The continuous advancement in the use of the IoT has greatly transformed industries, though at the same time it has made the IoT network vulnerable to highly advanced cybercrimes. There are several limitations with traditional security measures for IoT; the protection of distributed and adaptive IoT systems requires new approaches. This research presents novel threat intelligence for IoT networks based on deep learning, which maintains compliance with IEEE standards. Interweaving artificial intelligence with standardization frameworks is the goal of the study and, thus, improves the identification, protection, and reduction of cyber threats impacting IoT environments. The study is systematic and begins by examining IoT-specific thre
... Show MoreBackground: lip lengthening procedure is one of the surgical options for the correction of gummy smile in patients with short upper lip. Methods: A comparative clinical study was conducted on 15 patients requiring lip lengthening procedure for the esthetic correction of excessive gingival exposure with gummy smile. Scalpel was used in seven patients and diode laser in the remaining eight patients. Under infiltration anesthesia, about one cm strip of mucosa was excised at the vestibular depth and the mucosa of the lip was sutured to the alveolar mucosa. Results: The diode laser group demonstrated less postoperative pain and swelling. Regarding postoperative ecchymosis, three patients in the scalpel group developed ecchymosis and no cases
... Show MoreIntrusion detection system is an imperative role in increasing security and decreasing the harm of the computer security system and information system when using of network. It observes different events in a network or system to decide occurring an intrusion or not and it is used to make strategic decision, security purposes and analyzing directions. This paper describes host based intrusion detection system architecture for DDoS attack, which intelligently detects the intrusion periodically and dynamically by evaluating the intruder group respective to the present node with its neighbors. We analyze a dependable dataset named CICIDS 2017 that contains benign and DDoS attack network flows, which meets certifiable criteria and is ope
... Show MoreThis article reveals the first record of the parasitoid wasp, Monodontomerus obscurus Westwood (Hymenoptera, Torymidae) from Iraq. A total of 27 specimens were emerged from mud nests of sphecoid wasp of Sceliphron sp. (Hymenoptera, Sphecidae), that collected from a wall at a residential garden in Dohuk province. A short morphological description is presented.
This paper considers and proposes new estimators that depend on the sample and on prior information in the case that they either are equally or are not equally important in the model. The prior information is described as linear stochastic restrictions. We study the properties and the performances of these estimators compared to other common estimators using the mean squared error as a criterion for the goodness of fit. A numerical example and a simulation study are proposed to explain the performance of the estimators.
The logistic regression model is an important statistical model showing the relationship between the binary variable and the explanatory variables. The large number of explanations that are usually used to illustrate the response led to the emergence of the problem of linear multiplicity between the explanatory variables that make estimating the parameters of the model not accurate.
... Show More