Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a new RNA encoding method and ResNet50 Model, where the encoding is done by splitting the training records into different groups. These groups are protocol, service, flag, and digit, and each group is represented by the number of RNA characters that can represent the group's values. The RNA encoding phase converts network traffic records into RNA sequences, allowing for a comprehensive representation of the dataset. The detection model, utilizing the ResNet architecture, effectively tackles training challenges and achieves high detection rates for different attack types. The KDD-Cup99 Dataset is used for both training and testing. The testing dataset includes new attacks that do not appear in the training dataset, which means the system can detect new attacks in the future. The efficiency of the suggested anomaly intrusion detection system is done by calculating the detection rate (DR), false alarm rate (FAR), and accuracy. The achieved DR, FAR, and accuracy are equal to 96.24%, 6.133%, and 95.99%. The experimental results exhibit that the RNA encoding method can improve intrusion detection.
This study seeks to identify the possibility of achieving the property of faithful representation of accounting information and measure it by using the standard approach based on mathematical and statistical equations by comparing two financial periods before and after the application of (IFRS-15) Revenue from contracts with customers, during the period. (2014-2018), for the financial statements of the mixed joint stock companies listed on the Iraq Stock Exchange, which is one of the main pillars of the economic structure of the country, as a joint investment between the state and the private sector, and has importance in many aspects, including support for projects of public companies, S Absorption and employment of labor, as well as ra
... Show MoreTitle: Arabic Manuscript, Concepts and Terms and Their Impact on Determining Its Historical beginnings and extension of its existence.
Researcher: Dr. Atallah Madb Hammadi Zubaie.
Bn the name of Allah Most Merciful
The interest in manuscripts and rules of their investigation and dissemination appeared soon, and the speech in editing terms and concepts appeared in sooner time. When looking at the classified books in the Arab manuscripts , we find the books of the first generation did not allude definition for this term , but rather focused on the importance of manuscripts and their existence locations, indexing, care, and verification rules. The reason for this is that the science of Arabic manuscrip
... Show MoreMany athletes believe that it enhances the level of performance during training and competition, in addition to compensating for fluids during exercise when the levels of temperature and humidity in the atmosphere rise during the athlete's intensive training, as it increases the requirements for fluid compensation to avoid the risk of potential thermal disorders. If training continues for more than an hour causing fatigue, athletes are advised to drink carbohydrate drinks that quickly convert to glucose in the blood, while sodium should be included in the fluids consumed during exercise or matches that last more than (1-2 hours). The effect of drinking a drink containing 12% carbohydrates and electrolytes before each half of a simul
... Show MoreThis experiment was carried out in the College of Agricultural Engineering Sciences, Univ. of Baghdad, during autumn 2021 growing season to investigate possibility study of increase lettuce antioxidant and biological yield, growing and producing lettuce hydroponically under film technique (NFT) using a globally approved standard solution (Cooper solution), Nested design with three replications adopted in the experiment, each of them included in main plot the first factor, which is LED light (B and R), Then levels of second factor were randomly distributed within each replicate, which included spraying with organic nutrients which was Cymbopogon citratus and Hibiscus sabdariffa at two
This piece of research work aims to study one of the most difficult reaction and determination due to continuous and rapid variation of reaction products and the reactants. As molybdenum (VI) aid in the decomposition of hydrogen peroxide in alkaline medium of ammomia, thus means a continuous liberation of oxygen which cuases and in a continuous manner a distraction in the measurement process. On this basis pyrogallol was used to absorbe all liberated oxygen and the result is an a clean undisturbed signals. Molybdenum (VI) was determined in the range of 4-100 ?g.ml-1 with percentage linearity of 99.8% or (4-300 ?g.ml-1 with 94.4%) while L.O.D. was 3.5 ?g.ml-1. Interferring ions (cations and anions) were studied and their main effect was red
... Show MoreMultiplicative inverse in GF (2 m ) is a complex step in some important application such as Elliptic Curve Cryptography (ECC) and other applications. It operates by multiplying and squaring operation depending on the number of bits (m) in the field GF (2 m ). In this paper, a fast method is suggested to find inversion in GF (2 m ) using FPGA by reducing the number of multiplication operations in the Fermat's Theorem and transferring the squaring into a fast method to find exponentiation to (2 k ). In the proposed algorithm, the multiplicative inverse in GF(2 m ) is achieved by number of multiplications depending on log 2 (m) and each exponentiation is operates in a single clock cycle by generating a reduction matrix for high power of two ex
... Show MoreThe aim of the research is to measure the efficiency of the companies in the industrial sector listed in the Iraqi Stock Exchange , by directing these companies to their resources (inputs) towards achieving the greatest possible returns (outputs) or reduce those resources while maintaining the level of returns to achieve the efficiency of these companies, therefore, in order to achieve the objectives of the research, it was used (Demerjian.et.al) model to measure the efficiency of companies and the factors influencing them. The researchers had got a number of conclusions , in which the most important of them is that 66.6% of the companies in the research sample do not possess relatively high efficiency and that the combined factors (the nat
... Show MoreThe propaganda war is one of the most dangerous weapons used in various conditions of war and peace within any intellectual, political or military conflict to be targeted by multiple social groups and their effects on the intellectuals to change the viewpoints at the local and global level, including the use of technical treatment of the audio and visual medium, The impact of the psychological dimensions of the arms in the confrontation and spread terror in the ranks of the enemies and in the forefront of what Iraq faces in its battle against the And the use of it as a propaganda content contributes to the development of the spirit of tranquility and tranquility in the hearts of Iraqis and the return of the right to the owners “th
... Show More