The fast evolution of cyberattacks in the Internet of Things (IoT) area, presents new security challenges concerning Zero Day (ZD) attacks, due to the growth of both numbers and the diversity of new cyberattacks. Furthermore, Intrusion Detection System (IDSs) relying on a dataset of historical or signature‐based datasets often perform poorly in ZD detection. A new technique for detecting zero‐day (ZD) attacks in IoT‐based Conventional Spiking Neural Networks (CSNN), termed ZD‐CSNN, is proposed. The model comprises three key levels: (1) Data Pre‐processing, in this level a thorough cleaning process is applied to the CIC IoT Dataset 2023, which contains both malicious and the most recent attack patterns in network traffic, ensuring data quality for analysis, (2) CSNN‐based Detection, where outlier identification is conducted by comparing two dataset groups (the normal set and the attack set) within the same time period to enhance anomaly detection and (3) In the evaluation level, the detection performance of the proposed model is assessed by comparing it with two benchmark models: ZD‐Deep Learning (ZD‐DL) and ZD‐ Convolutional Neural Network (ZD‐CNN). The implementation results demonstrate that ZD‐ CSNN achieves superior accuracy in detecting zero‐day attacks compared to both ZD‐DL and ZD‐CNN.
The analysis of the root cause techniques is a reasonable option to be made to assess the root causes of the funding of construction projects. There are a variety of issues related to financing in construction industries in Iraq. The root,cause analysis is the impact of security and social conditions on financial funding. Variety tools of root cause analysis have originated from literature, as common methods for the detection of root causes. The purpose of this study was to identify and diagnose causes that lead to obstruction of financial funding in the construction projects in the republic of Iraq from the contractors' point of view and their interaction with a number of variables. The study diagnosed nine causes of fi
... Show MoreAn atomic force microscope (AFM) technique is utilized to investigate the polystyrene (PS) impact upon the morphological properties of the outer as well as inner surface of poly vinyl chloride (PVC) porous fibers. Noticeable a new shape of the nodules at the outer and inner surfaces, namely "Crater nodules", has been observed. The fibers surface images have seen to be regular nodular texture at the skin of the inner and outer surfaces at low PS content. At PS content of 6 wt.%, the nodules structure was varied from Crater shape to stripe. While with increasing of PS content, the pore density reduces as a result of increasing the size of the pore at the fiber surface. Moreover, the test of 3D-AFM images shows that the roughness of both su
... Show MoreThe research aims to demonstrate the impact of tax techniques on the quality of services provided to income taxpayers by studying the correlational and influencing relationships between the exploited variable (tax techniques) and the dependent variable (the quality of services provided to income taxpayers), and in line with the research objectives, the main hypothesis of the research was formulated (there is a relationship Significance between tax techniques and the quality of services provided to income taxpayers) a number of sub-hypotheses emerged from this hypothesis that were stated in the research methodology, and a number of conclusions were reached, the most important of which were (through the use of the correlation coeff
... Show Moreملخص البحث
تبحث الدراسھ عن تنفیذ افضل لمفھوم التعلم مدى الحیاة كھیكل موجھ للسیاسة التربویة في العراق بشكل عام وفي
التعلیم العالي بشكل خاص. تحدد الدراسة استراتجیات التعلم مدى الحیاة وتناقش اھمیتھ وسماتھ الرئیسیة لتسھیل
الوصول الى فرص تعلم متمیز و ملائم لحاجات الطلبة مدى الحیاة، كما تناقش دور الجامعة في تحقیق ھذا الھدف.
Since there is no market for bond issuance by companies in the Iraqi market and the difficulty of borrowing, companies must resort to proprietary financing to finance their investments. However, in the framework of the literature of financial management, the type of financing used by the company sends signals to investors and therefore reflected on the market value. Therefore, the problem of the study revolves around the variables of the study (Equity financing within the framework the signal theory, price of common stock in the Iraqi market).
The study aims to verify the impact of the capital increase through the issuance of new stock on the price of
... Show MoreThe current study aims to overcome the conflicts facing the company in its way of staying and continuing to maintain its performance excellent in light of the intense competition, which made it seek to find strong ways and links with its customers through electronic communication using electronic platforms, and this put confidence and safety in The place of suspicion and fear of not fulfilling credibility or violating the privacy, so this research comes to answer about the question: “Can the company achieve an excellent performance by relying on the customer's electronic confidence?”.
The study followed the descriptive and analytical approaches by providing a virtual model and testing the zero hypotheses, which stipulat
... Show MorePersuasion is a process studied by many scholars from the Greek time until the present. One persuasion strategy is metadiscourse, which refers to the writers' awareness of their text, the way they present themselves to the readers. The writers use metadiscourse markers to help the readers understand the real meaning of the text (Hyland 2005). The paper carries out a qualitative and quantitative analysis of the employment of persuasive metadiscourse markers in two English trade agreements and two Arabic agreements has provided in terms of Hyland's (2005) model of interactive and interactional markers. The aim is to find out whether all types of metadiscourse markers are used or not, and also to see whether English or Arabic employs
... Show MoreIn this paper, we investigate two stress-strength models (Bounded and Series) in systems reliability based on Generalized Inverse Rayleigh distribution. To obtain some estimates of shrinkage estimators, Bayesian methods under informative and non-informative assumptions are used. For comparison of the presented methods, Monte Carlo simulations based on the Mean squared Error criteria are applied.
Information security in data storage and transmission is increasingly important. On the other hand, images are used in many procedures. Therefore, preventing unauthorized access to image data is crucial by encrypting images to protect sensitive data or privacy. The methods and algorithms for masking or encoding images vary from simple spatial-domain methods to frequency-domain methods, which are the most complex and reliable. In this paper, a new cryptographic system based on the random key generator hybridization methodology by taking advantage of the properties of Discrete Cosine Transform (DCT) to generate an indefinite set of random keys and taking advantage of the low-frequency region coefficients after the DCT stage to pass them to
... Show More