Preferred Language
Articles
/
G0LS6JoBMeyNPGM3YNbO
An Effective Technique of Zero‐Day Attack Detection in the Internet of Things Network Based on the Conventional Spike Neural Network Learning Method
...Show More Authors
ABSTRACT<p>The fast evolution of cyberattacks in the Internet of Things (IoT) area, presents new security challenges concerning Zero Day (ZD) attacks, due to the growth of both numbers and the diversity of new cyberattacks. Furthermore, Intrusion Detection System (IDSs) relying on a dataset of historical or signature‐based datasets often perform poorly in ZD detection. A new technique for detecting zero‐day (ZD) attacks in IoT‐based Conventional Spiking Neural Networks (CSNN), termed ZD‐CSNN, is proposed. The model comprises three key levels: (1) Data Pre‐processing, in this level a thorough cleaning process is applied to the CIC IoT Dataset 2023, which contains both malicious and the most recent attack patterns in network traffic, ensuring data quality for analysis, (2) CSNN‐based Detection, where outlier identification is conducted by comparing two dataset groups (the normal set and the attack set) within the same time period to enhance anomaly detection and (3) In the evaluation level, the detection performance of the proposed model is assessed by comparing it with two benchmark models: ZD‐Deep Learning (ZD‐DL) and ZD‐ Convolutional Neural Network (ZD‐CNN). The implementation results demonstrate that ZD‐ CSNN achieves superior accuracy in detecting zero‐day attacks compared to both ZD‐DL and ZD‐CNN.</p>
Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Aug 23 2013
Journal Name
International Journal Of Computer Applications
Image Compression based on Quadtree and Polynomial
...Show More Authors

View Publication
Crossref (3)
Crossref
Publication Date
Fri Nov 11 2022
Journal Name
Al-mansour Journal
Text Cryptography Based on Three Different Keys
...Show More Authors

Secure information transmission over the internet is becoming an important requirement in data communication. These days, authenticity, secrecy, and confidentiality are the most important concerns in securing data communication. For that reason, information hiding methods are used, such as Cryptography, Steganography and Watermarking methods, to secure data transmission, where cryptography method is used to encrypt the information in an unreadable form. At the same time, steganography covers the information within images, audio or video. Finally, watermarking is used to protect information from intruders. This paper proposed a new cryptography method by using thre

... Show More
Publication Date
Fri May 01 2020
Journal Name
Journal Of Physics: Conference Series
Pilgrims tracking and monitoring based on IoT
...Show More Authors
Abstract<p>The pilgrimage takes place in several countries around the world. The pilgrimage includes the simultaneous movement of a huge crowd of pilgrims which leads to many challenges for the pilgrimage authorities to track, monitor, and manage the crowd to minimize the chance of overcrowding’s accidents. Therefore, there is a need for an efficient monitoring and tracking system for pilgrims. This paper proposes powerful pilgrims tracking and monitoring system based on three Internet of Things (IoT) technologies; namely: Radio Frequency Identification (RFID), ZigBee, and Internet Protocol version 6 (IPv6). In addition, it requires low-cost, low-power-consumption implementation. The proposed </p> ... Show More
View Publication
Scopus (1)
Scopus Crossref
Publication Date
Fri Aug 23 2024
Journal Name
Aro-the Scientific Journal Of Koya University
Graphical User Authentication Algorithms Based on Recognition
...Show More Authors

In cyber security, the most crucial subject in information security is user authentication. Robust text-based password methods may offer a certain level of protection. Strong passwords are hard to remember, though, so people who use them frequently write them on paper or store them in file for computer .Numerous of computer systems, networks, and Internet-based environments have experimented with using graphical authentication techniques for user authentication in recent years. The two main characteristics of all graphical passwords are their security and usability. Regretfully, none of these methods could adequately address both of these factors concurrently. The ISO usability standards and associated characteristics for graphical

