In this paper, RBF-based multistage auto-encoders are used to detect IDS attacks. RBF has numerous applications in various actual life settings. The planned technique involves a two-part multistage auto-encoder and RBF. The multistage auto-encoder is applied to select top and sensitive features from input data. The selected features from the multistage auto-encoder is wired as input to the RBF and the RBF is trained to categorize the input data into two labels: attack or no attack. The experiment was realized using MATLAB2018 on a dataset comprising 175,341 case, each of which involves 42 features and is authenticated using 82,332 case. The developed approach here has been applied for the first time, to the knowledge of the authors, to dete
... Show MoreHomomorphic encryption became popular and powerful cryptographic primitive for various cloud computing applications. In the recent decades several developments has been made. Few schemes based on coding theory have been proposed but none of them support unlimited operations with security. We propose a modified Reed-Muller Code based symmetric key fully homomorphic encryption to improve its security by using message expansion technique. Message expansion with prepended random fixed length string provides one-to-many mapping between message and codeword, thus one-to many mapping between plaintext and ciphertext. The proposed scheme supports both (MOD 2) additive and multiplication operations unlimitedly. We make an effort to prove
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreThe advancements in Information and Communication Technology (ICT), within the previous decades, has significantly changed people’s transmit or store their information over the Internet or networks. So, one of the main challenges is to keep these information safe against attacks. Many researchers and institutions realized the importance and benefits of cryptography in achieving the efficiency and effectiveness of various aspects of secure communication.This work adopts a novel technique for secure data cryptosystem based on chaos theory. The proposed algorithm generate 2-Dimensional key matrix having the same dimensions of the original image that includes random numbers obtained from the 1-Dimensional logistic chaotic map for given con
... Show MoreThe current research aims to investigate the counseling services provided to gifted students in the Al-Baha region from their point of view, and to identify the differences in these views according to the students ’gender, educational stages, and the cities in which they study. The descriptive survey approach was followed in its relevance to the research objectives. Likewise, a random sample of gifted elementary, intermediate, and secondary school students was selected by the method of stratified sampling, as the sample reached (175) male and female students. The instrument of the research consisted of the questionnaire of counseling services presented to gifted students from their point of view prepared by researchers. The results sho
... Show MoreThe current research seeks to know the difficulties in memorizing literary texts with fourth grade students from teachers’ point of view of and students
The research contains a community of (10,870) students from schools affiliated to the Directorate of Karkh, second and the number of schools for boys and girls (79) School and the number of teachers (349) who are specialized in teaching Arabic language to fourth grade preparatory students and there was a section of a randomly sample of each of the students, teachers and schools .
Some actions which can be listed below:-The survey which was done by the researcher for the views of the two samples from teachers and students as the number of teachers covered in this research (20) and
This study aims to Statement of the relationship between Total Quality Management philosophy and Organizational performance from the point of view of the internal customer. A comparison has been made between two companies, one of which applies the requirements of TQM well and the other does not apply these requirements as the (General Company for Electrical Industries/ Diyala) and (General Company for Electrical Industries/ Baghdad) to conduct the search, During the questionnaire prepared for this purpose and distributed to a sample of 30 employees in the General Company for Electric Industries/ Diyala and (20) employees of the General Company for Electrical Industries/ Baghdad. Their answers were analyzed using a simple correlation coef
... Show More