The Internet of Things (IoT) is an expanding domain that can revolutionize different industries. Nevertheless, security is among the multiple challenges that it encounters. A major threat in the IoT environment is spoofing attacks, a type of cyber threat in which malicious actors masquerade as legitimate entities. This research aims to develop an effective technique for detecting spoofing attacks for IoT security by utilizing feature-importance methods. The suggested methodology involves three stages: preprocessing, selection of important features, and classification. The feature importance determines the most significant characteristics that play a role in detecting spoofing attacks. This is achieved via two techniques: decision tree (DT) and mutual information (MI). For classification, adaptive boosting (AdaBoost), XGBoost and categorical boosting (CatBoosting) are used to categorize incoming data as normal or spoofing. The experimental results indicate the efficiency of the suggested approach for correctly identifying spoofing attacks with high accuracy, fewer false positives, and reduced time needed. By utilizing feature importance and robust classification algorithms, the system can accurately differentiate between legitimate and malicious IoT traffic, thereby improving the overall security of IoT networks. The CatBoost classifier outperformed the AdaBoost and XGBoost classifiers in terms of accuracy.
Global Navigation Satellite Systems (GNSS) have become an integral part of wide range of applications. One of these applications of GNSS is implementation of the cellular phone to locate the position of users and this technology has been employed in social media applications. Moreover, GNSS have been effectively employed in transportation, GIS, mobile satellite communications, and etc. On the other hand, the geomatics sciences use the GNSS for many practical and scientific applications such as surveying and mapping and monitoring, etc.
In this study, the GNSS raw data of ISER CORS, which is located in the North of Iraq, are processed and analyzed to build up coordinate time series for the purpose of detection the
... Show MoreDigital image manipulation has become increasingly prevalent due to the widespread availability of sophisticated image editing tools. In copy-move forgery, a portion of an image is copied and pasted into another area within the same image. The proposed methodology begins with extracting the image's Local Binary Pattern (LBP) algorithm features. Two main statistical functions, Stander Deviation (STD) and Angler Second Moment (ASM), are computed for each LBP feature, capturing additional statistical information about the local textures. Next, a multi-level LBP feature selection is applied to select the most relevant features. This process involves performing LBP computation at multiple scales or levels, capturing textures at different
... Show MoreAdverse drug reactions (ADR) are important information for verifying the view of the patient on a particular drug. Regular user comments and reviews have been considered during the data collection process to extract ADR mentions, when the user reported a side effect after taking a specific medication. In the literature, most researchers focused on machine learning techniques to detect ADR. These methods train the classification model using annotated medical review data. Yet, there are still many challenging issues that face ADR extraction, especially the accuracy of detection. The main aim of this study is to propose LSA with ANN classifiers for ADR detection. The findings show the effectiveness of utilizing LSA with ANN in extracting AD
... Show More
This research aims to study the impact of strategic information systems on the development of intellectual capital in the Public Shareholding Electricity Distribution Company in the Hashemite Kingdom of Jordan. To achieve the objectives of the study, a questionnaire was developed for the purpose of data collection, as the number of valid questionnaires for analysis was about (135), and SPSS and AMOS 0.26 software was used to analyze the collected data. The study found out that the respondents' perceptions of the level of importance of strategic information systems and the level of importance of intellectual capital were high, and that the relational capital has ranked as first, followed by structural capital, and h
... Show MoreThe primary aim of the study was to find out the values of some biomechanical variables for the long serve skill in badminton and to identify the effect of biomechanical feedback on the performance of long serve. The present study had a single group, pre-post experimental study design. The research community was determined by the intentional method of one group with a pre-and post-test. The players of the Assyrian badminton club constituted the research community. A total of 12 players were present in the research community. The badminton players falling within the age group of 15-17 years for the season 2020-2021 were recruited as the participants for the study. A total of five players were selected as the participant
... Show MoreBackground: Dietary intakes are critical during pregnancy, because inadequate amounts of key nutrients may compromise fetal development or maternal health. In addition to that maternal diet could be one of the methods to select the gender of the baby. The aim of the study is to correlate the level of the minerals in the mother’s blood with the gender and wellbeing of the baby after delivery.Patients and Methods: Fifty women were involved in this study with a mean age (23.92 ± 4.75), collected from the labor room during labor in the period between December 2013 and May 2014, in Baghdad teaching hospital. After taking a full history from the women, 10 ml of blood was withdrawn from them, 2ml in EDTA tubes for lead estimation and 8 ml in pl
... Show MoreA field experiment is conducted to study the effect of different levels of peat (0, 25, 50, 75, and 100 Mg ha-1 to uncropped and cropped soil to wheat. Soil samples are taken in different period of time (0, 3, 30, 60, 90, 120, and 180 days after cultivation to determine (NaHCO3-Exteractable P at 3 different depths (0-10, 10-20, and 20-30 cm). Field Experiment is conducted in a randomized complete block design (RCBD) with four replicates. Wheat, Al-Rasheed variety, is cultivated as a testing crop. The entire field is equally dived in two divisions. One of the two divisions is cultivated to wheat and the second is left uncropped. The effect of five levels of peat namely 0, 25, 50, 75, 100 Mg ha-1 is investigated. Soils are fully analyzed
... Show MoreSilymarin is derived from the milk thistle plant, and possesses numerous pharmacological actions, including hepatoprotective, anti-inflammatory, antioxidant, and anticancer properties. The aim of the study was to the determination of influence different concentrations of Silymarin on the rumen performance in 30 local lambs (divided into three groups of 10 lambs each). In the first and second groups, 420 and 210 mg kg-1 of silymarin were administered for 8 weeks, and the third group was the control, which received normal saline solution. The parameters evaluated included the level of volatile fatty acids (VFAs), ammonia and pH in the rumen. Furthermore, the in vitro digestibility of ash, protein, fat and dry matter was investigated.
... Show More