Abstract :
The prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices
... Show MoreBasil (Ocimum basilicum L.), a leafy plant used for fresh food, medicinal purposes, and aromatic purposes (including the extraction of volatile essential oil and active compounds), was the subject of a worker experiment at the College of Education for Pure Sciences Ibn Al-Haitham / University of Baghdad during the 2023 growing season. The experiment aimed to determine the effects of spraying the basil plant’s vegetative system with aqueous extracts of watercress and parsley on the plant’s growth characteristics and the production of active compounds. The experiment included two factors, the first factor, the aqueous extract of the watercress plant in three concentrations (0, 5, 10
Abstract
Praise be to Allah and prayers and peace be upon our Prophet, Muhammad, his family and all of his companions,
This research addresses the issue of judge's preaching to the litigants and witnesses; it is a very significant issue since the judge cannot know the insides and facts, but it issues judgments based on the hearings. Since people are originally wrong-doing and ignorant, they, therefore, commit injustice, oppression, false adversarial, and false testimony. However, some people can possibly retreat and return to the right, after being inattentive or recalcitrant, by preaching. This fact led scholars to talk about the judge's preaching to litigant and witnesses and this research is conducted
... Show MoreNitrogen (N) is a key growth and yield-limiting factor in cultivated rice areas. This study has been conducted to evaluate the effects of different conditions of N application on rice yield and yield components (Shiroudi cultivar) in Babol (Mazandaran, Iran) during the 2015- 2016 season. A factorial experiment executed of a Randomized Complete Block Design (RCBD) used in three iterations. In the first factor, treatments were four N amounts (including 50, 90, 130, and 170 kg N ha-1), while in the second factor, the treatments consisted of four different fertilizer splitting methods, including T1:70 % at the basal stage + 30 % at the maximum tillering stage, T2:1/3 at the basal stage + 1/3 at the maximum ti
... Show MoreIn this paper, we used two monomers, 3,3',4,4'-benzophenone tetracarboxylic dianhydride (BTDA) and m,m'-diaminobenzophenone (m, m’-DABP), to produce polyamide acid and then converted it to polyimide (PI). The effects of phosphoric acid (H3PO4) molarity (1, 2, and 3 M) on the structural, thermal, mechanical, and electrical characteristics of the polyimides/polyaniline (PI/PANI) nanocomposites were studied. Two sharp reflection peaks were developed by the addition of PANI to PI. When 3 M H3PO4 is added, the crystalline sharp peak loses some of its intensity. The complex formation of PI/PANI-H3PO4 was confi
... Show MoreContracting cancer typically induces a state of terror among the individuals who are affected. Exploring how glucose excess, estrogen excess, and anxiety work together to affect the speed at which breast cancer cells multiply and the immune system’s response model is necessary to conceive of ways to stop the spread of cancer. This paper proposes a mathematical model to investigate the impact of psychological panic, glucose excess, and estrogen excess on the interaction of cancer and immunity. The proposed model is precisely described. The focus of the model’s dynamic analysis is to identify the potential equilibrium locations. According to the analysis, it is possible to establish four equilibrium positions. The stability analys
... Show MoreUsing watermarking techniques and digital signatures can better solve the problems of digital images transmitted on the Internet like forgery, tampering, altering, etc. In this paper we proposed invisible fragile watermark and MD-5 based algorithm for digital image authenticating and tampers detecting in the Discrete Wavelet Transform DWT domain. The digital image is decomposed using 2-level DWT and the middle and high frequency sub-bands are used for watermark and digital signature embedding. The authentication data are embedded in number of the coefficients of these sub-bands according to the adaptive threshold based on the watermark length and the coefficients of each DWT level. These sub-bands are used because they a
... Show MoreThis study aims to find out the effect of the mediator on scaffolding fourth yearstudent- teachers' teaching competencies and their self-efficacy. The present study combines scaffolding and self-efficacy by using a mediator on scaffolding students affects teaching competencies and selfefficacy and from the results of which the existence of student-teachers’ selfawareness was ensured as an effect of the same independent variable. The model affects their teaching competencies and led them to be aware of the needs of their pupils and themselves.