Preferred Language
Articles
/
pBf1CpIBVTCNdQwCLJ2q
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a new RNA encoding method and ResNet50 Model, where the encoding is done by splitting the training records into different groups. These groups are protocol, service, flag, and digit, and each group is represented by the number of RNA characters that can represent the group's values. The RNA encoding phase converts network traffic records into RNA sequences, allowing for a comprehensive representation of the dataset. The detection model, utilizing the ResNet architecture, effectively tackles training challenges and achieves high detection rates for different attack types. The KDD-Cup99 Dataset is used for both training and testing. The testing dataset includes new attacks that do not appear in the training dataset, which means the system can detect new attacks in the future. The efficiency of the suggested anomaly intrusion detection system is done by calculating the detection rate (DR), false alarm rate (FAR), and accuracy. The achieved DR, FAR, and accuracy are equal to 96.24%, 6.133%, and 95.99%. The experimental results exhibit that the RNA encoding method can improve intrusion detection.

Scopus Crossref
View Publication
Publication Date
Fri Nov 01 2024
Journal Name
Process Safety And Environmental Protection
Optimized ensemble deep random vector functional link with nature inspired algorithm and boruta feature selection: Multi-site intelligent model for air quality index forecasting
...Show More Authors

View Publication
Scopus (4)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Wed Jun 19 2019
Journal Name
Scientific Reports
Environmental microcystin targets the microbiome and increases the risk of intestinal inflammatory pathology via NOX2 in underlying murine model of Nonalcoholic Fatty Liver Disease
...Show More Authors
Abstract<p>With increased climate change pressures likely to influence harmful algal blooms, exposure to microcystin, a known hepatotoxin and a byproduct of cyanobacterial blooms can be a risk factor for NAFLD associated comorbidities. Using both <italic>in vivo</italic> and <italic>in vitro</italic> experiments we show that microcystin exposure in NAFLD mice cause rapid alteration of gut microbiome, rise in bacterial genus known for mediating gut inflammation and lactate production. Changes in the microbiome were strongly associated with inflammatory pathology in the intestine, gut leaching, tight junction protein alterations and increased oxidative tyrosyl radicals. Increased lactate produ</p> ... Show More
View Publication Preview PDF
Scopus (42)
Crossref (42)
Scopus Clarivate Crossref
Publication Date
Thu Sep 08 2022
Journal Name
Al-khwarizmi Engineering Journal
Design and Analysis of a Spraying Robot
...Show More Authors

An indoor spraying robot is built in this research to solve numerous challenges associated with manual spraying. The mechanical, hardware and essential technologies used are all detailed and designed. The proposed spraying robot's conceptual design is split into two parts: hardware and software. The mechanical design, manufacturing, electrical, and electronics systems are described in the hardware part, while the control of the robot is described in the software section. This robot's kinematic and dynamic models were developed using three links that move in the x, y, and z directions. The robot was then designed using SolidWorks software to compute each connection's deflection and maximum stresses. The characteristics of the stepper moto

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (1)
Scopus Crossref
Publication Date
Thu Dec 09 2021
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Cressa cretica Pharmacognosy, and Pharmacology (A review )
...Show More Authors

 

Cressa cretica (Shuwwayl) is a halophytic that belongs to Convolvulaceae, naturally grown in the Middle East including Iraq. Traditionally the plant is used as a paste for sore treatment, also it is used for fever, jaundice, and other illness. Regarding nonclinical use it is used as goat, sheep, and camel feed also as an oil source. Flavonoids including quercetin, kamepferol, apigenin, and their glycosides, phenolic acid as chlorogenic acid, and phytosterols mainly ?–sitosterol were the most important phytochemicals that were detected in this halophyte. Crude ethanolic, methanolic extracts and ethyl acetate fraction of the areal parts were used in clinical studies and demonstrated various effe

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (1)
Scopus Crossref
Publication Date
Fri Oct 02 2020
Journal Name
Biochemical & Cellular Archives
Retinoids and rexinoids as vitamin A analogs.
...Show More Authors

Vitamin A, namely retinol is still the most proper agent for modulating so many biochemical reactions and biological functions in different tissues and organs. In addition to the provitamins A and α, βand γ-carotenoids that are present in various foods from either animal or plant origin, retinoids and rexinoids form the natural and synthetic analogs that are chemically related or unrelated and can be added as food supplements for deficiency disorders of vitamin A or used to alleviate or treat certain health problems such as skin carcinoma, acne, skin aging and dermatitis.

