The continuous advancement in the use of the IoT has greatly transformed industries, though at the same time it has made the IoT network vulnerable to highly advanced cybercrimes. There are several limitations with traditional security measures for IoT; the protection of distributed and adaptive IoT systems requires new approaches. This research presents novel threat intelligence for IoT networks based on deep learning, which maintains compliance with IEEE standards. Interweaving artificial intelligence with standardization frameworks is the goal of the study and, thus, improves the identification, protection, and reduction of cyber threats impacting IoT environments. The study is systematic and begins by examining IoT-specific thre
... Show MoreNatural gas and oil are one of the mainstays of the global economy. However, many issues surround the pipelines that transport these resources, including aging infrastructure, environmental impacts, and vulnerability to sabotage operations. Such issues can result in leakages in these pipelines, requiring significant effort to detect and pinpoint their locations. The objective of this project is to develop and implement a method for detecting oil spills caused by leaking oil pipelines using aerial images captured by a drone equipped with a Raspberry Pi 4. Using the message queuing telemetry transport Internet of Things (MQTT IoT) protocol, the acquired images and the global positioning system (GPS) coordinates of the images' acquisition are
... Show MoreBackground and Aim: due to the rapid growth of data communication and multimedia system applications, security becomes a critical issue in the communication and storage of images. This study aims to improve encryption and decryption for various types of images by decreasing time consumption and strengthening security. Methodology: An algorithm is proposed for encrypting images based on the Carlisle Adams and Stafford Tavares CAST block cipher algorithm with 3D and 2D logistic maps. A chaotic function that increases the randomness in the encrypted data and images, thereby breaking the relation sequence through the encryption procedure, is introduced. The time is decreased by using three secure and private S-Boxes rather than using si
... Show MoreThe Na Bop-Pu Sap Pb-Zn ore bodies represent a typical vein-type lead-zinc deposit situated in the Cho Don area and are currently being extracted for their lead and zinc resources. This deposit is characterized by its significant scale and quality and is considered one of the prominent lead-zinc deposits in the Cho Don area. Despite its significance, this deposit has not received adequate attention, resulting in limited knowledge of its geology, mineralization, and deposit genesis model. To address this knowledge gap, our study utilized several methodologies, including field surveying, ore mineral analysis under a microscope, and S and Pb isotopic geochemistry. By employing these approaches, we were able to obtain specific insights
... Show MoreResearch Summary :
Praise be to God, Lord of the Worlds, and prayers and peace be upon the Master of the Messengers, his family and all his companions, then after:
This is brief research that contained between its two covers one of the jurisprudence rules derived from Islamic Sharia that guarantees the right of others, in case of forcing to do the prohibited act, and it is a restriction of the rule: “Necessities allow prohibitions” and “Hardship brings facilitation” and support for the rule: “Necessities are valued.” It is an origin in alleviating the taxpayer definitely , and the study has briefly shown some of the jurisprudential appli
... Show More