The continuous advancement in the use of the IoT has greatly transformed industries, though at the same time it has made the IoT network vulnerable to highly advanced cybercrimes. There are several limitations with traditional security measures for IoT; the protection of distributed and adaptive IoT systems requires new approaches. This research presents novel threat intelligence for IoT networks based on deep learning, which maintains compliance with IEEE standards. Interweaving artificial intelligence with standardization frameworks is the goal of the study and, thus, improves the identification, protection, and reduction of cyber threats impacting IoT environments. The study is systematic and begins by examining IoT-specific threat data recovered from the publicly available data sets CICIDS2017 and IoT-23. Classification of network anomalies and feature extraction are carried out with the help of deep learning models such as CNN and LSTM. This paper’s proposed system complies with IEEE standards like IEEE 802.15.4 for secure IoT transmission and IEEE P2413 for architecture. A testbed is developed in order to use the model and assess its effectiveness in terms of overall accuracy, detection ratio, and time to detect an event. The findings of the study prove that threat intelligence systems built with deep learning provide explicit security to IoT networks when they are designed as per the IEEE guidelines. The proposed model retains a high detection rate, is scalable, and is useful in protecting against new forms of attacks. This research develops an approach to provide standard-compliant cybersecurity solutions to enable trust and reliability in the IoT applications across the industrial sectors. More future research can be devoted to the implementation of this system within the context of the newest advancements in technologies, such as edge computing.
The kinetics of nickel removal from aqueous solutions using a bio-electrochemical reactor with a packed bed rotating cylinder cathode was investigated. The effects of applied voltage, initial nickel concentration, the rotation speed of the cathode, and pH on the reaction rate constant (k) were studied. The results showed that the cathodic deposition occurred under mass transfer control for all values of the applied voltage used in this research. Accordingly, the relationship between concentration and time can be represented by a first-order equation. The rate constant was found to be dependent on the applied voltage, initial nickel concentration, pH, and rotation speed. It was increased as the applied voltage increased and decreased as t
... Show MoreThis study evaluates the flexural behavior of ultra-thin (50 mm) one‑way reinforced‑concrete (RC) slabs retrofitted with near‑surface mounted (NSM) carbon‑fiber‑reinforced polymer (CFRP) rods under quasi‑static loading. T300‑grade CFRP rods (≈4 mm diameter) were bonded in pre‑cut 7 mm × 7 mm grooves using a two‑part epoxy. As a proof-of-concept experimental baseline, three simply‑supported specimens (1000 mm × 500 mm × 50 mm) were tested in a six‑point bending configuration (four applied loads + two reactions): two conventional controls and one strengthened slab. A load‑control rate of ~15 kN/min was applied; the controls were cycled twice and the strengthened slab four times. Relative to the average of
... Show MoreThe aim of this work was to capture solar radiation and convert it into solar thermal energy by using a storage material and the heat transfer fluid like oil and water and comparison between them, we used the evacuated tube as a receiver for solar radiation, The results showed that the oil better than water as storage material and the heat transfer fluid and the effective thermal conductivity material and good for power level, rates and durations of charge and discharge cycles.
The influence of fear on the dynamics of harvested prey-predator model with intra-specific competition is suggested and studied, where the fear effect from the predation causes decreases of growth rate of prey. We suppose that the predator attacks the prey under the Holling type IV functional response. he existence of the solution is investigated and the bounded-ness of the solution is studied too. In addition, the dynamical behavior of the system is established locally and globally. Furthermore, the persistence conditions are investigated. Finally, numerical analysis of the system is carried out.
The research aims at identifying the organizational performance of the kindergarten teachers and defines the educational environment of kindergarten children. To achieve the objectives of the research, the researcher adopted the organizational performance scale for (Saadi, 2016), which was applied to kindergarten teachers. The scale consists of (43) paragraphs, and has good reliability and validity, as the coefficient of reliability (84.0) in a retest method, and (87.0) using the formula Alpha Kronbach. Additionally, the researcher adopted the educational environment scale for (Radam, 2015); the scale consists of (66) paragraphs, and it enjoys a good reliability and validity, as the coefficient of reliability (89.0) method of reliability
... Show MoreThe electrocardiogram (ECG) is the recording of the electrical potential of the heart versus time. The analysis of ECG signals has been widely used in cardiac pathology to detect heart disease. The ECGs are non-stationary signals which are often contaminated by different types of noises from different sources. In this study, simulated noise models were proposed for the power-line interference (PLI), electromyogram (EMG) noise, base line wander (BW), white Gaussian noise (WGN) and composite noise. For suppressing noises and extracting the efficient morphology of an ECG signal, various processing techniques have been recently proposed. In this paper, wavelet transform (WT) is performed for noisy ECG signals. The graphical user interface (GUI)
... Show MoreCholinesterases are among the most efficient enzymes known. They are divided into two groups: acetylcholinesterase (AChE) involved in the hydrolysis of the neurotransimitter acetylcholine, and butyrylcholinesterase (BChE) of unknown function. Several crystal structures of the former have shown that the active site is located at the bottom of a deep and narrow gorge. Human BChE has attracted attention because it can hydrolyze toxic esters and nerve agents. Here we analyze the complexes of cholinesterase with soman by describing the 3D geometry of the complex, the active site, the changes happened through the inhibition and provide a description for the mechanism of inhibition. Soman undergoes degradation in the active site of the AChE and BC
... Show More