Preferred Language
Articles
/
pBf1CpIBVTCNdQwCLJ2q
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a new RNA encoding method and ResNet50 Model, where the encoding is done by splitting the training records into different groups. These groups are protocol, service, flag, and digit, and each group is represented by the number of RNA characters that can represent the group's values. The RNA encoding phase converts network traffic records into RNA sequences, allowing for a comprehensive representation of the dataset. The detection model, utilizing the ResNet architecture, effectively tackles training challenges and achieves high detection rates for different attack types. The KDD-Cup99 Dataset is used for both training and testing. The testing dataset includes new attacks that do not appear in the training dataset, which means the system can detect new attacks in the future. The efficiency of the suggested anomaly intrusion detection system is done by calculating the detection rate (DR), false alarm rate (FAR), and accuracy. The achieved DR, FAR, and accuracy are equal to 96.24%, 6.133%, and 95.99%. The experimental results exhibit that the RNA encoding method can improve intrusion detection.

Scopus Crossref
View Publication
Publication Date
Sun Apr 30 2023
Journal Name
Iraqi Journal Of Science
Detection of A Possible Subsurface Water Seepage Using 2D Electrical Resistivity Imaging Survey at a site in Al-Khwarizmi College of Engineering, University of Baghdad, Iraq
...Show More Authors

     Unknown subsurface leaking water sources and possible subsurface seepage from a sewage tank in a garden at Al-Khawarizmi engineering college, University of Baghdad, were detected in this study. The 2D electrical resistivity imaging. The ERI survey is carried out along two lines, 60m and 50m long, with an electrode spacing of 1 m, forming a cross using the Wenner-Schlumberger array configuration. Line 1 is 60m, while line 2 is 50m. Soil samples were collected from line 1 at positions of electrode 34, which shows a high resistivity value, and electrode 55, which shows low resistivity, for laboratory analysis. Robust inversion and modelling processes showed relative change and high contrast in interpreted resistivities. Soil analy

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Thu Apr 20 2023
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Synthesis a Novel Complexes of VO(II),Mn(II),Fe(II) ,Co(II), Ni(II), Cu(II)and Pt(IV) Derived from Schiff’s Base of Pyridoxal and 2-amino-4-nitrophenol and Study their Biological Activates
...Show More Authors

This work describes the synthesis of novel ligand (H2L2) (4-((2-hydroxy-5-nitrophenyl)imino)methyl)-5(hydroxymethyl)-2methylpyridin-3-ol)  type (NOO) donor atoms. When it coordinates with metal ions[V2+,Mn2+,Fe2+,Co2+,Ni2+,Cu2+and Pt4+] with the general formula K2[M(L2)2].XH2O and K2[VO(L2)(OSO3)].H2O . This ligand can form tridentate structures. The ligand was synthesized from the reaction of pyridoxal hydrochloride with 2-amino-4-nitrophenol in ethanol (as a solvent) at a mole ratio of 1:1 and thoroughly mixed and refluxed for 6-8  hrs . The reaction

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Sep 30 2023
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The effect of operational efficiency on some financial indicators according to the CAMEL model of banking financial stability: An applied research on a sample of Iraqi private banks for the period 2010-2020
...Show More Authors

Abstract

          The research aims to determine the nature of the Iraqi market in terms of banking financial stability and the extent impact of the operational efficiency on it, Accordingly, chosen 15 relational banks were chosen as an intentional sample that could represent the Iraqi banking system for the period 2010-2020. The operational efficiency variable was measured according to the data envelope model, and banking financial stability used  CAMELS model which includes five indicators (capital adequacy, asset quality, management quality, profitability, and liquidity), so for testing the research hypotheses used the random regression model by adopting the S

... Show More
View Publication Preview PDF
Publication Date
Sat May 08 2021
Journal Name
Iraqi Journal Of Science
Increasing the Accuracy of Orbital Elements for a Satellite in a Low Earth Orbit under the Influence of Atmospheric Drag Using Adams-Bashforth Method
...Show More Authors

The perturbed equation of motion can be solved by using many numerical methods. Most of these solutions were inaccurate; the fourth order Adams-Bashforth method is a good numerical integration method, which was used in this research to study the variation of orbital elements under atmospheric drag influence.  A satellite in a Low Earth Orbit (LEO), with altitude form perigee = 200 km, was selected during 1300 revolutions (84.23 days) and ASat / MSat value of 5.1 m2/ 900 kg. The equations of converting state vectors into orbital elements were applied. Also, various orbital elements were evaluated and analyzed. The results showed that, for the semi-major axis, eccentricity and inclination have a secula

