The fast evolution of cyberattacks in the Internet of Things (IoT) area, presents new security challenges concerning Zero Day (ZD) attacks, due to the growth of both numbers and the diversity of new cyberattacks. Furthermore, Intrusion Detection System (IDSs) relying on a dataset of historical or signature‐based datasets often perform poorly in ZD detection. A new technique for detecting zero‐day (ZD) attacks in IoT‐based Conventional Spiking Neural Networks (CSNN), termed ZD‐CSNN, is proposed. The model comprises three key levels: (1) Data Pre‐processing, in this level a thorough cleaning process is applied to the CIC IoT Dataset 2023, which contains both malicious and the most recent attack patterns in network traffic, ensuring data quality for analysis, (2) CSNN‐based Detection, where outlier identification is conducted by comparing two dataset groups (the normal set and the attack set) within the same time period to enhance anomaly detection and (3) In the evaluation level, the detection performance of the proposed model is assessed by comparing it with two benchmark models: ZD‐Deep Learning (ZD‐DL) and ZD‐ Convolutional Neural Network (ZD‐CNN). The implementation results demonstrate that ZD‐ CSNN achieves superior accuracy in detecting zero‐day attacks compared to both ZD‐DL and ZD‐CNN.
The present study deals with the synthesis of four different azo-azomethine derivatives; this is done by two steps; the first step is diazotization of sulfonamides (sulfanilamide, sulfacetamide, sulfamethoxazole, and sulfadiazine) separately, followed by the second step; the coupling reaction of diazotized compounds with isatin bis-Schiff base named 3-((4-nitrobenzylidene) hydrazono)indolin-2-one. The later one (bis-Schiff base) was synthesized by the reaction of 3-hydrazono-indolin-2-one with p-nitrobenzaldehyde. The chemical structures of newly synthesized compounds were approved on the basis of their FTIR, 1H-NMR, and CHNS elemental analysis data results. The synthesized azo compounds were tested in vitro for their antimicrobial potentia
... Show More(3) (PDF) Theoretical investigation of charge transfer at N3 sensitized molecule dye contact with TiO2 and ZnO semiconductor. Available from: https://www.researchgate.net/publication/362773606_Theoretical_investigation_of_charge_transfer_at_N3_sensitized_molecule_dye_contact_with_TiO2_and_ZnO_semiconductor [accessed May 01 2023].
The use of Near-Surface Mounted (NSM) Carbon-Fiber-Reinforced Polymer (CFRP) strips is an efficient technology for increasing flexural and shear strength or for repairing damaged Reinforced Concrete (RC) members. This strengthening method is a promising technology. However, the thin layer of concrete covering the NSM-CFRP strips is not adequate to resist heat effect when directly exposed to a fire or at a high temperature. There is clear evidence that the strength and stiffness of CFRPs severely deteriorate at high temperatures. Therefore, in terms of fire resistance, the NSM technique has a significant defect. Thus, it is very important to develop a set of efficient fire protection systems to overcome these disadvantages. This pape
... Show MoreThis paper reports the effect of Mg doping on structural and optical properties of ZnO prepared by pulse laser deposition (PLD). The films deposited on glass substrate using Nd:YAG laser (1064 nm) as the light source. The structure and optical properties were characterized by X-ray diffraction (XRD) and transmittance measurements. The films grown have a polycrystalline wurtzite structure and high transmission in the UV-Vis (300-900) nm. The optical energy gap of ZnO:Mg thin films could be controlled between (3.2eV and 3.9eV). The refractive index of ZnO:Mg thin films decreases with Mg doping. The extinction coefficient and the complex dielectric constant were also investigate.
Cryptography algorithms play a critical role in information technology against various attacks witnessed in the digital era. Many studies and algorithms are done to achieve security issues for information systems. The high complexity of computational operations characterizes the traditional cryptography algorithms. On the other hand, lightweight algorithms are the way to solve most of the security issues that encounter applying traditional cryptography in constrained devices. However, a symmetric cipher is widely applied for ensuring the security of data communication in constraint devices. In this study, we proposed a hybrid algorithm based on two cryptography algorithms PRESENT and Salsa20. Also, a 2D logistic map of a chaotic system is a
... Show MoreBackground: Health education was put as one of the components of primary health care elements and was recognized as a fundamental tool to the attainment of health for all
Objective: To evaluate the Knowledge, attitude regarding health education & to find out if there is any association between the gathered data and certain variables (age, gender, educational level, occupation). Methods: A Cross-sectional study done at Al Mustansyryia Primary Health Care Center from the 1st of January to 1st of May 2016. All patients attending the Primary Health Care Centers who were above 18 years of age and willing to participate in the research (303) were included in t
... Show MoreSilver sulfide and the thin films Ag2Se0.8Te0.2 and Ag2Se0.8S0.2 created by the thermal evaporation process on glass with a thickness of 350 nm were examined for their structural and optical properties. These films were made at a temperature of 300 K. According to the X-ray diffraction investigation, the films are polycrystalline and have an initial orthorhombic phase. Using X-ray diffraction research, the crystallization orientations of Ag2Se and Ag2Se0.8Te0.2 & Ag2Se0.8S0.2 (23.304, 49.91) were discovered (XRD). As (Ag2Se and Ag2Se0.8Te0.2 & Ag2Se0.8S0.2) absorption coefficient fell from (470-774) nm, the optical band gap increased (2.15 & 2 & 2.25eV). For instance, the characteristics of thin films made of Ag2Se0.8Te0.2 and Ag2Se0.8S0.2
... Show MoreAbstract
The aim of this work is to create a power control system for wind turbines based on fuzzy logic. Three power control loop was considered including: changing the pitch angle of the blade, changing the length of the blade and turning the nacelle. The stochastic law was given for changes and instant inaccurate assessment of wind conditions changes. Two different algorithms were used for fuzzy inference in the control loop, the Mamdani and Larsen algorithms. These two different algorithms are materialized and developed in this study in Matlab-Fuzzy logic toolbox which has been practically implemented using necessary intelligent control system in electrical engineerin
... Show More
