The continuous advancement in the use of the IoT has greatly transformed industries, though at the same time it has made the IoT network vulnerable to highly advanced cybercrimes. There are several limitations with traditional security measures for IoT; the protection of distributed and adaptive IoT systems requires new approaches. This research presents novel threat intelligence for IoT networks based on deep learning, which maintains compliance with IEEE standards. Interweaving artificial intelligence with standardization frameworks is the goal of the study and, thus, improves the identification, protection, and reduction of cyber threats impacting IoT environments. The study is systematic and begins by examining IoT-specific threat data recovered from the publicly available data sets CICIDS2017 and IoT-23. Classification of network anomalies and feature extraction are carried out with the help of deep learning models such as CNN and LSTM. This paper’s proposed system complies with IEEE standards like IEEE 802.15.4 for secure IoT transmission and IEEE P2413 for architecture. A testbed is developed in order to use the model and assess its effectiveness in terms of overall accuracy, detection ratio, and time to detect an event. The findings of the study prove that threat intelligence systems built with deep learning provide explicit security to IoT networks when they are designed as per the IEEE guidelines. The proposed model retains a high detection rate, is scalable, and is useful in protecting against new forms of attacks. This research develops an approach to provide standard-compliant cybersecurity solutions to enable trust and reliability in the IoT applications across the industrial sectors. More future research can be devoted to the implementation of this system within the context of the newest advancements in technologies, such as edge computing.
Moderately, advanced national election technologies have improved political systems. As electronic voting (e-voting) systems advance, security threats like impersonation, ballot tampering, and result manipulation increase. These challenges are addressed through a review covering biometric authentication, watermarking, and blockchain technologies, each of which plays a crucial role in improving the security of e-voting systems. More precisely, the biometric authentication is being examined due to its ability in identify the voters and reducing the risks of impersonation. The study also explores the blockchain technology to decentralize the elections, enhance the transparency and ensure the prevention of any unauthorized alteration or
... Show MoreIn this study, the response and behavior of machine foundations resting on dry and saturated sand was investigated experimentally. A physical model was manufactured to simulate steady state harmonic load at different operating frequencies. The effect of relative density, depth of embedment, foundation area as well as the imposed harmonic load was investigated. It was found that the amplitude of displacement of the foundation increases with increasing the amplitude of dynamic force and operating frequency meanwhile it decreases with increasing the relative density of sand, degree of saturation, depth of embedment and contact area of footing. The maximum displacement was noticed at 33.34 to 41.67 Hz. The maximum displacement amplitude respons
... Show MoreThis study evaluated the structural changes of enamel treated by the Regenerate system and carbon dioxide (CO2) laser against acid challenge. Thirty human enamel slabs were prepared and assigned into three groups: Group I: untreated (control); Group II: treated with the Regenerate system; and Group III exposed to CO2 laser. All specimens were subjected to an acid challenge (pH 4.5–7.0) for 14 days. Specimens were evaluated and compared at 120 points using five Raman microspectroscopic peaks; the phosphate vibrations ν1, ν2, ν3, and ν4 at 960, 433, 1029, and 579 cm−1, respectively, and the carbonate at 1070 cm−1, followed by Vickers microhardness test. The ratio of carbonate to phosphate was correlated to the equivalent mic
... Show MoreThe performance analyses of 15 kWp (kW peak) Grid -Tied solar PV system (that considered first of its type) implemented at the Training and Energy Research Center Subsidiary of Iraqi Ministry of Electricity in Baghdad city has been achieved. The system consists of 72 modules arranged in 6 strings were each string contains 12 modules connected in series to increase the voltage output while these strings connected in parallel to increase the current output. According to the observed duration, the reference daily yields, array daily yields and final daily yields of this system were (5.9, 4.56, 4.4) kWh/kWp/day respectively. The energy yield was 1585 kWh/kWp/year while the annual total solar irradiation received by solar array system was 198
... Show MoreLaser-Induced Breakdown Spectroscopy (LIBS) has been documented as an Atomic Emission Spectroscopy (AES) technique, utilising laser-induced plasma, in order to analyse elements in materials (gases, liquids and solid). The Nd:YAG laser passively Q-switched at 1064nm and 9ns pulse duration focused by convex lens with focal length 100 mm to generates power density 5.5×1012 Mw/mm2 with optical spectrum in the range 320-740 nm. Four soil samples were brought from different northern region of Iraq, northern region (Beiji, Sherkat, Serjnar and Zerkary).
The soil of the Northern region of Beige, Sherkat, Serjnar and Zarkary has abundant ratios of the elements P [0.08, 0.09, 0.18, 0.18] and Ca [0.61, 0.15, 0.92, 0.92] while it lack of Si [0.0
Cryptography algorithms play a critical role in information technology against various attacks witnessed in the digital era. Many studies and algorithms are done to achieve security issues for information systems. The high complexity of computational operations characterizes the traditional cryptography algorithms. On the other hand, lightweight algorithms are the way to solve most of the security issues that encounter applying traditional cryptography in constrained devices. However, a symmetric cipher is widely applied for ensuring the security of data communication in constraint devices. In this study, we proposed a hybrid algorithm based on two cryptography algorithms PRESENT and Salsa20. Also, a 2D logistic map of a chaotic system is a
... Show MoreAn experiment was carried out at Al-Raed Research Station, which is located on the Baghdad-Anbar road during the winter season, in order to study the effect of the type of solar panels and irrigation system on some performance indicators of irrigation systems and germination percentage of bean crop (Vicia Faba L). A randomized complete block design (RCBD) was used with three replications. The experiment consist of two factors. 1st factor was the solar panel type with two levels : monocrystalline and polycrystalline. Second factor was the irrigation system with two levels Drip and sprinkler irrigation system the following indicators were studied : solar panel efficiency (%), Irrigation
In this paper, we studied the spark corona discharge in tap and distillited waters. The results show the shape of cone that generated on the tip of capillary tube is different with conductivity of liquids. The blue glow appears at the end of capillary tube and the drop extends into a cone. In addition, the conducitivity is affected on the relationship between the appearance of the blue glow discharge with the applied voltage. The size of the cone decreases with an increase in applied voltage. The cone diameter at the base of capillary tube oscillates with period approximately 1 Sec. this oscillates in the cone diameters is due to the change distance between the liquid electrode and the surface of liquid. The intensity of spark corona dis
... Show MoreEvaluation was carried out on the existing furrow irrigation system located in an open agricultural field within Hor Rajabh Township, south of Baghdad, Iraq (latitude: 33°09’ N, longitude: 44°24’ E). Two plots were chosen for comparison: treatment plot T1, which used subsurface water retention technology (SWRT) with a furrow irrigation system. While the treatment plot T2 was done by using a furrow irrigation procedure without SWRT. A comparison between the two treatment plots was carried out to study the efficiency of the applied water on crop yield. In terms of agricultural productivity and water use efficiency, plot T1 outperformed plot T2, according to the study’s final fin