Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a new RNA encoding method and ResNet50 Model, where the encoding is done by splitting the training records into different groups. These groups are protocol, service, flag, and digit, and each group is represented by the number of RNA characters that can represent the group's values. The RNA encoding phase converts network traffic records into RNA sequences, allowing for a comprehensive representation of the dataset. The detection model, utilizing the ResNet architecture, effectively tackles training challenges and achieves high detection rates for different attack types. The KDD-Cup99 Dataset is used for both training and testing. The testing dataset includes new attacks that do not appear in the training dataset, which means the system can detect new attacks in the future. The efficiency of the suggested anomaly intrusion detection system is done by calculating the detection rate (DR), false alarm rate (FAR), and accuracy. The achieved DR, FAR, and accuracy are equal to 96.24%, 6.133%, and 95.99%. The experimental results exhibit that the RNA encoding method can improve intrusion detection.
Background: Pain, swelling and trismus are the main minor complications encountered after surgical extraction of impacted third molars, minimizing these postoperative complications is the center of many studies, one proposed method is the prophylactic administration of corticosteroids, the aim of this study is to evaluate the effect of prophylactic Dexamethasone administration on facial swelling and trismus after surgical extraction of impacted third molars. Materials and methods: 20 patients were included in this study, they were randomly divided into 2 groups of 10 patients each; a study group in which patients were given 8 mg. Dexamethasone 1 hour before surgical extraction of impacted third molar and 4 mg. 6 hours postoperatively, and a
... Show MoreHypertension is one of the main causes of heart disease; beta- blockers play a crucial role in the management of patients with essential hypertension. Bisoprolol is one of the widely used drugs for the treatment of hypertension. Bisoprolol tablets were prepared by two methods (direct and wet) using different proportion and types of diluents, different binder types and forms, then evaluated for, weight variation, hardness, friability, disintegration time and dissolution rate. The results were compared with a reference Bisoprolol tablet.
Both methods of preparation wet and direct compression method gave good results, which are consistent with the requirements of British Pharmacopeia and United States Pharmacopeia. It was found that
... Show MoreThis work was conducted to study the treatment of industrial waste water, and more particularly those in the General Company of Electrical Industries.This waste water, has zinc ion with maximum concentration in solution of 90 ppm.
The reuse of such effluent can be made possible via appropriate treatments, such as chemical coagulation, Na2S is used as coagulant.
The parameters that influenced the waste water treatment are: temperature, pH, dose of coagulant and settling time.
It was found that the best condition for zinc removal, within the range of operation used ,were a temperature of 20C a pH value of 13 , a coagulant dose of 15 g Na2S /400ml solution and a settling time of 7 days. Under these conditions the zinc concentrat
Incremental sheet metal forming is a modern technique of sheet metal forming in which a uniform sheet is locally deformed during the progressive action of a forming tool. The tool movement is governed by a CNC milling machine. The tool locally deforms by this way the sheet with pure deformation stretching. In SPIF process, the research is concentrate on the development of predict models for estimate the product quality. Using simulated annealing algorithm (SAA), Surface quality in SPIF has been modeled. In the development of this predictive model, spindle speed, feed rate and step depth have been considered as model parameters. Maximum peak height (Rz) and Arithmetic mean surface roughness (Ra) are used as response parameter to assess th
... Show MoreIn this paper, we used two monomers, 3,3',4,4'-benzophenone tetracarboxylic dianhydride (BTDA) and m,m'-diaminobenzophenone (m, m’-DABP), to produce polyamide acid and then converted it to polyimide (PI). The effects of phosphoric acid (H3PO4) molarity (1, 2, and 3 M) on the structural, thermal, mechanical, and electrical characteristics of the polyimides/polyaniline (PI/PANI) nanocomposites were studied. Two sharp reflection peaks were developed by the addition of PANI to PI. When 3 M H3PO4 is added, the crystalline sharp peak loses some of its intensity. The complex formation of PI/PANI-H3PO4 was confi
... Show MoreAbstract
Praise be to Allah and prayers and peace be upon our Prophet, Muhammad, his family and all of his companions,
This research addresses the issue of judge's preaching to the litigants and witnesses; it is a very significant issue since the judge cannot know the insides and facts, but it issues judgments based on the hearings. Since people are originally wrong-doing and ignorant, they, therefore, commit injustice, oppression, false adversarial, and false testimony. However, some people can possibly retreat and return to the right, after being inattentive or recalcitrant, by preaching. This fact led scholars to talk about the judge's preaching to litigant and witnesses and this research is conducted
... Show More