Preferred Language
Articles
/
pBf1CpIBVTCNdQwCLJ2q
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a new RNA encoding method and ResNet50 Model, where the encoding is done by splitting the training records into different groups. These groups are protocol, service, flag, and digit, and each group is represented by the number of RNA characters that can represent the group's values. The RNA encoding phase converts network traffic records into RNA sequences, allowing for a comprehensive representation of the dataset. The detection model, utilizing the ResNet architecture, effectively tackles training challenges and achieves high detection rates for different attack types. The KDD-Cup99 Dataset is used for both training and testing. The testing dataset includes new attacks that do not appear in the training dataset, which means the system can detect new attacks in the future. The efficiency of the suggested anomaly intrusion detection system is done by calculating the detection rate (DR), false alarm rate (FAR), and accuracy. The achieved DR, FAR, and accuracy are equal to 96.24%, 6.133%, and 95.99%. The experimental results exhibit that the RNA encoding method can improve intrusion detection.

Scopus Crossref
View Publication
Publication Date
Thu Jun 08 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Detection of BRAF Gene in Some Iraqi Bowel Inflammation and Colorectal Cancer Patients
...Show More Authors

The impacts of the inflammatory process on neoplasia development were observed in many cancer, it has a great role in the etiology, development and progression of invasive colorectal tumors. This study was designed to investigate the BRAF mutation and assist the clinicopathological parameter in some Iraqi bowel inflammation and colorectal cancer patients. Thirty patients were enrolled in this study (15 suffering bowel inflammation and 15 having colorectal cancer). BRAF gene was screened for the presence of mutations using PCR technique and direct  sequencing. .The results revealed no BRAF mutation in position 1799 for exon fifteen in both samples of bowel inflammation and colorectal cancer. These results were confirmed previous arti

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Fri Aug 12 2022
Journal Name
Future Internet
Improved DDoS Detection Utilizing Deep Neural Networks and Feedforward Neural Networks as Autoencoder
...Show More Authors

Software-defined networking (SDN) is an innovative network paradigm, offering substantial control of network operation through a network’s architecture. SDN is an ideal platform for implementing projects involving distributed applications, security solutions, and decentralized network administration in a multitenant data center environment due to its programmability. As its usage rapidly expands, network security threats are becoming more frequent, leading SDN security to be of significant concern. Machine-learning (ML) techniques for intrusion detection of DDoS attacks in SDN networks utilize standard datasets and fail to cover all classification aspects, resulting in under-coverage of attack diversity. This paper proposes a hybr

... Show More
View Publication Preview PDF
Scopus (31)
Crossref (24)
Scopus Clarivate Crossref
Publication Date
Wed Jun 07 2023
Journal Name
Journal Of Educational And Psychological Researches
The impact of The Bransford and Stein Model on the Achievement of Fifth-Grade Literary Students for Geography and their Reflective Thinking
...Show More Authors

The current research aims to identify the effect of the Bransford and Stein model on the achievement of fifth-grade literary students for geography and their reflective thinking. To achieve the objective of the research, the following two null hypotheses were formulated:

  • There is no statistically significant difference at the significance level (0.05) between the average scores of the experimental group students who studied geography using the Bransford and Stein model and the average scores of the control group students who studied the same subject in the usual way in the achievement test. 2- There is no statistically significant difference at the significance level (0.05) between the average scores of the experimental gr

... Show More
View Publication Preview PDF
Publication Date
Tue Sep 13 2022
Journal Name
وقائع المؤتمر العلمي الدولي التاسع / المجلة الامريكية الدولية للعلوم الانسانية والاجتماعية
The Relationship between Job Satisfaction and Organizational Loyalty among Baghdad University Employees in light of Covid- 19 A Descriptive Analytical Study (University of Baghdad as a model)
...Show More Authors

The educational service industry is one of the most negatively affected industries by the spread of the COVID-19 pandemic. Government agencies have taken many measures to slow its spread, and then restrict movement and gatherings and stop recreational activities. Furthermore, the repercussions of the curfew had a significant impact due to the interruption in actual attendance for students and employees, and the severity of the Covid-19 crisis and its (economic, social, security, humanitarian and behavioral) effects on all societies and work sectors is no secret to anyone. Iraq, like other countries, was also affected by the negative impact of Covid-19 pandemic in all fields of institutional work, especially public fields, and specifically t

... Show More
Publication Date
Thu Nov 03 2022
Journal Name
Res Militaris
Prose of Sons of Imam Ali Al-Rida (Peace Be Upon Them): A Study Regarding the Structure of the Image and Its Implications - Simile as a Model
...Show More Authors

