate in the presence of fused sodium acetate. Treatment the compounds(3)a,bwith 4- hydroxybenzenediazoniumchloride yielded the correspondings4-((4-((4-hydroxyphenyl)diazenyl)-5-oxo-2- thioxoimidazolidin-1-ylimino)methyl)phenyl 4-methoxybenzoate(4)aand4-(1-(4-((4-hydroxyphenyl)diazenyl)-5-oxo-2- thioxoimidazolidin-1-ylimino)ethyl)phenyl acetate(4)b.The new 2-thioxo-imidazolidin-4-one with esters (5-7)a,b sy
... Show MoreAu XIXe siècle, avec l’excès de la passion, le roman français commence à avoir de nouvelles figures. Il tend à être un reflet de la pensée et de la passion. Stendhal et Balzac révèlent ainsi le conflit de l’âme et donnent à leur héros l’impression que tout est permis.
Ces protagonistes doivent, d’une part, subir des fluctuations psychologiques, et d’autre part, ces héros doivent être capables de faire face aux rancunes et aux conflits destructeurs. Les personnages stendhaliens et balzaciens finissent par croire que leur combat ne portera pas ses fruits, parce que toute passion déséquilibrée mènera, soit à la fol
... Show MoreThe compounds 3-[4̄-(4˭-methoxybenzoyloxy) benzylideneamino]-2-thioxo-imidazolidine-4-one(3)aand 4-(1-(5-oxo- 2-thioxoimidazolidin-1-ylimino)ethyl)phenyl acetate(3)b were prepared from the reaction of aromatic aldehyde or ketone(1)a,bwith thiosemicarbazide to give aryl thiosemicarbazones(2)a,b ,followed by cyclization with ethylchloroacetate in the presence of fused sodium acetate. Treatment the compounds(3)a,bwith 4- hydroxybenzenediazoniumchloride yielded the correspondings4-((4-((4-hydroxyphenyl)diazenyl)-5-oxo-2- thioxoimidazolidin-1-ylimino)methyl)phenyl 4-methoxybenzoate(4)aand4-(1-(4-((4-hydroxyphenyl)diazenyl)-5-oxo-2- thioxoimidazolidin-1-ylimino)ethyl)phenyl acetate(4)b.The new 2-thioxo-imidazolidin-4-one with esters (5-7)a,b sy
... Show MoreA new method for construction ion-selective electrode (ISE) by heating reaction of methyl orange with ammonium reineckate using PVC as plasticizer for determination methyl orange and determination Amitriptyline Hydrochloried drug by formation ion-pair on electrode surface . The characteristics of the electrode and it response as following : internal solution 10-4M , pH (2.5-5) ,temperature (20-30) and response time 2 sec. Calibration response for methyl orange over the concentrationrange 10-3 -10-9 M with R=0.9989 , RSD%=0.1052, D.O.L=0.315X10-9 MEre%=(-0.877- -2.76) , Rec%.=(97.230 -101.711) .
The researchers of the present study have conducted a genre analysis of two political debates between American presidential nominees in the 2016 and 2020 elections. The current study seeks to analyze the cognitive construction of political debates to evaluate the typical moves and strategies politicians use to express their communicative intentions and to reveal the language manifestations of those moves and strategies. To achieve the study’s aims, the researchers adopt Bhatia’s (1993) framework of cognitive construction supported by van Emeren’s (2010) pragma-dialectic framework. The study demonstrates that both presidents adhere to this genre structuring to further their political agendas. For a positive and promising image
... Show MoreIn modern technology, the ownership of electronic data is the key to securing their privacy and identity from any trace or interference. Therefore, a new identity management system called Digital Identity Management, implemented throughout recent years, acts as a holder of the identity data to maintain the holder’s privacy and prevent identity theft. Therefore, an overwhelming number of users have two major problems, users who own data and third-party applications will handle it, and users who have no ownership of their data. Maintaining these identities will be a challenge these days. This paper proposes a system that solves the problem using blockchain technology for Digital Identity Management systems. Blockchain is a powerful techniqu
... Show MoreCassava, a significant crop in Africa, Asia, and South America, is a staple food for millions. However, classifying cassava species using conventional color, texture, and shape features is inefficient, as cassava leaves exhibit similarities across different types, including toxic and non-toxic varieties. This research aims to overcome the limitations of traditional classification methods by employing deep learning techniques with pre-trained AlexNet as the feature extractor to accurately classify four types of cassava: Gajah, Manggu, Kapok, and Beracun. The dataset was collected from local farms in Lamongan Indonesia. To collect images with agricultural research experts, the dataset consists of 1,400 images, and each type of cassava has
... Show MoreThis paper investigates a new approach to the rapid control of an upper limb exoskeleton actuator. We used a mathematical model and motion measurements of a human arm to estimate joint torque as a means to control the exoskeleton’s actuator. The proposed arm model is based on a two-pendulum configuration and is used to obtain instantaneous joint torques which are then passed into control law to regulate the actuator torque. Nine subjects volunteered to take part in the experimental protocol, in which inertial measurement units (IMUs) and a digital goniometer were used to measure and estimate the torque profiles. To validate the control law, a Simscape model was developed to simulate the arm model and control law in which measurem
... Show More