Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a new RNA encoding method and ResNet50 Model, where the encoding is done by splitting the training records into different groups. These groups are protocol, service, flag, and digit, and each group is represented by the number of RNA characters that can represent the group's values. The RNA encoding phase converts network traffic records into RNA sequences, allowing for a comprehensive representation of the dataset. The detection model, utilizing the ResNet architecture, effectively tackles training challenges and achieves high detection rates for different attack types. The KDD-Cup99 Dataset is used for both training and testing. The testing dataset includes new attacks that do not appear in the training dataset, which means the system can detect new attacks in the future. The efficiency of the suggested anomaly intrusion detection system is done by calculating the detection rate (DR), false alarm rate (FAR), and accuracy. The achieved DR, FAR, and accuracy are equal to 96.24%, 6.133%, and 95.99%. The experimental results exhibit that the RNA encoding method can improve intrusion detection.
Background: Computerized tomography scan can show the detailed anatomy of the nose and paranasal sinuses. The sphenoid sinus is a very important corridor for the skull base because of its central position. This sinus has a great range of variation and can put structures around at risk during surgery. This study aims to examine the variation of the sphenoid sinus, and its relation to other structures around it, in this sample of Iraqi patients. Materials and Methods: CT scans of 122 patients, were obtained, and submitted for examination and measurements, during the period between September 2020 and September 2021. Observation of The sphenoid sinus pneumatization pattern, clival extension, Onodi cell, and lateral pneumatization of SS.
... Show MoreAn experimental model is used to simulate the loss of soil lateral confinement due to excavation nearby an individual axially loaded pile. The effects of various parameters, such as the horizontal distance of excavation, depth of excavation and pile slenderness ratios are investigated. The experimental analysis results showed the effect of excavation is more remarkable as the horizontal distance of excavation becomes closer to the pile than half pile length. The effect of excavation diminishes gradually as the horizontal distance increases beyond that distance for all the investigated pile slenderness ratios and depths of excavation. The pile head deflection, settlement and bending moments along pile increase with decreasing horizontal d
... Show MoreMany of the Iraqi agricultural researches are used spraying technique to add chemical products including pesticides and growth regulators. Various studies were performed to study the effect of these substances at different concentrations to improve plant production. In order to adopt specific criteria of spraying researches and to replicate them easily, it is a necessary to mention all information related to the spraying processes and regulations for improving sprayer’s performance by increasing the amount of pesticide deposited on the target. The current study aims to survey Iraqi researches in details and analyse them randomly. Also, to highlight on the importance of information applied in sprayi
This study was conducted to evaluate the efficacy of Saccharomyces cerevesiae as a growth promoting agent in tomato. Soaking the seeds in yeast suspension at 5 g/L for 12h increased germination percentage, root length, root fresh and dry weight, plant height, foliage fresh and dry weight, attained 88.5% ; 8.1 cm ; 84.3 mg ; 7.03 mg ; 10.75 cm ; 839 mg and 37.75 mg compared with 80% ; 5.33 cm ; 39 mg ; 4.8 mg ; 7.35 cm ; 608 mg and 25.5 mg in seedlings grown from non treated seeds respectively. Similar results were obtained with seedling from seeds soaked in S. cerevesiae filtrate for 12 hrs. with values of 77.5% ; 6.875 cm ; 91.5 mg ; 7.5 mg ; 9.5 cm ; 777 mg and 40.35 mg compared to 66% ; 5.8 cm ; 57.7 mg ; 5.03 mg ; 5.9 cm ; 493 mg
... Show MoreThis review sums up the developments in the biological activity of tetrazole active derivatives in recent days. Some of the deliberated derivatives of tetrazole are at present actively scientifically studied; some of them have biological activity that enables them to be studied further in the future as a drug for various biological activities. This review seeks to offer a comprehensive analysis of the efficacy and clinical advantage of biological activity for tetrazole derivatives.
Background: the primary objective for many researches carried out in dental implantology was to reduce the period needed for functional implant loading, simvastatin (cholesterol lowering medication) had many pleiotropic effects, one of which was increasing bone density around titanium implants (1) and subsequently establishing faster osseointegrated dental implants (2,3). This study aims to reduce the period of time needed to establish secondary stability of dental implant measured in ISQ (Implant Stability Quotient) by investigating the effect of orally administered simvastatin on bone. Materials and methods: simvastatin tablets (40mg/day for three months) were administered orally for 11 healthy women aged (40-51) years old who received 1
... Show MoreDue to the importance of the extraction process in many engineering and medical industries, in addition to great interest in medicinal plants, in this research, microwave-assisted extraction has been applied to extract some active compounds from Rosmarinus officinalis leaves. The optimal extraction conditions were then determined by calculating the ratio and extraction efficiency. The process has also been described through kinetic study by applying five kinetic models, the Hyperbolic diffusion model, Power low model, the First order reaction model, Elovich's model, and Fick's second law diffusion model and determining their compatibility with the studies operation, and determining the kinetic constants for each model. The result
... Show MoreBackground: Mental health is integrated into PHC as a strategy of WHO to fill the gap in mental health treatment. Part of this strategy needs a level of task shifting so that mental health care is provided by different level of PHC workers and not only specialists such as psychiatrists and psychologists.
Objectives: To assess the knowledge and attitudes of family doctors regarding the provision of psychological health in PHCC and if there is an association between the certificates of these family doctors and their Knowledge and attitudes to psychological health.
Subjects and Methods: A cross-sectional descriptive study with analytic elements was conducted in 8 famil
... Show MoreThis work, deals with Kumaraswamy distribution. Kumaraswamy (1976, 1978) showed well known probability distribution functions such as the normal, beta and log-normal but in (1980) Kumaraswamy developed a more general probability density function for double bounded random processes, which is known as Kumaraswamy’s distribution. Classical maximum likelihood and Bayes methods estimator are used to estimate the unknown shape parameter (b). Reliability function are obtained using symmetric loss functions by using three types of informative priors two single priors and one double prior. In addition, a comparison is made for the performance of these estimators with respect to the numerical solution which are found using expansion method. The
... Show More