... Show More
View Publication Preview PDF
Scopus Clarivate Crossref
Publication Date
Wed Jan 15 2025
Journal Name
International Journal Of Cloud Computing And Database Management
Deep video understanding based on language generation
...Show More Authors

Vol. 6, Issue 1 (2025)

View Publication Preview PDF
Publication Date
Thu Aug 01 2019
Journal Name
International Journal Of Machine Learning And Computing
Emotion Recognition System Based on Hybrid Techniques
...Show More Authors

Emotion recognition has important applications in human-computer interaction. Various sources such as facial expressions and speech have been considered for interpreting human emotions. The aim of this paper is to develop an emotion recognition system from facial expressions and speech using a hybrid of machine-learning algorithms in order to enhance the overall performance of human computer communication. For facial emotion recognition, a deep convolutional neural network is used for feature extraction and classification, whereas for speech emotion recognition, the zero-crossing rate, mean, standard deviation and mel frequency cepstral coefficient features are extracted. The extracted features are then fed to a random forest classifier. In

... Show More
View Publication Preview PDF
Scopus (23)
Crossref (23)
Scopus Crossref
Publication Date
Mon Feb 04 2019
Journal Name
Iraqi Journal Of Physics
Structure dependence of gamma ray irradiation effects on polyurethane and epoxy resin studied by PAL technique
...Show More Authors

Positron annihilation lifetime (PAL) technique has been employed to
study the microstructural changes of polyurethane (PU), EUXIT 101
and epoxy risen (EP), EUXIT 60 by Gamma-ray irradiation with the
dose range (95.76 - 957.6) kGy. The size of the free volume hole and
their fraction in PU and EP were determined from ortho-positronium
lifetime component and its intensity in the measured lifetime spectra.
The results show that the irradiation causes significant changes in the
free volume hole size (Vh) and the fractional free volume (Fh), and
thereby the microstructure of PU and EP. The results indicate that
the γ-dose increases the crystallinity in the amorphous regions of PU
and increas

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Tue Oct 30 2018
Journal Name
Iraqi Journal Of Physics
Annealing effects on optical and structural properties of chromium oxide thin film deposited by PLD technique
...Show More Authors

Optical properties of chromium oxide (Cr2O3) thin films which were prepared by pulse laser deposition method, onto glass substrates. Different laser energy (500-900) mJ were used to obtain Cr2O3 thin films with thickness ranging from 177.3 to 372.4 nm were measured using Tolansky method. Then films were annealed at temperature equal to 300 °C. Absorption spectra were used to determine the absorption coefficient of the films, and the effects of the annealing temperature on the absorption coefficient were investigated. The absorption edge shifted to red range of wavelength, and the optical constants of Cr2O3 films increases as the annealing temperature increased to 300 °C. X-ray diffraction (XRD) study reveals that Cr2O3 thin films are a

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sun Jan 01 2023
Journal Name
International Journal Of Economics And Finance Studies
THE ROLE OF TARGET COST MANAGEMENT APPROACH IN REDUCING COSTS FOR THE ACHIEVEMENT OF COMPETITIVE ADVANTAGE AS A MEDIATOR: AN APPLIED STUDY OF THE IRAQI ELECTRICAL INDUSTRY
...Show More Authors

Scopus (21)
Scopus
Publication Date
Sat Oct 01 2016
Journal Name
Journal Of Economics And Administrative Sciences
The Intellectual Capital And Its Revenues On The Investment Applied Research On Sample of Banks Listed on In The Iraq Stocks Exchange
...Show More Authors

Abstract

      The changes that happened in the environment of  business have great effects upon organizations with different activities specially the banks  which requires the existence of an able opinion  resources can adapt with the changes . Accordingly importance put upon  intellectual  capital which become one of the basic resources for organizations and one of success and growth elements with the availability of expertise , skills and capability of making  essential changes in different process due to the presentation of innovations and creations of the to support banks activities .Therefore the intellectual  capital represents the more r

... Show More
View Publication Preview PDF
Crossref