The continuous advancement in the use of the IoT has greatly transformed industries, though at the same time it has made the IoT network vulnerable to highly advanced cybercrimes. There are several limitations with traditional security measures for IoT; the protection of distributed and adaptive IoT systems requires new approaches. This research presents novel threat intelligence for IoT networks based on deep learning, which maintains compliance with IEEE standards. Interweaving artificial intelligence with standardization frameworks is the goal of the study and, thus, improves the identification, protection, and reduction of cyber threats impacting IoT environments. The study is systematic and begins by examining IoT-specific threat data recovered from the publicly available data sets CICIDS2017 and IoT-23. Classification of network anomalies and feature extraction are carried out with the help of deep learning models such as CNN and LSTM. This paper’s proposed system complies with IEEE standards like IEEE 802.15.4 for secure IoT transmission and IEEE P2413 for architecture. A testbed is developed in order to use the model and assess its effectiveness in terms of overall accuracy, detection ratio, and time to detect an event. The findings of the study prove that threat intelligence systems built with deep learning provide explicit security to IoT networks when they are designed as per the IEEE guidelines. The proposed model retains a high detection rate, is scalable, and is useful in protecting against new forms of attacks. This research develops an approach to provide standard-compliant cybersecurity solutions to enable trust and reliability in the IoT applications across the industrial sectors. More future research can be devoted to the implementation of this system within the context of the newest advancements in technologies, such as edge computing.
The research aims to identify the role of the dimensions of financial inclusion in achieving the competitive advantage by An exploratory research of the views of a sample of customers of the 20 Algerian commercial banks, And the relationship between its dimensions (Access dimension, Usage dimension, Quality) And competitive advantage. This research is based on the analytical descriptive approach. The questionnaire was adopted as a main tool in collecting data and information on the sample of 377.
The The research showed several results, the most important of which is a strong correlation between the dimensions of the three financial inclusion combined and the competitive advantage of the Algerian commercial banks, and explained t
... Show MoreThe bile salt hydrolase gene (bshA), encoding bile salt hydrolase enzyme (EC 3.5.1.24) from probiotic isolate Lactobacillus acidophilus Ar strain which is responsible for assimilation cholesterol were studied in the present work. About 801 bp in length DNA fragment of Lb. acidophilus Ar strain was amplified by PCR techniques. Two restriction sites (PstI/SacI) were added to each end of that fragment for manipulation of DNA during cloning. Amplified fragment inserted into pJET1.2\blunt end vector and pMG36e vector respectively. pJET1.2\blunt end vector is overexpression plasmid for E. coli MC1022, and pMG36e vector is a shuttle vector which is able to replicate in both E. coli and lactic acid bacteria. The resulted constructs were named as pJ
... Show MoreProfit is a goal sought by all banks because it brings them income and guarantees them survival and continuity, and on the other hand, facing commitments without financial crisis. Hence the idea of research in his quest to build scientific tools and means that can help bank management in particular, investors, lenders and others to predict financial failure and to detect early financial failures. The research has produced a number of conclusions, the most important of which is that all Islamic banks sample a safe case of financial failure under the Altman model, while according to the Springate model all Islamic banks sample a search for a financial failure except the Islamic Bank of Noor Iraq for Investment and Finance )BINI(. A
... Show MoreIn accounting studies, more than one method is used to measure income and balance sheets elements. One of these methods is called the fair value, which use to determine the assets and liabilities ad it includes the benefits or self-satisfaction ability. This paper aims to focus on the importance of fair value as a basis of accounting measurement and its effects to achieve the relevant characteristics by using the equation is used by (Kythreotis) in his research, And Also , Editing this equation depending on the financial data and information of Iraqi Banks as a case.
The study aimed to identify the degree of commitment of social workers working in the Ministry of Social Development to the professional principles of the social work profession in light of the Corona pandemic, and the sample consisted of (135) specialists. The study reached several results: the most important one is the degree of commitment of social workers working in the Ministry of Social Development to the professional principles of social service was great. The other result is the absence of statistically significant differences according to the variables of sex and place of residence. Moreover, the results also showed the absence of statistically significant differences in the principles of ( Acceptance o
... Show MoreIn their cross-sectional study, Al-Rubaye et al studied the extent of vitamin D (VD) deficiency/ insufficiency, factors affecting its degree, and the adverse outcomes of the altered VD status among a group of mothers and their neonates from Baghdad, Iraq. They found that 96.6% of the mothers had VD deficiency/ insufficiency compared to 86.4% in their neonates. Maternal VD levels and neonatal weights were significantly correlated with neonatal VD levels. We believe that the study results need to be revised. This is based two points listed in this letter to editor
The current work aims to evaluate the association between genetic mutations in thymidylate synthetase (
The purpose of this paper is to identifying the values of some physical and Bio- Kinematic variables during the performance of the jump spike serve skill, and identifying the effect of the proposed training program using intermittent training to develop some physical and Bio- Kinematic variables and accuracy of the jump spike serve skill among the research sample. The experimental method was used and the research was conducted on a deliberately chosen sample of the players of the Army Club, who were primarily advanced in volleyball, and the number of the sample was (10) players. The conclusions were reached that the proposed training program using intermittent training has a positive effect on some of the physical and Bio- Kinematic variabl
... Show MoreBackground: Posterior superior alveolar artery (PSAA) is branch of the maxillary artery. It usually supplies the lateral wall of the sinus and overlying membrane. Evaluation and awareness of the anatomy of maxillary sinus before surgery is crucial to avoid surgical complications. The aim of this study is to examine the prevalence, location of the (PSAA) in relation to the floor of the maxillary sinus and alveolar crest using computerized tomography (CT) scans. Materials and Methods: This study included 180 Iraqi subjects (99 males and 81 females) with age more than 16 years old. CT scans for (right and left) Maxillary sinuses were done for each patient. The information obtained was assessed in a coronal multi planar reconstructions images (
... Show More
The research problem lies in the lack of accurate scientific perceptions concerning the reality of the communicator and the factors influencing his job. The research is aimed at introducing the communicator in the university press, clarifying the obstacles facing him, and uncovering the level of his job satisfaction and his visions of developing his work. The researcher adopted the survey method in the collection, analysis, and interpretation of the data using a questionnaire. A set of results and conclusions has been reached, most importantly are:
*The communicator performs multiple missions including writing, editing, and collecting info |