Preferred Language
Articles
/
pBf1CpIBVTCNdQwCLJ2q
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a new RNA encoding method and ResNet50 Model, where the encoding is done by splitting the training records into different groups. These groups are protocol, service, flag, and digit, and each group is represented by the number of RNA characters that can represent the group's values. The RNA encoding phase converts network traffic records into RNA sequences, allowing for a comprehensive representation of the dataset. The detection model, utilizing the ResNet architecture, effectively tackles training challenges and achieves high detection rates for different attack types. The KDD-Cup99 Dataset is used for both training and testing. The testing dataset includes new attacks that do not appear in the training dataset, which means the system can detect new attacks in the future. The efficiency of the suggested anomaly intrusion detection system is done by calculating the detection rate (DR), false alarm rate (FAR), and accuracy. The achieved DR, FAR, and accuracy are equal to 96.24%, 6.133%, and 95.99%. The experimental results exhibit that the RNA encoding method can improve intrusion detection.

Scopus Crossref
View Publication
Publication Date
Fri Apr 24 2020
Journal Name
Opción
Hyperbole in poetry: A case study of exaggeration
...Show More Authors

The present study identifies the linguistic means used to realize hyperbole in poetry as a rhetorical device that makes readers experience the beauty of poetic language. To achieve the aim of the study, a model of analysis in accordance with Spitzbardt (1963), Norrick (1982), and McCarthy & Carter (2004) is used. The analysis of data under investigation reveals that hyperbole is a crucial aid used by poets to portrait the real world as imaginative. In conclusion, poets prefer using lexico-grammatical repertoires than lexico-grammatical configurations. Keywords

Scopus
Publication Date
Thu Mar 01 2012
Journal Name
International Journal Of Innovative Computing, Information And Control
ITTP: A new transport protocol for VoIP applications
...Show More Authors

View Publication
Scopus (14)
Scopus
Publication Date
Mon Mar 08 2021
Journal Name
Baghdad Science Journal
a study of the womens collages in usa
...Show More Authors

The study aims to identify the colleges women in the USA where he was browsing the Internet for five universities and sixty-two women's college located these colleges in 25 states only three general and other civil 51% supported by the churches and religious associations of various began its founding in Alqrnn eighteenth and continued in the nineteenth and twentieth and to provide an opportunity for women to complete higher education, while most men's colleges opened their doors to the admission of women and turned it on coeducation

View Publication Preview PDF
Publication Date
Tue Dec 09 2014
Journal Name
Journal Of The College Of Education For Women
A Stylistic Analysis of Bisson’s Bears Discover Fire
...Show More Authors

This paper aims at analyzing Terry Bisson’s short story Bears Discover Fire stylistically by following both Gerard Genette’s theory of narratology (1980) and Short and Leech (1981) strategy for analyzing fictional works. Also trying to examine to what extent these models are applicable in analyzing the selected story. Stylistic analysis procedures help the readers/researchers to identify specific linguistic features in order to support literary interpretation and appreciation of literary texts. Style in fiction concentrates not on what is written, but on how a text is written. Each writer has his own style and techniques which distinguish him from other writers

View Publication Preview PDF
Crossref (5)
Crossref
Publication Date
Mon Jan 02 2023
Journal Name
Welcome To International Journal Of Research In Social Sciences & Humanities
A Pragmatic Study of Hedging in Academic Discourse
...Show More Authors

Welcome to International Journal of Research in Social Sciences & Humanities (IJRSSH). It is an international refereed journal of Social Sciences, Humanities & Linguistics in English published quarterly, both print and online.

View Publication
Publication Date
Sun Sep 30 2007
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Dynamics of a single Condensing Two-Phase Bubble
...Show More Authors

The dynamics of a single condensing two-phase bubble of two different dispersed-continuous systems were studied. The systems were, CCl4 - water and CCl4 - 100% glycerol. Cinephotography was used to determine the change in height, diameter and time. These results were used to determine the experimental rise velocity of the bubble, which was compared with a theoretical one based on some equations used. It was found that the velocity of the first system remained almost constant, while it decreased gradually for the second system.

View Publication Preview PDF
Publication Date
Fri Sep 30 2016
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
A Morphological Study of Alumina Hollow Fiber Membrane
...Show More Authors

Morphologies of ceramic hollow fiber membranes prepared by a combined phase-inversion and sintering method were studied. The organic binder spinning solution containing suspended Al₂O₃ powders was spun to a hollow fiber precursor, which was then sintered at elevated temperatures( 300 ˚C, 1400 ˚C, 25 ˚C) in order to obtain the Al₂O₃ hollow fiber membranes. The spinning solution consisted of polyether sulfone (PES), N-methyl-2-pyrrolidone (NMP), which were used as polymer binder, solvent, respectively. The prepared Al₂O₃ hollow fiber membranes were characterized by a scanning electron microscope (SEM). It is believed that finger-like void formation in asymmetric ceramic membranes is initiated by hydrodynamically unstable vis

... Show More
View Publication Preview PDF
Publication Date
Sun Dec 01 2024
Journal Name
كلية التربية للبنات
Strategic Maneuvering in Commercial Advertisement: A Pragmatic Study
...Show More Authors

This study deals with strategic maneuvering in advertisement from a pragmatic point of view found in some commercial advertisements in order to investigate and analyze the pragmatic devices that are used in the strategic maneuvering and stages. The study attempts to shed light on the most fuzzy areas in advertisements that is probably how the language of advertisements employed by advertisers to affect consumers positively. The primary goal of strategic maneuvering is to discover how the pragmatic devices have persuasive techniques that are used to gain a competitive advantage and more sales. This study is a contribution to the field of research in the language used in advertising. In this research, the effectiveness of strategic man

... Show More
Publication Date
Sun Feb 01 2015
Journal Name
Journal Of Engineering
Vibration Analysis of a Composite Plate with Delamination
...Show More Authors

The use of composite materials has vastly increased in recent years. Great interest is therefore developed in the damage detection of composites using non- destructive test methods. Several approaches have been applied to obtain information about the existence and location of the faults. This paper used the vibration response of a composite plate to detect and localize delamination defect based on the modal analysis. Experiments are conducted to validate the developed model. A two-dimensional finite element model for multi-layered composites with internal delamination is established. FEM program are built for plates under different boundary conditions. Natural frequencies and modal displacements of the intact and damaged

... Show More
View Publication Preview PDF
Publication Date
Wed Jul 06 2022
Journal Name
Journal Of Asian Multicultural Research For Social Sciences Study
Remote Data Auditing in a Cloud Computing Environment
...Show More Authors

In the current paradigms of information technology, cloud computing is the most essential kind of computer service. It satisfies the need for high-volume customers, flexible computing capabilities for a range of applications like as database archiving and business analytics, and the requirement for extra computer resources to provide a financial value for cloud providers. The purpose of this investigation is to assess the viability of doing data audits remotely inside a cloud computing setting. There includes discussion of the theory behind cloud computing and distributed storage systems, as well as the method of remote data auditing. In this research, it is mentioned to safeguard the data that is outsourced and stored in cloud serv

... Show More
View Publication
Crossref