... Show More
View Publication Preview PDF
Scopus (4)
Scopus Crossref
Publication Date
Sat Sep 03 2022
Journal Name
International Journal Of Health Sciences
Using Elisa and nested PCR for detection of the toxoplasmosis in milk and the influence of infection and some factors on milk composition in the Iraqi local and Shami goats
...Show More Authors

This study concluded detection of Toxoplasma gondii in milk, immunologically by using Elisa and nested PCR)nPCR (based on B1 gene, also to investigate the effect of toxoplasmosis, parity, breed and flock on some milk composition in the Iraqi local and Shami goats in the middle of Iraq. A total of 80 milk samples of the lactating goats were collected. Results of this study showed the prevalence of Toxoplasmosis was 21.25% and 28.75% by Elisa and nPCR respectively without significant differences. The sensitivity of Elisa was a low (30.43%) whereas the specificity was a high (82.45%). The degree of agreement estimated by Kappa coefficient revealed a slight agreement (0.14) between two methods. The results indicated that goats infected

... Show More
View Publication
Crossref
Publication Date
Sun Feb 02 2025
Journal Name
Al–bahith Al–a'alami
Foreign Series in the Kurdish Satellite Channels and Their Role in the Development of Awareness among Young People in the Kurdistan Region (Korean Series as a Model) (A Field Study on a Sample of Students of the Institute of Fine Arts in the City of Sulay
...Show More Authors

The dubbing process for the Foreign Dramas by the Kurdish language became a serious phenomenon in the Kurdish satellite TV, especially in the past few years. It attracted a wide audience, especially young adolescents. And prepared by some breakthrough hostile to Kurdish culture and value coordinated by others remedy for the structural gaps and lapses have, as a result of climate which is brought into existence globalization and secretions variety dimensional, saturated value and cognitive effects bearing a strong identity of its elements. From here, the problem of this research is the ambiguity of their role in a series of developmental processes Kurdish awareness of young people and the extent of the impact that caused it.

This

... Show More
View Publication Preview PDF
Publication Date
Thu Feb 01 2018
Journal Name
Italian Journal Of Pure And Applied Mathematics
A note on s-acts and bounded linear operators
...Show More Authors

Scopus (1)
Scopus
Publication Date
Mon Mar 11 2019
Journal Name
Baghdad Science Journal
Results on a Pre-T_2 Space and Pre-Stability
...Show More Authors

This paper contains an equivalent statements of a pre-  space, where  are considered subsets of with the product topology. An equivalence relation between the preclosed set  and a pre-  space, and a relation between a pre-  space and the preclosed set  with some conditions on a function  are found. In addition, we have proved that the graph  of  is preclosed in if  is a pre-  space, where the equivalence relation  on  is open.

     On the other hand, we introduce the definition of a pre-stable ( pre-stable) set by depending on the concept of a pre-neighborhood, where we get that every stable set is pre-stable. Moreover, we obtain that

... Show More
View Publication Preview PDF
Scopus (3)
Scopus Crossref
Publication Date
Sun Nov 19 2017
Journal Name
Journal Of Al-qadisiyah For Computer Science And Mathematics
Image Compression based on Fixed Predictor Multiresolution Thresholding of Linear Polynomial Nearlossless Techniques
...Show More Authors

Image compression is a serious issue in computer storage and transmission,  that simply makes efficient use of redundancy embedded within an image itself; in addition, it may exploit human vision or perception limitations to reduce the imperceivable information Polynomial coding is a modern image compression technique based on modelling concept to remove the spatial redundancy embedded within the image effectively that composed of two parts, the  mathematical model and the residual. In this paper, two stages proposed technqies adopted, that starts by utilizing the lossy predictor model along with multiresolution base and thresholding techniques corresponding to first stage. Latter by incorporating the near lossless com

... Show More
View Publication
Crossref (1)
Crossref
Publication Date
Sun Jan 30 2022
Journal Name
Iraqi Journal Of Science
Modified Blowfish Algorithm for Image Encryption using Multi Keys based on five Sboxes
...Show More Authors

In this paper, a new modification was proposed to enhance the security level in the Blowfish algorithm by increasing the difficulty of cracking the original message which will lead to be safe against unauthorized attack. This algorithm is a symmetric variable-length key, 64-bit block cipher and it is implemented using gray scale images of different sizes. Instead of using a single key in cipher operation, another key (KEY2) of one byte length was used in the proposed algorithm which has taken place in the Feistel function in the first round both in encryption and decryption processes. In addition, the proposed modified Blowfish algorithm uses five Sboxes instead of four; the additional key (KEY2) is selected randomly from additional Sbox

... Show More
View Publication Preview PDF