Preferred Language
Articles
/
pBf1CpIBVTCNdQwCLJ2q
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a new RNA encoding method and ResNet50 Model, where the encoding is done by splitting the training records into different groups. These groups are protocol, service, flag, and digit, and each group is represented by the number of RNA characters that can represent the group's values. The RNA encoding phase converts network traffic records into RNA sequences, allowing for a comprehensive representation of the dataset. The detection model, utilizing the ResNet architecture, effectively tackles training challenges and achieves high detection rates for different attack types. The KDD-Cup99 Dataset is used for both training and testing. The testing dataset includes new attacks that do not appear in the training dataset, which means the system can detect new attacks in the future. The efficiency of the suggested anomaly intrusion detection system is done by calculating the detection rate (DR), false alarm rate (FAR), and accuracy. The achieved DR, FAR, and accuracy are equal to 96.24%, 6.133%, and 95.99%. The experimental results exhibit that the RNA encoding method can improve intrusion detection.

Scopus Crossref
View Publication
Publication Date
Sun Dec 01 2019
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Faithful representation of accounting information according requirements width financial statements depending on international standard (IFRS-15) revenue from contracts with customers: Applied research in a sample of the joint stock companies listed on the Iraq Stock Exchange
...Show More Authors

This study seeks to identify the possibility of achieving the property of faithful representation of accounting information and measure it by using the standard approach based on mathematical and statistical equations by comparing two financial periods before and after the application of (IFRS-15) Revenue from contracts with customers, during the period. (2014-2018), for the financial statements of the mixed joint stock companies listed on the Iraq Stock Exchange, which is one of the main pillars of the economic structure of the country, as a joint investment between the state and the private sector, and has importance in many aspects, including support for projects of public companies, S Absorption and employment of labor, as well as ra

... Show More
View Publication Preview PDF
Publication Date
Thu Feb 16 1995
Journal Name
. مجلة العلوم الزراعية العراقية 26 (1), 84-87
Effect of GA3 and Pollen Extract on Fruit set and Seed Production of Date Palm Cvs. Zahdi and Khaustawi.‏
...Show More Authors

Publication Date
Thu Mar 30 2023
Journal Name
College Of Islamic Sciences
Title: Arabic Manuscript, Concepts and Terms and Their Impact on Determining Its Historical beginnings and extension of its existence.
...Show More Authors

Title: Arabic Manuscript, Concepts and Terms and Their Impact on Determining Its Historical beginnings and extension of its existence.

Researcher: Dr. Atallah Madb Hammadi Zubaie.

Bn the name of Allah Most Merciful

The interest in manuscripts and rules  of their investigation and dissemination appeared soon, and the speech in editing terms and concepts appeared in sooner time.  When looking at the classified books  in the Arab manuscripts , we find the books of the first generation  did not allude definition for this term  , but rather  focused on  the importance of manuscripts and their  existence locations, indexing, care, and verification rules. The  reason for this is that the science of Arabic manuscrip

... Show More
View Publication Preview PDF
Publication Date
Sat Jun 28 2025
Journal Name
Journal Of Physical Education
Mineral and sugar concentrations taken during matches and their effect on some physical and functional abilities of football players
...Show More Authors

Many athletes believe that it enhances the level of performance during training and competition, in addition to compensating for fluids during exercise when the levels of temperature and humidity in the atmosphere rise during the athlete's intensive training, as it increases the requirements for fluid compensation to avoid the risk of potential thermal disorders. If training continues for more than an hour causing fatigue, athletes are advised to drink carbohydrate drinks that quickly convert to glucose in the blood, while sodium should be included in the fluids consumed during exercise or matches that last more than (1-2 hours). The effect of drinking a drink containing 12% carbohydrates and electrolytes before each half of a simul

