The Internet of Things (IoT) is a network of devices used for interconnection and data transfer. There is a dramatic increase in IoT attacks due to the lack of security mechanisms. The security mechanisms can be enhanced through the analysis and classification of these attacks. The multi-class classification of IoT botnet attacks (IBA) applied here uses a high-dimensional data set. The high-dimensional data set is a challenge in the classification process due to the requirements of a high number of computational resources. Dimensionality reduction (DR) discards irrelevant information while retaining the imperative bits from this high-dimensional data set. The DR technique proposed here is a classifier-based feature selection using an extra tree classifier (EXT). The entropy values of features are used for the construction of trees in EXT, which is to build a lower-dimensional space. Linear discriminant analysis (LDA), K-nearest neighbor classifier (KNN), decision tree classifier (DTC), and random forest classifier (RFC) empirically evaluate the proposed feature selection mechanism. EXT is compared with other DR techniques like RFC and principal component analysis (PCA). The performance metrics of the classifiers are used to evaluate the proposed work.
Entropy generation was studied for new type of heat exchanger (shell and double concentric tubes heat exchanger). Parameters of hot oil flow rate, temperature of inlet hot oil and pressure drop were investigated with the concept of entropy generation. The results showed that the value of entropy generation increased with increasing the flow rate of hot oil and when cold water flow rate was doubled from 20 to 40 l/min, these values were larger. On the other hand, entropy generation increased with increasing the hot oil inlet temperature at a certain flow rate of hot oil. Furthermore, at a certain hot oil inlet temperature, the entropy generation increased with the pressure drop at different hot oil inlet flow rates. Final
... Show MoreResearchers used different methods such as image processing and machine learning techniques in addition to medical instruments such as Placido disc, Keratoscopy, Pentacam;to help diagnosing variety of diseases that affect the eye. Our paper aims to detect one of these diseases that affect the cornea, which is Keratoconus. This is done by using image processing techniques and pattern classification methods. Pentacam is the device that is used to detect the cornea’s health; it provides four maps that can distinguish the changes on the surface of the cornea which can be used for Keratoconus detection. In this study, sixteen features were extracted from the four refractive maps along with five readings from the Pentacam software. The
... Show MorePortable devices such as smartphones, tablet PCs, and PDAs are a useful combination of hardware and software turned toward the mobile workers. While they present the ability to review documents, communicate via electronic mail, appointments management, meetings, etc. They usually lack a variety of essential security features. To address the security concerns of sensitive data, many individuals and organizations, knowing the associated threats mitigate them through improving authentication of users, encryption of content, protection from malware, firewalls, intrusion prevention, etc. However, no standards have been developed yet to determine whether such mobile data management systems adequately provide the fu
... Show MoreIn this paper, the process of comparison between the tree regression model and the negative binomial regression. As these models included two types of statistical methods represented by the first type "non parameter statistic" which is the tree regression that aims to divide the data set into subgroups, and the second type is the "parameter statistic" of negative binomial regression, which is usually used when dealing with medical data, especially when dealing with large sample sizes. Comparison of these methods according to the average mean squares error (MSE) and using the simulation of the experiment and taking different sample
... Show MoreRecently, renewable energy (RE), such as solar energy, sources have proven their importance as an alternative source of fuel. The utilizing of solar energy can contribute to move the world towards relying on clean energy to curb global warming. However, the placement of solar farms is a major priority for planners as it is a critical factor in the succession energy project. This study combines one of the multi-criteria decision-making techniques Analytic Hierarchy Process (AHP) and Geographic Information System (GIS) to assess the suitability of land for establishing solar farms in Iraq. Numerous climatic, geomorphological, economic, and environmental criteria and some exclusionary constraints have been adopted in mode
... Show MoreTime series have gained great importance and have been applied in a manner in the economic, financial, health and social fields and used in the analysis through studying the changes and forecasting the future of the phenomenon. One of the most important models of the black box is the "ARMAX" model, which is a mixed model consisting of self-regression with moving averages with external inputs. It consists of several stages, namely determining the rank of the model and the process of estimating the parameters of the model and then the prediction process to know the amount of compensation granted to workers in the future in order to fulfil the future obligations of the Fund. , And using the regular least squares method and the frequ
... Show MoreA steganography hides information within other information, such as file, message, picture, or video. A cryptography is the science of converting the information from a readable form to an unreadable form for unauthorized person. The main problem in the stenographic system is embedding in cover-data without providing information that would facilitate its removal. In this research, a method for embedding data into images is suggested which employs least significant bit Steganography (LSB) and ciphering (RSA algorithm) to protect the data. System security will be enhanced by this collaboration between steganography and cryptography.