The Internet of Things (IoT) has significantly transformed modern systems through extensive connectivity but has also concurrently introduced considerable cybersecurity risks. Traditional rule-based methods are becoming increasingly insufficient in the face of evolving cyber threats. This study proposes an enhanced methodology utilizing a hybrid machine-learning framework for IoT cyber-attack detection. The framework integrates a Grey Wolf Optimizer (GWO) for optimal feature selection, a customized synthetic minority oversampling technique (SMOTE) for data balancing, and a systematic approach to hyperparameter tuning of ensemble algorithms: Random Forest (RF), XGBoost, and CatBoost. Evaluations on the RT-IoT2022 dataset demonstrat
... Show MoreIn this paper, an adaptive active disturbance rejection control is newly designed for precise angular steering position tracking of the uncertain and nonlinear SBW system with time delay communications. The proposed adaptive active disturbance rejection control comprises the following two elements: (1) An adaptive extended state observer and (2) an adaptive state error feedback controller. The adaptive extended state observer with adaptive gains is employed for estimating the unmeasured velocity, acceleration, and compound disturbance which consists of system parameter uncertainties, nonlinearities, exterior disturbances, and time delay in which the observer gains are dynamically adjusted based on the estimation error to enhance est
... Show MoreThe research aims to highlight the role played by the target costing technique as an administrative technique that is compatible with the rapid developments and changes in the external environment, with the information and scientific foundations it provides in the allocation of indirect costs and the accuracy in measuring the cost from the start of the project planning process up to the production process and indicating the extent of its impact on decisions Pricing in a way that contributes to the rationalization of pricing decisions in economic units in the light of intense competition and the multiplicity of alternatives.
Hydrophobic silica aerogels were successfully preparation by an ambient pressure drying method from sodium silicate (Na2SiO3) with different pH values (5, 6, 7, 8, 9 and 10). In this study, acidic HCl (1M), a basic NH4OH (1M) were selected as a catalyst to perform the surface modification in a TMCS (trimethylchlorosilane) solution. The surface chemical modification of the aerogels was assured by the Fourier transform infrared (FTIR) spectroscopic studies. Other physical properties, such as pore volume and pore size and specific surface area were determined by Brunauer-Emmett- Teller (BET) method. The effect of pH values on the bulk density of aerogel. The sol–gel parameter pH value in the sol, have marked effects on the physical proper
... Show MoreDomestic Technique in Batik Art
Objectives: The study aims to evaluate patients’ performance toward insulin injection after training program to
identify the variation in skill of patients in insulin injection technique with regard to some variable (i.e.
educational level and duration of insulin injection.
Methodology: A quasi experimental study has been conducted on diabetic patients.
An observational checklist had been prepared which consisted of 4 main areas with 37 sub-items, which are
syringe preparation for injection, insulin drawing; skin preparation for injection and insulin injection. Each of the
sub-items has 2 options yes or no. One score for positive answer and zero for no.
The sample of the study consisted of (n =30) males and females
A substantial matter to confidential messages' interchange through the internet is transmission of information safely. For example, digital products' consumers and producers are keen for knowing those products are genuine and must be distinguished from worthless products. Encryption's science can be defined as the technique to embed the data in an images file, audio or videos in a style which should be met the safety requirements. Steganography is a portion of data concealment science that aiming to be reached a coveted security scale in the interchange of private not clear commercial and military data. This research offers a novel technique for steganography based on hiding data inside the clusters that resulted from fuzzy clustering. T
... Show MoreBackground: Radiopacity is one of the prerequisites for dental materials, especially for composite restorations. It's essential for easy detection of secondary dental caries as well as observation of the radiographic interface between the materials and tooth structure. The aim of this study to assess the difference in radiopacity of different resin composites using a digital x-ray system. Materials and methods: Ten specimens (6mm diameter and 1mm thickness) of three types of composite resins (Evetric, Estelite Sigma Quick,and G-aenial) were fabricated using Teflon mold. The radiopacity was assessed using dental radiography equipment in combination with a phosphor plate digital system and a grey scale value aluminum step wedge with thickness
... Show More