Preferred Language
Articles
/
N4Z1RYYBIXToZYALYIEY
Intrusion detection method for internet of things based on the spiking neural network and decision tree method
...Show More Authors

The prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices’ power usage. Also, a rand order code (ROC) technique is used with SNN to detect cyber-attacks. The proposed method is evaluated by comparing its performance with two other methods: IDS-DNN and IDS-SNNTLF by using three performance metrics: detection accuracy, latency, and energy usage. The simulation results have shown that IDS-SNNDT attained low power usage and less latency in comparison with IDS-DNN and IDS-SNNTLF methods. Also, IDS-SNNDT has achieved high detection accuracy for cyber-attacks in contrast with IDS-SNNTLF.

Scopus Crossref
Publication Date
Tue Feb 26 2019
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Use the Style of the Activity Based Cost time Drivine (TDABC) and its Impact on the Untapped Resources: Empirical study in the General Company for Textile Industries - Wasit
...Show More Authors

   The research aims to identify the importance of using the style of the cost on the basis of activity -oriented in time TDABC and its role in determining the cost of products more equitably and thus its impact on the policy of allocation of resources through the reverse of the changes that occur on an ongoing basis in the specification of the products and thus the change in the nature and type of operations . The research was conducted at the General Company for Textile Industries Wasit / knitting socks factory was based on research into the hypothesis main of that ( possible to calculate the cost of activities that cause the production through the time it takes to run these activities can then be re- distributed product cost

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Jan 30 2025
Journal Name
Iraqi Journal Of Science
Improving the Reliability of Evolutionary Algorithm for Complex Detection in Noisy Protein-Protein Interaction Networks
...Show More Authors

Evolutionary algorithms are better than heuristic algorithms at finding protein complexes in protein-protein interaction networks (PPINs). Many of these algorithms depend on their standard frameworks, which are based on topology. Further, many of these algorithms have been exclusively examined on networks with only reliable interaction data. The main objective of this paper is to extend the design of the canonical and topological-based evolutionary algorithms suggested in the literature to cope with noisy PPINs. The design of the evolutionary algorithm is extended based on the functional domain of the proteins rather than on the topological domain of the PPIN. The gene ontology annotation in each molecular function, biological proce

... Show More
View Publication
Scopus Crossref
Publication Date
Tue Jun 01 2021
Journal Name
Baghdad Science Journal
Improved Image Security in Internet of Thing (IOT) Using Multiple Key AES
...Show More Authors

Image is an important digital information that used in many internet of things (IoT) applications such as transport, healthcare, agriculture, military, vehicles and wildlife. etc. Also, any image has very important characteristic such as large size, strong correlation and huge redundancy, therefore, encrypting it by using single key Advanced Encryption Standard (AES) through IoT communication technologies makes it vulnerable to many threats, thus, the pixels that have the same values will be encrypted to another pixels that have same values when they use the same key. The contribution of this work is to increase the security of transferred image. This paper proposed multiple key AES algorithm (MECCAES) to improve the security of the tran

... Show More
View Publication Preview PDF
Scopus (19)
Crossref (8)
Scopus Clarivate Crossref
Publication Date
Tue Apr 30 2024
Journal Name
Modern Sport
Decision-making and its relationship to some basic offensive skills in female students’ basketball
...Show More Authors

هدفت الدراسة الى التعرف على درجة اتخاذ القرار وعلاقتها ببعض المهارات  الأساسية الهجومية بكرة السلة للطالبات ، اذ يعد اتخاذ القرار قدرة الفرد على التوصل لحل مشكلة اعتراضية أو موقف محير، وذلك باختيار حل من البدائل الموجودة أو المبتكرة، وهذا الاختيار يعتمد على المعلومات التي جمعها الفرد حول المشكلة وعلى القيم والعادات والخبرة والتعليم والمهارات الفردية وتمتاز لعبة كرة السلة بوجود الكثير من المواقف المتغ