Praise be to God, Lord of the Worlds, and prayers and peace be upon the most honorable of creation, Muhammad, whom God sent as a mercy to the worlds, and his pure God and his faithful companions. The Islamic heritage was replete with texts issued from among the pure infallibility, which constituted a prominent teacher that takes the student to stop there in search of its goals, purposes and beauty. The choice was made from those texts that were issued by the imams of Muslims in the Abbasid era, namely Imam Muhammad al-Jawad, his son Imam Ali al-Hadi and his grandson Imam Hassan Zaki al-Askari. (Peace be upon them), and scholars have called them (sons of satisfaction), and researchers have shed light on these texts from rhetorical, artistic

... Show More
View Publication Preview PDF
Publication Date
Thu Dec 05 2024
Journal Name
Shifaa
Evaluating alveolar bone thickness in upper and lower incisors from orthodontic perspective. A Cone beam computed tomography-based retrospective study
...Show More Authors

Purpose: This study aimed to assess the thickness of alveolar bone of maxillary and mandibular incisors from orthodontics perspective. Materials and Method: A total of 73 Cone beam computed tomography for Iraqi patients (47 females and 26 males) were included in this study. The selected images were captured and imported to AutoCAD database software to perform the measurement. To measure alveolar bone thickness, a reference line was drawn through the long axis of each incisor, from the incisal edge to the root apex. Then, labial and lingual/palatal perpendicular lines were drawn to the reference line at 3, 6, and 9mm apically from the cemento-enamel junction (CEJ). Results: The buccal bone is generally thinner than the lingual/palata

... Show More
View Publication
Crossref
Publication Date
Mon Apr 01 2019
Journal Name
Journal Of Engineering
Design of New Hybrid Neural Controller for Nonlinear CSTR System based on Identification
...Show More Authors

This paper proposes improving the structure of the neural controller based on the identification model for nonlinear systems. The goal of this work is to employ the structure of the Modified Elman Neural Network (MENN) model into the NARMA-L2 structure instead of Multi-Layer Perceptron (MLP) model in order to construct a new hybrid neural structure that can be used as an identifier model and a nonlinear controller for the SISO linear or nonlinear systems. Two learning algorithms are used to adjust the parameters weight of the hybrid neural structure with its serial-parallel configuration; the first one is supervised learning algorithm based Back Propagation Algorithm (BPA) and the second one is an intelligent algorithm n

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Sat Dec 01 2012
Journal Name
2012 International Conference On Radar, Communication And Computing (icrcc)
BER performance improvement for secure wireless communication systems based on CSK- STBC techniques
...Show More Authors

There has been a growing interest in the use of chaotic techniques for enabling secure communication in recent years. This need has been motivated by the emergence of a number of wireless services which require the channel to provide very low bit error rates (BER) along with information security. This paper investigates the feasibility of using chaotic communications over Multiple-Input Multiple-Output (MIMO) channels by combining chaos modulation with a suitable Space Time Block Code (STBC). It is well known that the use of Chaotic Modulation techniques can enhance communication security. However, the performance of systems using Chaos modulation has been observed to be inferior in BER performance as compared to conventional communication

... Show More
View Publication
Scopus (3)
Crossref (3)
Scopus Crossref
Publication Date
Tue Sep 08 2020
Journal Name
Baghdad Science Journal
Hiding the Type of Skin Texture in Mice based on Fuzzy Clustering Technique
...Show More Authors

A substantial matter to confidential messages' interchange through the internet is transmission of information safely. For example, digital products' consumers and producers are keen for knowing those products are genuine and must be distinguished from worthless products. Encryption's science can be defined as the technique to embed the data in an images file, audio or videos in a style which should be met the safety requirements. Steganography is a portion of data concealment science that aiming to be reached a coveted security scale in the interchange of private not clear commercial and military data. This research offers a novel technique for steganography based on hiding data inside the clusters that resulted from fuzzy clustering. T

... Show More
View Publication Preview PDF
Scopus (5)
Scopus Clarivate Crossref
Publication Date
Mon Jan 28 2013
Journal Name
Spie Proceedings
BER performance enhancement for secure wireless communication systems based on chaotic-MIMO techniques
...Show More Authors

The growing interest in the use of chaotic techniques for enabling secure communication in recent years has been motivated by the emergence of a number of wireless services which require the service provider to provide low bit error rates (BER) along with information security. This paper investigates the feasibility of using chaotic communications over Multiple-Input-Multiple-Output (MIMO) channels. While the use of Chaotic maps can enhance security, it is seen that the overall BER performance gets degraded when compared to conventional communication schemes. In order to overcome this limitation, we have proposed the use of a combination of Chaotic modulation and Alamouti Space Time Block Code. The performance of Chaos Shift Keying (CSK) wi

... Show More
View Publication
Crossref (1)
Scopus Clarivate Crossref