The fast evolution of cyberattacks in the Internet of Things (IoT) area, presents new security challenges concerning Zero Day (ZD) attacks, due to the growth of both numbers and the diversity of new cyberattacks. Furthermore, Intrusion Detection System (IDSs) relying on a dataset of historical or signature‐based datasets often perform poorly in ZD detection. A new technique for detecting zero‐day (ZD) attacks in IoT‐based Conventional Spiking Neural Networks (CSNN), termed ZD‐CSNN, is proposed. The model comprises three key levels: (1) Data Pre‐processing, in this level a thorough cleaning process is applied to the CIC IoT Dataset 2023, which contains both malicious and the most recent attack patterns in network traffic, ensuring data quality for analysis, (2) CSNN‐based Detection, where outlier identification is conducted by comparing two dataset groups (the normal set and the attack set) within the same time period to enhance anomaly detection and (3) In the evaluation level, the detection performance of the proposed model is assessed by comparing it with two benchmark models: ZD‐Deep Learning (ZD‐DL) and ZD‐ Convolutional Neural Network (ZD‐CNN). The implementation results demonstrate that ZD‐ CSNN achieves superior accuracy in detecting zero‐day attacks compared to both ZD‐DL and ZD‐CNN.
to study the discribrion and the pollution in the environment in the south of baghdad samples of waste water from industrail units using the mercury in its process also
The study of the subject of (Egyptian public opinion on the Libyan revolution) came to reveal the role of Egyptian public opinion in mobilizing and solidarity for the masses. With the events witnessed by the Arab countries before the revolution, this was evident by the people 's attitudes towards the tripartite aggression against Egypt in 1956, and the June 1967 war, and the most recent what the Egyptian people showed towards the Libyan revolution. The Egyptian press followed the completion of the arms deal with France and revealed the ability of the Libyan negotiator to achieve moral gain, supported by Egyptian support to thwart the United States intentions to arm "Israel" similarly. The Egyptian people expressed a love for peace and su
... Show MoreIrrigation has significant role in endodontic treatment, many types of antimicrobial irrigation solutions have been used, but due to the ineffectiveness, safety concerns and side effects of this irrigation, the herbal alternatives for endodontic irrigants might be beneficial. Objectives This study compared the in vitro effectiveness of tea tree oil and clove oil as possible irrigants in endodontics against Enterococcus faecalis in comparison with 3% Sodium hypochlorite. Materials and Methods E. faecalis was isolated from patients in need for endodontic treatment; VITEK was employed for E. faecalis isolate conformation. Muller Hinton agar was prepared with 100μl of freshly prepared suspension of E.faecalis. Wells of 6mm diameter and 4mm dep
... Show MoreIrrigation has significant role in endodontic treatment, many types of antimicrobial irrigation solutions have been used, but due to the ineffectiveness, safety concerns and side effects of this irrigation, the herbal alternatives for endodontic irrigants might be beneficial. Objectives This study compared the in vitro effectiveness of tea tree oil and clove oil as possible irrigants in endodontics against Enterococcus faecalis in comparison with 3% Sodium hypochlorite. Materials and Methods E. faecalis was isolated from patients in need for endodontic treatment; VITEK was employed for E. faecalis isolate conformation. Muller Hinton agar was prepared with 100μl of freshly prepared suspension of E.faecalis. Wells of 6mm diameter and 4mm dep
... Show MoreBackground: Irrigation of the canal system permits removal of residual tissue in the canal anatomy that cannot be reached by instrumentation of the main canals so the aim of this study was to compare and evaluate the efficiency of conventional irrigation system, endoactivator sonic irrigation system,P5 Newtron Satelec passive ultrasonic irrigation and Endovac irrigation system in removing of dentin debris at three levels of root canals and to compare the percentage of dentin debris among the three levels for each irrigation system. Materials and methods: Forty extracted premolars with approximately straight single root canals were randomly distributed into 4 tested groups of 10 teeth each. All canals were prepared with Protaper Universal ha
... Show MoreStenography is the art of hiding the very presence of communication by embedding secret message into innocuous looking cover document, such as digital image, videos, sound files, and other computer files that contain perceptually irrelevant or redundant information as covers or carriers to hide secret messages.
In this paper, a new Least Significant Bit (LSB) nonsequential embedding technique in wave audio files is introduced. To support the immunity of proposed hiding system, and in order to recover some weak aspect inherent with the pure implementation of stego-systems, some auxiliary processes were suggested and investigated including the use of hidden text jumping process and stream ciphering algorithm. Besides, the suggested
... Show MoreTo achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DN
... Show MoreThe confirming of security and confidentiality of multimedia data is a serious challenge through the growing dependence on digital communication. This paper offers a new image cryptography based on the Chebyshev chaos polynomials map, via employing the randomness characteristic of chaos concept to improve security. The suggested method includes block shuffling, dynamic offset chaos key production, inter-layer XOR, and block 90 degree rotations to disorder the correlations intrinsic in image. The method is aimed for efficiency and scalability, accomplishing complexity order for n-pixels over specific cipher rounds. The experiment outcomes depict great resistant to cryptanalysis attacks, containing statistical, differential and brut
... Show MoreIn this work a chemical sensor was built by using Plane Wave Expansion (PWE) modeling technique by filling the core of 1550 hollow core photonic crystal fiber with chloroform that has different concentrations after being diluted with distilled water. The minimum photonic bandgap width is.0003 and .0005 rad/sec with 19 and 7 cells respectively and a concentration of chloroform that filled these two fibers is 75%.