... Show More
Crossref (1)
Crossref
Publication Date
Thu Jan 23 2020
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Exploitation decision and impact factors in improvement in stock exchange markets proportion investment small
...Show More Authors

The purpose of the search definition on factors superior this whoever  impact on the improvement the exploitation  decision this  detect on stock exchange markets  assumption , and using  questioners to data accumulate  and the Iraq market of financial papers  battleground to search annoy chose the eyeball extension (47) peoples from peoples employees on the market , and using the bought statistic program (SPSS) on input and analysis search  data , and machinate the search outputs to their group of factors internal and external which impact on exploitation  decision on financial papers markets , and the search commend on necessary rise  the incumbency direction  in the stock exchange

... Show More
View Publication Preview PDF
Publication Date
Fri Dec 01 2017
Journal Name
Journal Of Economics And Administrative Sciences
Real- time Financial reporting : Role promoting completeness and timeliness in Investment & profit distribution decision
...Show More Authors

  The accounting information that is produced by any System a user either entering or leaving, since the needs of the users began to evolve where he became the information provided by the current reporting system that does not meet their requirements in terms of users began to demand information, more quickly, and as a result of the needs of the user accounting system and the development of information and communications technology has emerged a new system (real- time reporting system), which has the ability to produce information at the moment of data gathered, it is no longer dependent on local circumstance, but this case has become a global response where the computer has become a cornerstone of the culture of the communi

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jan 01 2014
Journal Name
Ibn Al- Haitham J. Fo R Pure & Appl. Sci
Multiple Mixing Ratios of Gamma Rays Reaction 32 70 70 33 Ge p n As (, ) γ Using a2-ratio Method.
...Show More Authors

The δ-mixing of γ-transitions in 70As populated in the 32 70 70 33 Ge p n As (, ) γ reaction is calculated in the present work by using the a2-ratio methods. In one work we applied this method for two cases, the first one is for pure transition and the sacend one is for non pure transition, We take into account the experimental a2-coefficient for previous works and δ -values for one transition only.The results obtained are, in general, in a good agreement within associated errors, with those reported previously , the discrepancies that occur are due to inaccuracies existing in the experimental data of the previous works.

Publication Date
Sat Dec 01 2018
Journal Name
Al-khwarizmi Engineering Journal
Wireless Network Control System for Electro Stati Precipitator in Cement Plants
...Show More Authors

    Wireless control networks (WCNs), based on distributed control systems of wireless sensor and actuator networks, integrate four technologies: control, computer network and wireless communications. Electrostatic precipitator (ESP) in cement plants reduces the emissions from rotary kiln by 99.8% approximately. It is an important thing to change the existing systems (wireline) to wireless because of dusty and hazardous environments. In this paper, we designed a wireless control system for ESP using Truetime 2 beta 6 simulator, depending on the mathematical model that have been built using identification toolbox of Matlab v7.1.1. We also study the effect ofusing wireless network on performance and stability of the closed l

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun May 01 2022
Journal Name
Expert Systems With Applications
Novel large scale brain network models for EEG epileptic pattern generations
...Show More Authors

Background: Unlike normal EEG patterns, the epileptiform abnormal pattern is characterized by different mor phologies such as the high-frequency oscillations (HFOs) of ripples on spikes, spikes and waves, continuous and sporadic spikes, and ploy2 spikes. Several studies have reported that HFOs can be novel biomarkers in human epilepsy study. S) Method: To regenerate and investigate these patterns, we have proposed three large scale brain network models (BNM by linking the neural mass model (NMM) of Stefanescu-Jirsa 2D (S-J 2D) with our own structural con nectivity derived from the realistic biological data, so called, large-scale connectivity connectome. These models include multiple network connectivity of brain regions at different

... Show More
View Publication
Scopus (2)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Wed Mar 28 2018
Journal Name
Indian Journal Of Natural Sciences
Detection of the Main Mycotoxins in Feed of Horses in Al-Zawra'a Park and Study their Effects on Hematological Feature
...Show More Authors

Preview PDF