The continuous advancement in the use of the IoT has greatly transformed industries, though at the same time it has made the IoT network vulnerable to highly advanced cybercrimes. There are several limitations with traditional security measures for IoT; the protection of distributed and adaptive IoT systems requires new approaches. This research presents novel threat intelligence for IoT networks based on deep learning, which maintains compliance with IEEE standards. Interweaving artificial intelligence with standardization frameworks is the goal of the study and, thus, improves the identification, protection, and reduction of cyber threats impacting IoT environments. The study is systematic and begins by examining IoT-specific threat data recovered from the publicly available data sets CICIDS2017 and IoT-23. Classification of network anomalies and feature extraction are carried out with the help of deep learning models such as CNN and LSTM. This paper’s proposed system complies with IEEE standards like IEEE 802.15.4 for secure IoT transmission and IEEE P2413 for architecture. A testbed is developed in order to use the model and assess its effectiveness in terms of overall accuracy, detection ratio, and time to detect an event. The findings of the study prove that threat intelligence systems built with deep learning provide explicit security to IoT networks when they are designed as per the IEEE guidelines. The proposed model retains a high detection rate, is scalable, and is useful in protecting against new forms of attacks. This research develops an approach to provide standard-compliant cybersecurity solutions to enable trust and reliability in the IoT applications across the industrial sectors. More future research can be devoted to the implementation of this system within the context of the newest advancements in technologies, such as edge computing.
Signal denoising is directly related to sample estimation of received signals, either by estimating the equation parameters for the target reflections or the surrounding noise and clutter accompanying the data of interest. Radar signals recorded using analogue or digital devices are not immune to noise. Random or white noise with no coherency is mainly produced in the form of random electrons, and caused by heat, environment, and stray circuitry loses. These factors influence the output signal voltage, thus creating detectable noise. Differential Evolution (DE) is an effectual, competent, and robust optimisation method used to solve different problems in the engineering and scientific domains, such as in signal processing. This paper looks
... Show MoreBased on the diazotization reaction of 4-aminoacetophenone with sodium nitrite in acid medium to form diazonium salt, which was coupled with Methyldopa to form a violet reddish soluble azo dye with maximum absorbance at 560 nm,a batch procedure had been developed for the estamination of Methyldopa. Under optimum experimental parameters affecting on the development and stability of the colored product, Beer´s law obeyed in the range (0.5-45) ?g.ml-1 with a correlation coefficient (0.9979).The proposed method was successfully applied to the determination of Methyldopa in either pure form and in commercial brands of pharmaceuticals, no interference was observed from common excipients in the formulations. The analytical results obtained by app
... Show MoreThis paper proposes a novel method for generating True Random Numbers (TRNs) using electromechanical switches. The proposed generator is implemented using an FPGA board. The system utilizes the phenomenon of electromechanical switch bounce to produce a randomly fluctuated signal that is used to trigger a counter to generate a binary random number. Compared to other true random number generation methods, the proposed approach features a high degree of randomness using a simple circuit that can be easily built using off-the-shelf components. The proposed system is implemented using a commercial relay circuit connected to an FPGA board that is used to process and record the generated random sequences. Applying statistical testing on th
... Show MoreBackground: Piezosurgery improved the split approach by making it safer, easier, and less prone to complications when treating extremely atrophic crests. Densah drills, with their unique design, expand the ridge by densifying bone in a reverse, non-cutting mode. Objective: To assess the effectiveness of sagittal piezosurgery, which involves cutting bone to the full implant depth and then expanding it using osseodensification drills. We use this technique to expand narrow alveolar bones and simultaneously place dental implants in the maxillary and mandibular arches. Methods: Fourteen patients received 31 dental implants. The maxillary arch received 19, and the mandible received 12 dental implants. This study will include patients who
... Show More* Khalifa E. Sharquie1, Hayder Al-Hamamy2, Adil A. Noaimi1, Mohammed A. Al-Marsomy3, Husam Ali Salman4, American Journal of Dermatology and Venereology, 2014 - Cited by 2
Algorithms using the second order of B -splines [B (x)] and the third order of B -splines [B,3(x)] are derived to solve 1' , 2nd and 3rd linear Fredholm integro-differential equations (F1DEs). These new procedures have all the useful properties of B -spline function and can be used comparatively greater computational ease and efficiency.The results of these algorithms are compared with the cubic spline function.Two numerical examples are given for conciliated the results of this method.
This paper proposes a new method Object Detection in Skin Cancer Image, the minimum
spanning tree Detection descriptor (MST). This ObjectDetection descriptor builds on the
structure of the minimum spanning tree constructed on the targettraining set of Skin Cancer
Images only. The Skin Cancer Image Detection of test objects relies on their distances to the
closest edge of thattree. Our experimentsshow that the Minimum Spanning Tree (MST) performs
especially well in case of Fogginessimage problems and in highNoisespaces for Skin Cancer
Image.
The proposed method of Object Detection Skin Cancer Image wasimplemented and tested on
different Skin Cancer Images. We obtained very good results . The experiment showed that
The heterogeneity nature of carbonate reservoirs shows sever scattering of the data, therefore, one has to be cautious in using the permeability- porosity correlation for calculating permeability unless a good correlation coefficient is available. In addition, a permeability- porosity correlation technique is not enough by itself since simulation studies also require more accurate tools for reservoir description and diagnosis of flow and non-flow units.
Evaluation of reservoir characterization was conducted by this paper for Mishrif Formation in south Iraqi oil field (heterogeneous carbonate reservoir), namely the permeability-porosity correlation, the hydraulic units (HU’s) an
... Show MoreIn this research estimated the parameters of Gumbel distribution Type 1 for Maximum values through the use of two estimation methods:- Moments (MoM) and Modification Moments(MM) Method. the Simulation used for comparison between each of the estimation methods to reach the best method to estimate the parameters where the simulation was to generate random data follow Gumbel distributiondepending on three models of the real values of the parameters for different sample sizes with samples of replicate (R=500).The results of the assessment were put in tables prepared for the purpose of comparison, which made depending on the mean squares error (MSE).