Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a new RNA encoding method and ResNet50 Model, where the encoding is done by splitting the training records into different groups. These groups are protocol, service, flag, and digit, and each group is represented by the number of RNA characters that can represent the group's values. The RNA encoding phase converts network traffic records into RNA sequences, allowing for a comprehensive representation of the dataset. The detection model, utilizing the ResNet architecture, effectively tackles training challenges and achieves high detection rates for different attack types. The KDD-Cup99 Dataset is used for both training and testing. The testing dataset includes new attacks that do not appear in the training dataset, which means the system can detect new attacks in the future. The efficiency of the suggested anomaly intrusion detection system is done by calculating the detection rate (DR), false alarm rate (FAR), and accuracy. The achieved DR, FAR, and accuracy are equal to 96.24%, 6.133%, and 95.99%. The experimental results exhibit that the RNA encoding method can improve intrusion detection.
Background: This study aimed to assess the effect of tooth width in malocclusion in relation to normal, crowding, and spacing dentition. Materials and methods: The sample included dental casts of some dental students and orthodontic patients; their age was (18-25) years and having three groups normal, crowding, and spacing dentition groups. The sample was equally divided to three groups normal, crowding, and spacing dentition groups, each group contained 50 maxillary and 50 mandibular casts that were further subdivided by gender; all the stone casts were measured by highly sensitive digital vernier. Results and Conclusions: Non-significant side difference was found in both dental arches in the three studied groups. Males had higher mesiodis
... Show MoreMany complexes of 3,5-dimethyl-1H-pyrazol-1-yl phenyl methanone with Cr(III), Co(II), Ni(II), Cu(II) and Cd(II) were synthesized and characterized by FT-IR, UV/visible spectra, elemental analysis, room temperature magnetic susceptibility and molar conductivity. Cd(II) complex was expected to have tetrahedral structure while all the other complexes were expected to have an octahedral structure.
In present study, the technique was used, including nuclear track detector type (CR-39), for appreciative concentrations uranium and radon in soil samples from Baghdad University Campus-AL-Jadiriyah utilizing a prolonged -term with a solid-state nuclear path sensor, a technique for charged particles has been developed., the radon concentrations, effective dose rate and uranium concentrations have measured in soil samples. Eight various venues from soil Baghdad University Campus have appointed. The results indicated variant values about uranium and radon concentrations, the average value for radon gas, effective dose rate and uranium concentrations was found to be 281.59 Bq/cm3, 7.09 mSv/y and 0.01 Bq/mm-2 respectively. All results a
... Show MoreThe purpose of this research shed light on the analysis of the relationship between training needs and organizational commitment and the role of a variable contract psychological, and start search of a dilemma thought provoking fundamental questions revolve around the search was the answer to all those questions of tricks theoretical framework to the variables of research first and test models of the relationship and impact secondly During six hypotheses major, The objective of the research the impact of the factors that affect training needs in organizational commitment center the psychological contract, and applied research on a sample of 100 individuals working in the engineering department and maintenance at the D
... Show MoreIn light of today's business world, who faces challenges and intense competition as a result of the rapid evolution of technical and informational, organizations had to respond to variables through the adoption of modern management techniques that reduce the effects of risks and activating the role of the internal control system in order to contribute to the early detection of risks and reduce the negative results expected .The research is to address the problem faced by organizations which still follow the traditional methods in the control activities, and the lack of knowledge of the management and their staff of the importance of the existence of risk management and internal control system takes into account these risks, and the limit
... Show MoreAbstract
At any moment, the continuous usage of medications can accompanied by DNA damage and the accumulation of such damages can cause serious consequences. Antidepressants are long-term used drugs and the incidence of their genotoxic impacts cannot be excluded. Therefore, this work was designed to investigate the possible genotoxic effects of the commonly used antidepressants (fluoxetine and amitriptyline) in adult male rats.
Detection of DNA damage in individual cells was assessed by comet and micronucleus assays in three different cell populations i.e. liver, testis and bone marrow tissues of 24 swiss albino adult male rats. The animals were randomly allocated into three groups of 8 rats ea
... Show MoreA phytoremediation experiment was carried out with kerosene as a model for total petroleum hydrocarbons. A constructed wetland of barley was exposed to kerosene pollutants at varying concentrations (1, 2, and 3% v/v) in a subsurface flow (SSF) system. After a period of 42 days of exposure, it was found that the average ability to eliminate kerosene ranged from 56.5% to 61.2%, with the highest removal obtained at a kerosene concentration of 1% v/v. The analysis of kerosene at varying initial concentrations allowed the kinetics of kerosene to be fitted with the Grau model, which was closer than that with the zero order, first order, or second order kinetic models. The experimental study showed that the barley plant designed in a subsu
... Show MoreThe beet armyworm (BAW), Spodoptera exigua (Lepidoptera: Noctuidae) is a highly destructive pest of vegetables and field crops. Management of beet armyworm primarily relies on synthetic pesticides, which is threatening the beneficial community and environment. Most importantly, the BAW developed resistance to synthetic pesticides with making it difficult to manage. Therefore, alternative and environment-friendly pest management tactics are urgently required. The use of pesticidal plant extracts provides an effective way for a sustainable pest management program. To evaluate the use of pesticidal plant extracts against BAW, we selected six plant species (Lantana camara, Aloe vera, Azadirachta indica, Cymbopogon citratus, Nicotiana tabacum ,
... Show MoreThe research aimed to prepare a measure of job stressors affecting the quality of teaching performance in the College of Physical Education and Sports Sciences at the University of Baghdad, to identify their levels, if any, and the most influential dimensions on the quality of teaching performance within the college’s work environment, as well as the deanship’s ability to help prevent and Alleviating its severity through logical administrative methods, on a scale that includes four dimensions that include (the administrative and financial environment, the organizational environment, the social and humanitarian environment, and the scientific and research environment). The descriptive approach was adopted using the case study met
... Show More