The prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices
... Show MoreThe key objective of the study is to understand the best processes that are currently used in managing talent in Australian higher education (AHE) and design a quantitative measurement of talent management processes (TMPs) for the higher education (HE) sector.
The three qualitative multi-method studies that are commonly used in empirical studies, namely, brainstorming, focus group discussions and semi-structured individual interviews were considered. Twenty
Permanent deformation, fatigue and thermal cracking are the three typical distresses of flexible pavement. Using hydrated lime (HL) into the conventional limestone mineral additive has been widely practiced, including in Europe, to improve the mechanical properties of hot mix asphalt (HMA) concrete and as the result the durability of the constructed pavement. Large number of experimental studies have been reported to find the optimum addition of HL for the improvement on HMA concrete mechanical properties, moisture susceptibility and fatigue resistance. Pavement in service is under complex thermomechanical stress-strain conditions due to coupled atmospheric and surrounding environment temperature variation and the traffic loading. To predic
... Show MoreDocument source identification in printer forensics involves determining the origin of a printed document based on characteristics such as the printer model, serial number, defects, or unique printing artifacts. This process is crucial in forensic investigations, particularly in cases involving counterfeit documents or unauthorized printing. However, consistent pattern identification across various printer types remains challenging, especially when efforts are made to alter printer-generated artifacts. Machine learning models are often used in these tasks, but selecting discriminative features while minimizing noise is essential. Traditional KNN classifiers require a careful selection of distance metrics to capture relevant printing
... Show MoreThe study aimed at designing a training program by using training for the anaerobic differential threshold stand and the effects of those trainings on the variables of (Concentration of Lactic Acid and LDH Enzyme, VO2 MaX and Cortisol Hormone). The Researchers used the experimental program with one-group style. Also, they used a sample with (8) men-players in a (free 400 m men-runners) and they used many instruments and procedures, most notably the training-program prepared for 10 weeks and for 3 training units weekly, (70-90 min) for each unit. They used the training intensity from 85-100% of the player's ability. After finishing the training program and doing some pre-tests and post-tests then statistically checking the results, the resea
... Show MoreObjective: preparing exercises for the third intensity zone for strength and speed for the legs, and identifying their effect on some physiological and biochemical indicators for (the level of lactic acid concentration, the concentration of sodium bicarbonate, the concentration level of (potassium K+) and (sodium Na+) in the blood, and the number of breathing times (RF) Research methodology: the experimental research method was adopted by designing the experimental and control groups on a sample of Army Sports Club players amounting to (16) players, deliberately selected (100%) from their community using a comprehensive enumeration method, and then divided into two groups of equal number, After determining the tests for physiologica
... Show MoreOften requires the investor to know the result of the company's activity contribute to the investor or by wanting to invest in them because profit or loss of the company affect positively or negatively in the price of shares of the company and with the end of the fiscal year delayed companies often to issue its financial statements after it is approved and audited by an observer External Auditor, From here came the idea of research that appears to stakeholders of financial statements proactive appear, including actual figures for earlier stages have been prepared lists about lists and planned by the administration reflect the results of its phase remainder of the year as if they are (half a year or season or month) to offer At the
... Show More