... Show More
View Publication
Crossref
Publication Date
Sat Apr 01 2023
Journal Name
Iop Conference Series: Earth And Environmental Science
Effect of Blue and Red LED Light and some Plant Extract on Lettuce Growth and Yield in NFT Technique
...Show More Authors
Abstract<p>This experiment was carried out in the College of Agricultural Engineering Sciences, Univ. of Baghdad, during autumn 2021 growing season to investigate possibility study of increase lettuce antioxidant and biological yield, growing and producing lettuce hydroponically under film technique (NFT) using a globally approved standard solution (Cooper solution), Nested design with three replications adopted in the experiment, each of them included in main plot the first factor, which is LED light (B and R), Then levels of second factor were randomly distributed within each replicate, which included spraying with organic nutrients which was Cymbopogon citratus and Hibiscus sabdariffa at two </p> ... Show More
View Publication Preview PDF
Scopus (5)
Scopus Crossref
Publication Date
Sun Dec 07 2008
Journal Name
Baghdad Science Journal
New Method for Determination of Molybdenum(VI) through Flow Injection Analysis Via the Consumption of Liberated Oxygen from Reaction System Ammonia-Hydrogen peroxide-Molybdenum(VI) in the Presence of Pyrogallol
...Show More Authors

This piece of research work aims to study one of the most difficult reaction and determination due to continuous and rapid variation of reaction products and the reactants. As molybdenum (VI) aid in the decomposition of hydrogen peroxide in alkaline medium of ammomia, thus means a continuous liberation of oxygen which cuases and in a continuous manner a distraction in the measurement process. On this basis pyrogallol was used to absorbe all liberated oxygen and the result is an a clean undisturbed signals. Molybdenum (VI) was determined in the range of 4-100 ?g.ml-1 with percentage linearity of 99.8% or (4-300 ?g.ml-1 with 94.4%) while L.O.D. was 3.5 ?g.ml-1. Interferring ions (cations and anions) were studied and their main effect was red

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Apr 01 2012
Journal Name
2012 International Conference On Future Communication Networks
Efficient method to find the multiplicative inverse in GF (2&lt;sup&gt;m&lt;/sup&gt;) using FPGA by exponentiation to (2&lt;sup&gt;k&lt;/sup&gt;)
...Show More Authors

Crossref (1)
Crossref
Publication Date
Sun Apr 01 2012
Journal Name
2012 International Conference On Future Communication Networks
Efficient method to find the multiplicative inverse in GF (2&lt;sup&gt;m&lt;/sup&gt;) using FPGA by exponentiation to (2&lt;sup&gt;k&lt;/sup&gt;)
...Show More Authors

Multiplicative inverse in GF (2 m ) is a complex step in some important application such as Elliptic Curve Cryptography (ECC) and other applications. It operates by multiplying and squaring operation depending on the number of bits (m) in the field GF (2 m ). In this paper, a fast method is suggested to find inversion in GF (2 m ) using FPGA by reducing the number of multiplication operations in the Fermat's Theorem and transferring the squaring into a fast method to find exponentiation to (2 k ). In the proposed algorithm, the multiplicative inverse in GF(2 m ) is achieved by number of multiplications depending on log 2 (m) and each exponentiation is operates in a single clock cycle by generating a reduction matrix for high power of two ex

... Show More
View Publication
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Sat Jun 01 2019
Journal Name
Journal Of Economics And Administrative Sciences
The usage of accounting information according to (Demerjian.et.al) model in order to measure the efficiency of industrial companies listed in the Iraqi Stock Exchange
...Show More Authors

The aim of the research is to measure the efficiency of the companies in the industrial sector listed in the Iraqi Stock Exchange , by directing these companies to their resources (inputs) towards achieving the greatest possible returns (outputs) or reduce those resources while maintaining the level of returns to achieve the efficiency of these companies, therefore, in order to achieve the objectives of the research, it was used (Demerjian.et.al) model to measure the efficiency of companies and the factors influencing them. The researchers had got a number of conclusions , in which the most important of them is that 66.6% of the companies in the research sample do not possess relatively high efficiency and that the combined factors (the nat

... Show More
View Publication
Publication Date
Sun Apr 01 2018
Journal Name
Al–bahith Al–a'alami
The propaganda content of the elements of expression in the face of the promotion of terrorist thought: (Military information of the popular crowd model)
...Show More Authors

The propaganda war is one of the most dangerous weapons used in various conditions of war and peace within any intellectual, political or military conflict to be targeted by multiple social groups and their effects on the intellectuals to change the viewpoints at the local and global level, including the use of technical treatment of the audio and visual medium, The impact of the psychological dimensions of the arms in the confrontation and spread terror in the ranks of the enemies and in the forefront of what Iraq faces in its battle against the And the use of it as a propaganda content contributes to the development of the spirit of tranquility and tranquility in the hearts of Iraqis and the return of the right to the owners “th

... Show More
View Publication Preview PDF
Crossref