Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a new RNA encoding method and ResNet50 Model, where the encoding is done by splitting the training records into different groups. These groups are protocol, service, flag, and digit, and each group is represented by the number of RNA characters that can represent the group's values. The RNA encoding phase converts network traffic records into RNA sequences, allowing for a comprehensive representation of the dataset. The detection model, utilizing the ResNet architecture, effectively tackles training challenges and achieves high detection rates for different attack types. The KDD-Cup99 Dataset is used for both training and testing. The testing dataset includes new attacks that do not appear in the training dataset, which means the system can detect new attacks in the future. The efficiency of the suggested anomaly intrusion detection system is done by calculating the detection rate (DR), false alarm rate (FAR), and accuracy. The achieved DR, FAR, and accuracy are equal to 96.24%, 6.133%, and 95.99%. The experimental results exhibit that the RNA encoding method can improve intrusion detection.
The aim of this study is to develop a novel framework for managing risks in smart supply chains by enhancing business continuity and resilience against potential disruptions. This research addresses the growing uncertainty in supply chain environments, driven by both natural phenomena-such as pandemics and earthquakes—and human-induced events, including wars, political upheavals, and societal transformations. Recognizing that traditional risk management approaches are insufficient in such dynamic contexts, the study proposes an adaptive framework that integrates proactive and remedial measures for effective risk mitigation. A fuzzy risk matrix is employed to assess and analyze uncertainties, facilitating the identification of disr
... Show MoreA total of 165 clinical sample included Urine, Swab wounds and Burns were collected from Baghdad Governorate. Results showed that rate all isolates of E. coli was 50(30.3%) and rate of urine infection was 46(92%) and rate of swab wounds infection 4(8%). Where was diagnostic based on streaked on MacConkey agar, then single colony was transferred to Eosin Methylene Blue (EMB). Identification some of the biochemical test included: Catalase test, Oxidase test, Indole test, Methyl red, Vogues - Proskauer test and Citrate Utilization test. Then confirmed by the Vitek - 2 Compact System. The ability of E.coli isolate to biofilm formation to be studied it is considered one of the most important factors of virulence and has role in causing injury an
... Show MoreBackground: Multiple sclerosis is a chronic autoimmune inflammatory demyelinating disease of the central nervous system of unknown etiology. Different techniques and magnetic resonance image sequences are widely used and compared to each other to improve the detection of multiple sclerosis lesions in the spinal cord. Objective: To evaluate the ability of MRI short tau inversion recovery sequences in improvementof multiple sclerosis spinal cord lesion detection when compared to T2 weighted image sequences. Type of the study: A retrospective study. Methods: this study conducted from 15thAugust 2013 to 30thJune 2014 at Baghdad teaching hospital. 22 clinically definite MS patients with clinical features suggestive of spinal cord involvement,
... Show MoreEvil pervades the narrative scene in Tolkien. Hence; his major themes in The Lord of the Rings are shown to be the Evil Nature of Power, the Tyranny of Technology and War as a Destructive Agent. Evil is not as powerful as good. The Boethian conception of evil comes through evil beings such as Melkor Morgoth in The Silmarillion or Sauron ,who cannot do good things but only pervert or mock things; In The Lord of the Rings; Tolkien seems to suggest that there is no absolute evil. The other conception of evil is the Manichaen, a conception which receives more emphasis in Tolkien's trilogy and which sees the world as a battle-ground for warring forces of good and evil. Tolkien frequently personifies the Ring as if it were acting with a will of i
... Show MoreIn this paper thermo-hydrodynamic characteristics were investigated experimentally for a new type shell-helical coiled tube heat exchanger used as a storage tank of closed loop solar water heater system. Triple concentric helical coils were made of copper tubes of (12.5mm OD and 10mm ID) with coils diameter of (207, 152.2, 97mm) for outer, middle and inner coils respectively. The experiments were carried out during a clear sky days of (March and April 2012). The parameters studied in this work are: history of average temperature of shell side of the storage tank, collector heat gain, heat rejected from coils to shell side of the storage tank, collector efficiency, thermal effectiveness of the heat exchanger (storage tank), and pressure d
... Show MoreBackground: Unlike normal EEG patterns, the epileptiform abnormal pattern is characterized by different mor phologies such as the high-frequency oscillations (HFOs) of ripples on spikes, spikes and waves, continuous and sporadic spikes, and ploy2 spikes. Several studies have reported that HFOs can be novel biomarkers in human epilepsy study. S) Method: To regenerate and investigate these patterns, we have proposed three large scale brain network models (BNM by linking the neural mass model (NMM) of Stefanescu-Jirsa 2D (S-J 2D) with our own structural con nectivity derived from the realistic biological data, so called, large-scale connectivity connectome. These models include multiple network connectivity of brain regions at different
... Show MoreThis study aims to deeply analyze the character of serial killers in Thomas Harris’ novels and focuses on his novel Red Dragon. The Study searches in these complex and deep characters through the use of Erich Fromm's concepts about the destructive nature of the human psyche and what are the factors affecting serial killers in all social psychological, and biological aspects. This study Concluded: Thomas Harris portrayed the characters of serial killers in a professional and complex and made the reader go on a contemplative journey in the mind and soul of the serial killer, thus reaching the climax of artistic perfection.
Solubility problem of many of effective pharmaceutical molecules are still one of the major obstacle in theformulation of such molecules. Candesartan cilexetil (CC) is angiotensin II receptor antagonist with very low water solubility and this result in low and variable bioavailability. Self- emulsifying drug delivery system (SEDDS) showed promising result in overcoming solubility problem of many drug molecules. CC was prepared as SEDDS by using novel combination of two surfactants (tween 80 and cremophore EL) and tetraglycol as cosurfactant, in addition to the use of triacetin as oil. Different tests were performed in order to confirm the stability of the final product which includes thermodynamic study, determination of self-emulsificat
... Show More