The prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices’ power usage. Also, a rand order code (ROC) technique is used with SNN to detect cyber-attacks. The proposed method is evaluated by comparing its performance with two other methods: IDS-DNN and IDS-SNNTLF by using three performance metrics: detection accuracy, latency, and energy usage. The simulation results have shown that IDS-SNNDT attained low power usage and less latency in comparison with IDS-DNN and IDS-SNNTLF methods. Also, IDS-SNNDT has achieved high detection accuracy for cyber-attacks in contrast with IDS-SNNTLF.
Face recognition and identity verification are now critical components of current security and verification technology. The main objective of this review is to identify the most important deep learning techniques that have contributed to the improvement in the accuracy and reliability of facial recognition systems, as well as highlighting existing problems and potential future research areas. An extensive literature review was conducted with the assistance of leading scientific databases such as IEEE Xplore, ScienceDirect, and SpringerLink and covered studies from the period 2015 to 2024. The studies of interest were related to the application of deep neural networks, i.e., CNN, Siamese, and Transformer-based models, in face recogni
... Show Moreھدف البحث الـــــى : ١ -إعداد تدریبات القوة الارتدادیة في وسطین متباینین على بعض المؤشرات الفسیولوجیة لتطویر القوة الانفجاریة ودقة مھارتي الأرسال والضرب الساحق بالكرة الطائرة . ٢ -التعرف على تأثیر تدریبات القوة الارتدادیة في وسطین متباینین على بعض المؤشرات الفسیولوجیة لتطویر القوة الانفجاریة.. ٣ -التعرف على تأثیر تدریبات القوة الارتدادیة في وسطین متباینین على دقة مھارتي الأرسال والضرب الساحق بالكرة الطائرة
... Show MoreThis study aims to recognize the most common thinking styles and level of the need for cognitive university students , the relation between thinking styles and the need for cognitive, and there are differences according to gender .The sample consists of (250) males and females university students for the academic year (2013-2014), and the researcher uses two scales;" thinking styles scale (Harison &Bramson, 1986), and the need for cognitive scale" (Cacioppo, Petty & Kao , 1996).
The results show that there is difference in the range of the prevalence of the thinking styles among university students , the scientific thinking style is the most common , the students have got the arrange level of the need for cognitive , and there
In addition to being a religious book with high human and moral themes, Nahj al-Balagha is considered a mirror of Arab culture and a literary masterpiece at the height of eloquence and eloquence, and because proverbs in the form of short, concrete and understandable phrases for everyone, experiences, thoughts and convey ideas, Imam Ali (AS) used it to facilitate the understanding of various political, social and moral concepts. In this article, we intend to criticize the way Dashti, Shahidi and Foladvand translated it by using Newmark's model due to the importance and cultural reflections of proverbs in understanding the cultural atmosphere governing Nahj al-Balagheh. In his evaluation model, Newmark divides cult
... Show MoreThere are two ways that the contract might be formed with (contracting between persons who are attended and contracting between absence persons).the need for determining the precise moment of the contract , is so clear because there is a specify period separate between the declaration of acceptance and the knowledge with it .and it is clear from the four theories known for jurisprudence (theory of the declaration of the acceptance, theory of exporting the acceptance , theory of the arrival of the acceptance , theory of the knowledge with the acceptance ) . It is difficult to promote one theory on another one if we look at each one and the justification of its supporters and what the opponents of each theory expose. Legal background and diff
... Show More