Publication Date
Tue Aug 02 2022
Journal Name
Journal Of Legal Sciences
Jurisprudence and its controls - A Comparative study
...Show More Authors

Judicial jurisprudence is one of the important legal solutions to address the shortcomings of legislation. Throughout its long history, human societies have known many cases in which the judge finds himself facing a legislative vacuum in addition to civil legal texts that are difficult for the judge to implement due to ambiguity or contradiction, which requires diligence. To rule on resolving disputes before him in order not to deny justice, but the judge in his jurisprudence was not absolute, but rather bound by certain controls represented by observing the wisdom of legislation on the one hand and taking into account the nature of the texts on the other side, and from here this research came to shed light on the jurisprudence and its cont

... Show More
View Publication
Publication Date
Wed Jan 01 2014
Journal Name
Journal Of The College Of Languages (jcl)
A comparison between Objective and subjective tests
...Show More Authors

This paper aims at presenting a comparison between objective and subjective tests . This paper attemptsto shed light on these two aspects of tests and make do a compression by using suitable techniques for objective and subjective tests .

     The paper compares between the two techniques used by the objective and subjective tests respectively, the time and efforts required by each type, the extent to which each type can be reliable, and the skills each type is suitable to measure.

     The paper shows that objective tests, on the contrary of the subjective ones, encourages guess> Objective tests are used to test specific areas of langua

... Show More
View Publication Preview PDF
Publication Date
Thu Jun 15 2023
Journal Name
Journal Of Baghdad College Of Dentistry
Molar tubes and failure rates–A review
...Show More Authors

Objectives: To review the failure rates of molar tubes and the effect of molar tube base design, adhesive type, and bonding technique on the failure rates of molar tubes. Data: The revolution of molar bonding greatly impacted fixed orthodontic appliance treatment by reducing chair-side time and improving patient comfort. Even with the many advantages of molar bonding, clinicians sometimes hesitate to use molar tubes due to their failure rates. Sources: Internet sources, such as Pubmed and Google Scholar. Study selection: studies testing the bond failure rate of molar tubes. Conclusions: The failure rate of the molar tubes can be reduced and the bond strength of the molar tubes can be improved by changing the design of the molar tube base

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (2)
Scopus Crossref
Publication Date
Fri Jul 21 2023
Journal Name
Journal Of Engineering
Design and Implementation of a Vlsm Simulator
...Show More Authors

Variable-Length Subnet Masks (VLSM), often referred to as "subnetting a subnet", is used to maximize addressing efficiency. The network administrator is able to use a long mask on networks with few hosts, and a short mask on subnets with many hosts. This addressing scheme allows growth and does not involve wasting addresses. VLSM gives a way of subnetting a network with
minimal loses of IP addresses for a specific range. Unfortunately, the network administrator has to perform several mathematical steps (or use charts) to get the required results from VLSM. In this paper, a simple graph simulator is proposed (using Visual Basic 6.0 Language) to perform all the required mathematical steps and to display the obtained required informatio

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Sep 12 2012
Journal Name
Journal Of Engineering
Design and Implementation of a Vlsm Simulator
...Show More Authors

Variable-Length Subnet Masks (VLSM), often referred to as "subnetting a subnet", is used to maximize addressing efficiency. The network administrator is able to use a long mask on networks with few hosts, and a short mask on subnets with many hosts. This addressing scheme allows growth and does not involve wasting addresses. VLSM gives a way of subnetting a network with minimal loses of IP addresses for a specific range. Unfortunately, the network administrator has to perform several mathematical steps (or use charts) to get the required results from VLSM. In this paper, a simple graph simulator is proposed (using Visual Basic 6.0 Language) to perform all the required mathematical steps and to display the obtained required information (the

... Show More