Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a new RNA encoding method and ResNet50 Model, where the encoding is done by splitting the training records into different groups. These groups are protocol, service, flag, and digit, and each group is represented by the number of RNA characters that can represent the group's values. The RNA encoding phase converts network traffic records into RNA sequences, allowing for a comprehensive representation of the dataset. The detection model, utilizing the ResNet architecture, effectively tackles training challenges and achieves high detection rates for different attack types. The KDD-Cup99 Dataset is used for both training and testing. The testing dataset includes new attacks that do not appear in the training dataset, which means the system can detect new attacks in the future. The efficiency of the suggested anomaly intrusion detection system is done by calculating the detection rate (DR), false alarm rate (FAR), and accuracy. The achieved DR, FAR, and accuracy are equal to 96.24%, 6.133%, and 95.99%. The experimental results exhibit that the RNA encoding method can improve intrusion detection.
This research aims to present some results for conceptions of quasi -hyponormal operator defined on Hilbert space . Signified by the -operator, together with some significant characteristics of this operator and various theorems pertaining to this operator are discussed, as well as, we discussed the null space and range of these kinds of operators.
This paper deals with novels for group of Iraqi Women novelists published in the time period 2003 – 2013, and the functioning of temporal anomalies in the Iraqi Women's narrative.
In general, the novel contains structural elements such as: the characters, events and the places, these elements must be collected by an artist creating a complete work of fiction. However the time dominates the other elements through progression and regaining called Time paradox, it has a modern critical importance because of its impact in highlighting of political, social and cultural events that make up the fictional environment which cast a shadow over other techniques. And that it is clear in the course of the narrative.
In this paper, we studied the scheduling of jobs on a single machine. Each of n jobs is to be processed without interruption and becomes available for processing at time zero. The objective is to find a processing order of the jobs, minimizing the sum of maximum earliness and maximum tardiness. This problem is to minimize the earliness and tardiness values, so this model is equivalent to the just-in-time production system. Our lower bound depended on the decomposition of the problem into two subprograms. We presented a novel heuristic approach to find a near-optimal solution for the problem. This approach depends on finding efficient solutions for two problems. The first problem is minimizing total completi
... Show MoreGenerally, radiologists analyse the Magnetic Resonance Imaging (MRI) by visual inspection to detect and identify the presence of tumour or abnormal tissue in brain MR images. The huge number of such MR images makes this visual interpretation process, not only laborious and expensive but often erroneous. Furthermore, the human eye and brain sensitivity to elucidate such images gets reduced with the increase of number of cases, especially when only some slices contain information of the affected area. Therefore, an automated system for the analysis and classification of MR images is mandatory. In this paper, we propose a new method for abnormality detection from T1-Weighted MRI of human head scans using three planes, including axial plane, co
... Show MoreThis paper aims to find out if FOXP-3 was expressed in samples from Iraqi cervical cancer patients. Expression of FOXP-3 was detected in 55 cervical tissue samples by immunohistochemistry. Since thirty-five cases of aggressive cervical cancer were included, along with 20 normal samples used as controls. The nucleus and cytoplasm levels of FOXP-3 were counted, considering the ratio of positive cells and intensity. FOXP3 cytoplasmic staining was found in 27 out of 35 cases. Only 11 out of 35 samples displayed nuclear lymphocyte staining. Furthermore, four samples expressed this marker in both the nuclear and cytoplasm of the cervical cells. There is a highly significant difference in FOXP3 expression in the cytoplasm of
... Show MoreThe present study aims to detect CTX-M-type ESBL from Escherichia coli clinical isolates and to analyze their antibotic susceptibility patterns. One hundred of E. coli isolates were collected from different clinical samples from a tertiary hospital. ESBL positivity was determined by the disk diffusion method. PCR used for amplification of CTX-M-type ESBL produced by E. coli. Out of 100 E. coli isolates, twenty-four isolates (24%) were ESBL-producers. E. coli isolated from pus was the most frequent clinical specimen that produced ESBL (41.66%) followed by urine (34.21%), respiratory (22.23%), and blood (19.05%). After PCR amplification of these 24 isolates, 10 (41.66%) isolates were found to possess CTX-M genes. The CTX-M type ESBL
... Show MoreIn today's world, the science of bioinformatics is developing rapidly, especially with regard to the analysis and study of biological networks. Scientists have used various nature-inspired algorithms to find protein complexes in protein-protein interaction (PPI) networks. These networks help scientists guess the molecular function of unknown proteins and show how cells work regularly. It is very common in PPI networks for a protein to participate in multiple functions and belong to many complexes, and as a result, complexes may overlap in the PPI networks. However, developing an efficient and reliable method to address the problem of detecting overlapping protein complexes remains a challenge since it is considered a complex and har
... Show MoreFurosemide drug determination in pharmaceutical and biological urine samples using a novel continuous flow-injection analysis technique that is simple, rapid, sensitive and economical. The complex formed by the reaction of furosemide and O-phenylenediamine with oxidative agent K3[Fe(CN)6] to produce an orange-yellow colored product at 460 nm was the basis for the proposed method. The proposed method’s linearity ranges (3-100) μg.mL-1and (1-50) μg.mL-1 for CFIA/merging zone methods and batch .The detection limit and Limit of quantification values were 2.7502 μg.mL-1 and 9.1697 μg.mL-1 the relative standard deviation was 0.7143 %, and the average recovery is 98.80%
... Show MoreA comparison was conducted between two wells, Kt-1and Kt-2, in Kumait and two wells, Du-1and Du-2, in Dujaila oil fields that belong to Mishrif formation, southern Iraq. Seismic inversion method was employed to detect oil and water reservoirs. The comparison included the behavior of acoustic impedance (AI) of fluids and the lithology with related petrophysical properties. The values of water saturation, Shale volume (Vsh), and effective porosity were compared between the AI, two fluid reservoirs. It was found that the AI value for the oil reservoir unit is relatively low to medium, whereas it was relatively medium for the water reservoir. Effective porosity value showed, in general, an increase in the oil reservoir and
... Show More