The fast evolution of cyberattacks in the Internet of Things (IoT) area, presents new security challenges concerning Zero Day (ZD) attacks, due to the growth of both numbers and the diversity of new cyberattacks. Furthermore, Intrusion Detection System (IDSs) relying on a dataset of historical or signature‐based datasets often perform poorly in ZD detection. A new technique for detecting zero‐day (ZD) attacks in IoT‐based Conventional Spiking Neural Networks (CSNN), termed ZD‐CSNN, is proposed. The model comprises three key levels: (1) Data Pre‐processing, in this level a thorough cleaning process is applied to the CIC IoT Dataset 2023, which contains both malicious and the most recent attack patterns in network traffic, ensuring data quality for analysis, (2) CSNN‐based Detection, where outlier identification is conducted by comparing two dataset groups (the normal set and the attack set) within the same time period to enhance anomaly detection and (3) In the evaluation level, the detection performance of the proposed model is assessed by comparing it with two benchmark models: ZD‐Deep Learning (ZD‐DL) and ZD‐ Convolutional Neural Network (ZD‐CNN). The implementation results demonstrate that ZD‐ CSNN achieves superior accuracy in detecting zero‐day attacks compared to both ZD‐DL and ZD‐CNN.
Praise be to God, Lord of the worlds, and prayers and peace be upon our master Muhammad and upon his family and companions.
And after:
Muslim scholars have fought in the extent of regard to these interests, each according to his opinion and according to his evaluation, and his consideration of this interest, but it remains important that the legislation in them needs more precaution and caution against the predominance of passions, because the passions often decorate spoilers so they see an interest, so practical application must To realize the spirit of Islamic Sharia in its entirety of its rulings, and the preponderance between the interests and evils that prevail in our societies, which c
... Show MoreThe achievement of world peace is a humanitarian demand that humanity has sought since its existence. Despite the international and regional efforts to achieve this demand, it is still reaching its desired ambitions if conflicts, contradictions, and internal and external wars continue to justify us clearly in terms of ethnic, religious and sectarian conflict. The revolution of informatics and the impact of globalization opened a new era of communication and openness and the negative and positive impact of others, which re-published and distributed values, ideas and new cultures Some of them carries extremist ideas urging violence and destruction and other abolition, it became necessary to follow policies and reward The culture of peace,
... Show MoreAbstract
The current research aims to know the reality of the research's coefficients, to know correlation and effectiveness between the organizational Agility and high performance . The current research has been applied on the official banks , including a sample of senior administration members (120) ; besides , the research has used questionnaire that being considered as the main tool for gathering information and data . It includes 59 questions in addition to the personal interviews program as to support the questionnaire and to fulfill a great deal of reality. It has been anal
... Show MoreThe alternating direction implicit method (ADI) is a common classical numerical method that was first introduced to solve the heat equation in two or more spatial dimensions and can also be used to solve parabolic and elliptic partial differential equations as well. In this paper, We introduce an improvement to the alternating direction implicit (ADI) method to get an equivalent scheme to Crank-Nicolson differences scheme in two dimensions with the main feature of ADI method. The new scheme can be solved by similar ADI algorithm with some modifications. A numerical example was provided to support the theoretical results in the research.
Shadow detection and removal is an important task when dealing with color outdoor images. Shadows are generated by a local and relative absence of light. Shadows are, first of all, a local decrease in the amount of light that reaches a surface. Secondly, they are a local change in the amount of light rejected by a surface toward the observer. Most shadow detection and segmentation methods are based on image analysis. However, some factors will affect the detection result due to the complexity of the circumstances. In this paper a method of segmentation test present to detect shadows from an image and a function concept is used to remove the shadow from an image.
In this work, the effect of different particle size on the nonlinear optical properties of silver nanoparticles in de-ionized water was studied. The experimental observation of the far field diffraction patterns by CCD camera in two and three dimensions. The maximum change of nonlinear refractive index and the relative phase shift were calculated. The self-defocusing technique was used with a continuous-wave radiation from DPSS Blue laser .The wavelength is 473 nm with an output power of 270 mW. All the Ag colloids samples containing the sizes 15, 30, 50, and 70 nm of silver nanoparticles used in the study were chemically prepared. It was found that the nonlinear refractive index is a particle size dependent and of the order of 10-7 cm2/
... Show MoreEtoricoxib (EXB) is a highly selective cox-2 inhibitor which belongs to the non-steroidal anti-inflammatory drug (NSAID). EXB is a class II drug according to the biopharmaceutical classification system (BCS), which possess a very low aqueous solubility in water. In the present study, many trials were made to improve the aqueous solubility and dissolution rate of EXB by solid dispersion technique.
Eighteenth EXB formulas were formulated as a solid dispersion using a variety of hydrophilic polymers (as carriers) including poloxamer 407 (PXM 407), poloxamer 188 (PXM 188) and polyethylene glycol 4000 (PEG 4000) at different drug: polymer ratios (1:1, 1:3 and 1:5). These formulas were prepared by two methods; solvent
... Show MoreThese days, it is crucial to discern between different types of human behavior, and artificial intelligence techniques play a big part in that. The characteristics of the feedforward artificial neural network (FANN) algorithm and the genetic algorithm have been combined to create an important working mechanism that aids in this field. The proposed system can be used for essential tasks in life, such as analysis, automation, control, recognition, and other tasks. Crossover and mutation are the two primary mechanisms used by the genetic algorithm in the proposed system to replace the back propagation process in ANN. While the feedforward artificial neural network technique is focused on input processing, this should be based on the proce
... Show MoreBimetallic Au –Pt catalysts supporting TiO2 were synthesised using two methods; sol immobilization and impregnation methods. The prepared catalyst underwent a thermal treatment process at 400◦ C, while the reduction reaction under the same condition was done and the obtained catalysts were identified with transmission electron microscopy (TEM) and energy-dispersive spectroscopy (EDS). It has been found that the prepared catalysts have a dimension around 2.5 nm and the particles have uniform orders leading to high dispersion of platinum molecules .The prepared catalysts have been examined as efficient photocatalysts to degrade the Crystal violet dye under UV-light. The optimum values of Bimetallic Au –Pt catalysts supp
... Show More