Preferred Language
Articles
/
G0LS6JoBMeyNPGM3YNbO
An Effective Technique of Zero‐Day Attack Detection in the Internet of Things Network Based on the Conventional Spike Neural Network Learning Method
...Show More Authors
ABSTRACT<p>The fast evolution of cyberattacks in the Internet of Things (IoT) area, presents new security challenges concerning Zero Day (ZD) attacks, due to the growth of both numbers and the diversity of new cyberattacks. Furthermore, Intrusion Detection System (IDSs) relying on a dataset of historical or signature‐based datasets often perform poorly in ZD detection. A new technique for detecting zero‐day (ZD) attacks in IoT‐based Conventional Spiking Neural Networks (CSNN), termed ZD‐CSNN, is proposed. The model comprises three key levels: (1) Data Pre‐processing, in this level a thorough cleaning process is applied to the CIC IoT Dataset 2023, which contains both malicious and the most recent attack patterns in network traffic, ensuring data quality for analysis, (2) CSNN‐based Detection, where outlier identification is conducted by comparing two dataset groups (the normal set and the attack set) within the same time period to enhance anomaly detection and (3) In the evaluation level, the detection performance of the proposed model is assessed by comparing it with two benchmark models: ZD‐Deep Learning (ZD‐DL) and ZD‐ Convolutional Neural Network (ZD‐CNN). The implementation results demonstrate that ZD‐ CSNN achieves superior accuracy in detecting zero‐day attacks compared to both ZD‐DL and ZD‐CNN.</p>
Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Mar 10 2021
Journal Name
Baghdad Science Journal
study the effects of the polluted waste water on the environment
...Show More Authors

to study the discribrion and the pollution in the environment in the south of baghdad samples of waste water from industrail units using the mercury in its process also

View Publication Preview PDF
Publication Date
Wed Dec 30 2015
Journal Name
College Of Islamic Sciences
The position of the Egyptian public opinion on the Mibi revolution
...Show More Authors

The study of the subject of (Egyptian public opinion on the Libyan revolution) came to reveal the role of Egyptian public opinion in mobilizing and solidarity for the masses. With the events witnessed by the Arab countries before the revolution, this was evident by the people 's attitudes towards the tripartite aggression against Egypt in 1956, and the June 1967 war, and the most recent what the Egyptian people showed towards the Libyan revolution. The Egyptian press followed the completion of the arms deal with France and revealed the ability of the Libyan negotiator to achieve moral gain, supported by Egyptian support to thwart the United States intentions to arm "Israel" similarly. The Egyptian people expressed a love for peace and su

... Show More
View Publication Preview PDF
Publication Date
Wed Jun 22 2022
Journal Name
Journal Of Oral &dental Research
The Antibacterial Effect of Tea Tree Oil, Clove Oil and 3% Sodium Hypochlorite against Enterococcus faecalis in Endodontics: An in vitro Study
...Show More Authors

Irrigation has significant role in endodontic treatment, many types of antimicrobial irrigation solutions have been used, but due to the ineffectiveness, safety concerns and side effects of this irrigation, the herbal alternatives for endodontic irrigants might be beneficial. Objectives This study compared the in vitro effectiveness of tea tree oil and clove oil as possible irrigants in endodontics against Enterococcus faecalis in comparison with 3% Sodium hypochlorite. Materials and Methods E. faecalis was isolated from patients in need for endodontic treatment; VITEK was employed for E. faecalis isolate conformation. Muller Hinton agar was prepared with 100μl of freshly prepared suspension of E.faecalis. Wells of 6mm diameter and 4mm dep

... Show More
Publication Date
Wed Jun 22 2022
Journal Name
Journal Of Oral &dental Research
The Antibacterial Effect of Tea Tree Oil, Clove Oil and 3% Sodium Hypochlorite against Enterococcus faecalis in Endodontics: An in vitro Study
...Show More Authors

