Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a new RNA encoding method and ResNet50 Model, where the encoding is done by splitting the training records into different groups. These groups are protocol, service, flag, and digit, and each group is represented by the number of RNA characters that can represent the group's values. The RNA encoding phase converts network traffic records into RNA sequences, allowing for a comprehensive representation of the dataset. The detection model, utilizing the ResNet architecture, effectively tackles training challenges and achieves high detection rates for different attack types. The KDD-Cup99 Dataset is used for both training and testing. The testing dataset includes new attacks that do not appear in the training dataset, which means the system can detect new attacks in the future. The efficiency of the suggested anomaly intrusion detection system is done by calculating the detection rate (DR), false alarm rate (FAR), and accuracy. The achieved DR, FAR, and accuracy are equal to 96.24%, 6.133%, and 95.99%. The experimental results exhibit that the RNA encoding method can improve intrusion detection.
In petroleum reservoir engineering, history matching refers to the calibration process in which a reservoir simulation model is validated through matching simulation outputs with the measurement of observed data. A traditional history matching technique is performed manually by engineering in which the most uncertain observed parameters are changed until a satisfactory match is obtained between the generated model and historical information. This study focuses on step by step and trial and error history matching of the Mishrif reservoir to constrain the appropriate simulated model. Up to 1 January 2021, Buzurgan Oilfield, which has eighty-five producers and sixteen injectors and has been under production for 45 years when it started
... Show MoreThis study deals with the intellectual representations whose intellectual systems are incarnated in the Jewish personality, which is considered one of the complex intellectual systems that has caused controversy throughout the ages because of the ambiguity due to the religious and psychological factors that were reflected directly and strongly on the intellectual structure of the Jewish community in general and the Jewish - Zionist personality in particular, in an attempt (to create new dimensions embodied by intellectual representations of a human nature embodied by what that - peaceful - religiously oppressed - psychologically and socially isolated character presents, because of the curse of the peoples of the world that was a cause fo
... Show MoreThe semiotic trend of recent monetary trends task that took a wide range of attention of critics and readers alike, especially after the deployment, which accompanied him after widespread acts critic Grimas and powers applicable to the literary texts and is thus expanded its care circle, hence the choice of the novel (absent) woman Iraqi novelist (Mahdi ‘Issa falcon) model to be applied to the study chose to be a semiotic approach through the use of procedural mechanisms for its critical tool (Paris School of semiotics), cash and views of its founder critic Grimas.The research in the introduction and pave came we made it a vision for literary semiotic and its impact trend in cash and cash is and what it desire to clarify some poked suc
... Show MoreTwo novel demountable shear connectors for precast steel-concrete composite bridges are presented. The connectors use high-strength steel bolts, which are fastened to the steel beam with the aid of a special locking configuration that prevents slip of bolts within their holes. Moreover, the connectors promote accelerated construction and overcome typical construction tolerances issues of precast structures. Most importantly, the connectors allow bridge disassembly, and therefore, can address different bridge deterioration scenarios with minimum disturbance to traffic flow, i.e. (1) precast deck panels can be rapidly uplifted and replaced; (2) connectors can be rapidly removed and replaced; and (3) steel beams can be replaced, while precast
... Show MoreBackground: Pseudomonas aeruginosa is a devious pathogen with the tendency to prompt many acute and serious chronic diseases. This study aims to detect novel genes (Toxins-Antitoxins II system), especially; higB and higA encoded from P. aeruginosa by PCR technique and the relation between these genes and antibiotic resistance of P. aeruginosa. Methods: This study detected 50 isolates of P. aeruginosa from distinct clinical sources. The most common origin of isolates was (44%) burn swabs, (22%) urine culture, (12%) wound swabs, (14%) sputum, and (8%) ear swabs. The bacteria were isolated using implantation MacConkey agar and blood agar, as well as biochemical tests including oxidase test, catalase test then VITEK-2 System of P. aerug
... Show MoreThe identity of the cultural identity of the party (the ego and the other) during a series of questions subject to the transformations of history and the process of culture, the search of identity and its characteristics within the novel discourse calls to address the cultural impact communication discourse aims to reveal the functional and intellectual benefits that contributed to the formation of cultural identity, and stand at the most important manifestations And the secretions that mimic a world remains part of it present in the imagination of the producer of the text is moving in accordance with the holistic perception of the world embedded between the lines of the trial.The question of identity as an intellectual dimension in orde
... Show MoreThis research deals with the study of the identity lost in the novel (handcuffs of paper) by Writer (Kuwaiti / Iraqi ) Yousif Hadi Mays.This is because of The strange subject presented by the writer ,Kuwait has chosen a sbace for his novel and chose apurely Kuwaiti theme. Hence the importance of the novel, as it came to the subject of identity completely dntdiffere from what we wwrote after the fall off the regime (2003), Which is related to the last coming from outside the country, which remained oscillataing between his mother,s identity where language, religion and history and the identity of the other by virtue and dazzling, and integration and here con not belong to either party. This is a violation of the taboos of
... Show MoreGypseous soil, which covers vast area in west, middle, east and south west regions of Iraq exhibit acceptable strength properties when dry, but it is weak and collapsible when it comes in touch with moisture from rain or other sources. When such weak soil is adopted for earth reinforced embankment construction, it may exhibit hazardous situation. Gypseous soil was investigated for the optimum liquid asphalt requirements of both cutback and emulsion using the one-dimensional unconfined compression strength test. The optimum fluid content was 13% (7% of cutback with 6% water content), and 17% (9% of emulsion with 8% water content). A laboratory model box of 50x50x25 cm was used as a representative of embankment; soil or asphalt stabilize
... Show More