The prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices’ power usage. Also, a rand order code (ROC) technique is used with SNN to detect cyber-attacks. The proposed method is evaluated by comparing its performance with two other methods: IDS-DNN and IDS-SNNTLF by using three performance metrics: detection accuracy, latency, and energy usage. The simulation results have shown that IDS-SNNDT attained low power usage and less latency in comparison with IDS-DNN and IDS-SNNTLF methods. Also, IDS-SNNDT has achieved high detection accuracy for cyber-attacks in contrast with IDS-SNNTLF.
This paper presents a fully computerized method to backup the router configuration file. The method consists of a friendly graphical interface programmed by Java programming language.
The proposed method is compared with the two existing methods, namely: TFTP server method and Copy/Paste method. The comparison reveals that the proposed method has many advantages over the existing ones. The proposed method has been implemented on Cisco routers (series 2500, 2600 and 2800).
With the recent growth of global populations, main roads in cities have witnessed an evident increase in the number of vehicles. This has led to unprecedented challenges for authorities in managing the traffic of ambulance vehicles to provide medical services in emergency cases. Despite the high technologies associated with medical tracks and advanced traffic management systems, there is still a current delay in ambulances’ attendance in times of emergency to provide patients with vital aid. Therefore, it is indispensable to introduce a new emergency service system that enables the ambulance to reach the patient in the least congested and shortest paths. However, designing an effici
Background: Large amounts of oily wastewater and its derivatives are discharged annually from several industries to the environment. Objective: The present study aims to investigate the ability to remove oil content and turbidity from real oily wastewater discharged from the wet oil's unit (West Qurna 1-Crude Oil Location/ Basra-Iraq) by using an innovated electrocoagulation reactor containing concentric aluminum tubes in a monopolar mode. Methods: The influences of the operational variables (current density (1.77-7.07 mA/cm2) and electrolysis time (10-40 min)) were studied using response surface methodology (RSM) and Minitab-17 statistical program. The agitation speed was taken as 200 rpm. Energy and electrodes consumption had been studi
... Show MoreReinforced concrete slabs are one of the most important and complicated elements of a building. For supported edges slabs, if the ratio of long span to short span is equal or less than two then the slab is considered as two-way slab otherwise is consider as one-way slab. Two-way reinforced concrete slabs are common in use in reinforced concrete buildings due to geometrically arrangement of columns suggested by architects who prefer a symmetric distribution of columns in their plans. Elastic theory is usually used for analysis of concrete slabs. However, for several reasons design methods based on elastic principles are limited in their function. Correspondingly, limit state analysis o
In this research, Argon gas was used to generate atmospheric plasma in the manufacture of platinum nanomaterials, to study the resultant plasma spectrum and to calculate the cellular toxicity of those manufactured nanomaterials. This research is keen on the generation of nonthermal atmospheric pressure plasma using aqueous platinum salts (H2PtCl6 6H2O) with different concentrations and exposure of cold plasma with a different time period used to produce platinum nanoparticles, to ensure typical preparation of nanoparticles. Visible UV and X-rays were performed for this purpose, and the diameter of the system probe was (1[Formula: see text]mm) with the Argon gas flow of
... Show MoreBased on the diazotization-coupling reaction, a new, simple, and sensitive spectrophotometric method for determining of a trace amount of (BPF) is presented in this paper. Diazotized metoclopramide reagent react with bisphenol F produces an orange azo-compound with a maximum absorbance at 461 nm in alkaline solution. The experimental parameters were optimized such as type of alkaline medium, concentration of NaOH, diazotized metoclopramide amount, order additions, reaction time, temperature, and effect of organic solvents to achieve the optimal performance for the proposed method. The absorbance increased linearly with increasing bisphenol F concentration in the range of 0.5-10 μg mL-1 under ideal conditions, with a correlati
... Show MorePhysics and applied mathematics form the basis for understanding natural phenomena using differential equations depicting the flow in porous media, the motion of viscous liquids, and the propagation of waves. These equations provide a thorough study of physical processes, enhancing the understanding of complex applications in engineering, technology, and medicine. This paper presents novel approximate solutions for the Darcy-Brinkmann-Forchheimer moment equation, the Blasius equation and the FalknerSkan equation with initial / boundary conditions by using two iterative methods: the variational iteration method and the optimal variational iteration method. The variational iteration method is effectively developed by adding a control paramete
... Show MoreIn this paper, the goal of proposed method is to protect data against different types of attacks by unauthorized parties. The basic idea of proposed method is generating a private key from a specific features of digital color image such as color (Red, Green and Blue); the generating process of private key from colors of digital color image performed via the computing process of color frequencies for blue color of an image then computing the maximum frequency of blue color, multiplying it by its number and adding process will performed to produce a generated key. After that the private key is generated, must be converting it into the binary representation form. The generated key is extracted from blue color of keyed image then we selects a c
... Show More