Irrigation has significant role in endodontic treatment, many types of antimicrobial irrigation solutions have been used, but due to the ineffectiveness, safety concerns and side effects of this irrigation, the herbal alternatives for endodontic irrigants might be beneficial. Objectives This study compared the in vitro effectiveness of tea tree oil and clove oil as possible irrigants in endodontics against Enterococcus faecalis in comparison with 3% Sodium hypochlorite. Materials and Methods E. faecalis was isolated from patients in need for endodontic treatment; VITEK was employed for E. faecalis isolate conformation. Muller Hinton agar was prepared with 100μl of freshly prepared suspension of E.faecalis. Wells of 6mm diameter and 4mm dep

... Show More
Publication Date
Sat Feb 28 2026
Journal Name
Journal Of Baghdad College Of Dentistry
A study to compare the cleaning efficiency of different irrigation systems for macro debris removal in instrumented canals (An in vitro study)
...Show More Authors

Background: Irrigation of the canal system permits removal of residual tissue in the canal anatomy that cannot be reached by instrumentation of the main canals so the aim of this study was to compare and evaluate the efficiency of conventional irrigation system, endoactivator sonic irrigation system,P5 Newtron Satelec passive ultrasonic irrigation and Endovac irrigation system in removing of dentin debris at three levels of root canals and to compare the percentage of dentin debris among the three levels for each irrigation system. Materials and methods: Forty extracted premolars with approximately straight single root canals were randomly distributed into 4 tested groups of 10 teeth each. All canals were prepared with Protaper Universal ha

... Show More
View Publication Preview PDF
Publication Date
Sun Jan 01 2023
Journal Name
3rd International Conference On Smart Cities And Sustainable Planning
Towards sustainable tourism: EIA of natural environment in Sawa lake using RIAM method
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Wed Feb 29 2012
Journal Name
Al-khwarizmi Engineering Journal
A New Audio Steganography System Based on Auto-Key Generator
...Show More Authors

Stenography is the art of hiding the very presence of communication by embedding secret message into innocuous looking cover document, such as digital image, videos, sound files, and other computer files that contain perceptually irrelevant or redundant information as covers or carriers to hide secret messages.

In this paper, a new Least Significant Bit (LSB) nonsequential embedding technique in wave audio files is introduced. To support the immunity of proposed hiding system, and in order to recover some weak aspect inherent with the pure implementation of stego-systems, some auxiliary processes were suggested and investigated including the use of hidden text jumping process and stream ciphering algorithm. Besides, the suggested

... Show More
View Publication Preview PDF
Publication Date
Tue Aug 24 2021
Journal Name
Conference: The 5th International Multi-conference On Artificial Intelligence Technology (mcait 2021).
Text Encryption Based on DNA Cryptography, RNA, and Amino Acid
...Show More Authors

To achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DN

... Show More
Publication Date
Fri Jan 10 2025
Journal Name
International Journal Of Scientific Research In Science, Engineering And Technology
Image Cryptography Based on Chebyshev Polynomials and Transposition- Substitution Transformations
...Show More Authors

The confirming of security and confidentiality of multimedia data is a serious challenge through the growing dependence on digital communication. This paper offers a new image cryptography based on the Chebyshev chaos polynomials map, via employing the randomness characteristic of chaos concept to improve security. The suggested method includes block shuffling, dynamic offset chaos key production, inter-layer XOR, and block 90 degree rotations to disorder the correlations intrinsic in image. The method is aimed for efficiency and scalability, accomplishing  complexity order for n-pixels over specific cipher rounds. The experiment outcomes depict great resistant to cryptanalysis attacks, containing statistical, differential and brut

... Show More
View Publication
Crossref
Publication Date
Fri Feb 08 2019
Journal Name
Iraqi Journal Of Laser
Chemical Sensor Based on a Hollow-Core Photonic Crystal Fiber
...Show More Authors

In this work a chemical sensor was built by using Plane Wave Expansion (PWE) modeling technique by filling the core of 1550 hollow core photonic crystal fiber with chloroform that has different concentrations after being diluted with distilled water. The minimum photonic bandgap width is.0003 and .0005 rad/sec with 19 and 7 cells respectively and a concentration of chloroform that filled these two fibers is 75%.

View Publication Preview PDF