The Internet of Things (IoT) is an expanding domain that can revolutionize different industries. Nevertheless, security is among the multiple challenges that it encounters. A major threat in the IoT environment is spoofing attacks, a type of cyber threat in which malicious actors masquerade as legitimate entities. This research aims to develop an effective technique for detecting spoofing attacks for IoT security by utilizing feature-importance methods. The suggested methodology involves three stages: preprocessing, selection of important features, and classification. The feature importance determines the most significant characteristics that play a role in detecting spoofing attacks. This is achieved via two techniques: decision tree (DT) and mutual information (MI). For classification, adaptive boosting (AdaBoost), XGBoost and categorical boosting (CatBoosting) are used to categorize incoming data as normal or spoofing. The experimental results indicate the efficiency of the suggested approach for correctly identifying spoofing attacks with high accuracy, fewer false positives, and reduced time needed. By utilizing feature importance and robust classification algorithms, the system can accurately differentiate between legitimate and malicious IoT traffic, thereby improving the overall security of IoT networks. The CatBoost classifier outperformed the AdaBoost and XGBoost classifiers in terms of accuracy.
In this study, we attempt to provide healthcare service to the pilgrims. This study describes how a multimedia courseware can be used in making the pilgrims aware of the common diseases that are present in Saudi Arabia during the pilgrimage. The multimedia courseware will also be used in providing some information about the symptoms of these diseases, and how each of them can be treated. The multimedia courseware contains a virtual representation of a hospital, some videos of actual cases of patients, and authentic learning activities intended to enhance health competencies during the pilgrimage. An examination of the courseware was conducted so as to study the manner in which the elements of the courseware are applied in real-time learn
... Show MoreSocial Networking has dominated the whole world by providing a platform of information dissemination. Usually people share information without knowing its truthfulness. Nowadays Social Networks are used for gaining influence in many fields like in elections, advertisements etc. It is not surprising that social media has become a weapon for manipulating sentiments by spreading disinformation. Propaganda is one of the systematic and deliberate attempts used for influencing people for the political, religious gains. In this research paper, efforts were made to classify Propagandist text from Non-Propagandist text using supervised machine learning algorithms. Data was collected from the news sources from July 2018-August 2018. After annota
... Show Moreالكتابة عن الأندلس بعد تسليم مدينة غرناطة يحمل في ثناياه ألم كبير، لأن الأندلسيين عاشوا تجربة إنسانية قاسية سببها الأساس غياب التسامح الديني والعدالة الاجتماعية، الأمر الذي دفعهم للثورة مطالبين بحقوقهم التي نصت عليها معاهدة تسليم المدينة. فقد عاش أولئك حياة صعبة ، فكانوا صورة للصراع بين حضارتين الإسلامية والغربية ، ويمكن تلمس ذلك الصراع من خلال دراسة ثوراتهم ضد السلطة الحاكمة التي يبدو من تتبع أح
... Show MoreThis research highlights one of the most important issues that have been controversial between Islamic schools, which is the duality of Intellect and Revelation and the nature of their relationship, in two core points:
The first point: Could there be a real conflict between Intellect and revelation? While the school of hadith view that this assumption is a rational assumption that does not real as long as the revelation is correct and the Intellect is clear, and that what is claimed are due to other Intellect s, we find that the Ash’ari school adopts the saying that the real conflict may occur, but rather confirms its occurrence.
The second point: For whom is the priority, for the Intellect or th
... Show MoreIn this paper, the construction of Hermite wavelets functions and their operational matrix of integration is presented. The Hermite wavelets method is applied to solve nth order Volterra integro diferential equations (VIDE) by expanding the unknown functions, as series in terms of Hermite wavelets with unknown coefficients. Finally, two examples are given
Abstract The aim of the current research is to identify the time perspective and the quality of academic life of Baghdad University students. The research also aims to identify the relationship between the time perspective and the academic quality of Baghdad University students and the extent to which the time perspective dimension of academic quality contributes to the identification of the difference between the time perspectives in terms of gender. Finally, the research aims to identify if there is a significant difference in the quality of academic life between males and females. The scales were applied to a number of (434) university male and female student. A one-sample t-test, a two-sample t-test, the analysis of the variation, the P
... Show MoreNew Schiff base ligand 2-((4-amino-5-(3, 4, 5-trimethoxybenzyl) pyrimidin- 2-ylimino) (phenyl)methyl)benzoic acid] = [HL] was synthesized using microwave irradiation trimethoprim and 2-benzoyl benzoic acid. Mixed ligand complexes of Mn((ІІ), Co(ІІ), Ni(ІІ), Cu(ІІ), Zn(ІІ) and Cd(ІІ) are reacted in ethanol with Schiff base ligand [HL] and 8-hydroxyquinoline [HQ] then reacted with metal salts in ethanol as a solvent in (1:1:1) ratio. The ligand [HL] is characterized by FTIR, UV-Vis, melting point, elemental microanalysis (C.H.N), 1H-NMR, 13C-NMR, and mass spectra. The mixed ligand complexes are characterized by infrared spectra, electronic spectra, (C.H.N), melting point, atomic absorption, molar conductance and magnetic moment me
... Show MoreThe research includes the synthesis and identification of the mixed ligands complexes of M(II) Ions in general composition [M(Lyn)2(phen)] Where L- lysine (C6H14N2O2) commonly abbreviated (LynH) as a primary ligand and 1,10-phenanthroline(C12H8N2) commonly abbreviated as "phen," as a secondary ligand . The ligands and the metal chlorides were brought in to reaction at room temperature in ethanol as solvent. The reaction required the following molar ratio [(1:1:2) (metal): phen:2 Lyn -] with M(II) ions, were M = Mn(II),Cu(II), Ni(II), Co(II), Fe(II) and Cd(II). Our research also includes studying the bio–activity of the some complexes prepared against pathogenic bacteria Escherichia coli(-),Staphylococcus(-) , Pseudomonas (-), Bacillus (-)
... Show MoreNew ligand of N-(pyrimidin-2-yl carbamothioyl)acetamide was synthesized and its complexes with (VO(II), Mn (II), Cu (II), Zn (II), Cd (II) and Hg (II) are formed with confirmation of their structures on the bases of spectroscopic analyses. Antimicrobial activity of new complexes are studied against Gram positive S. aureus and Gram negative E. coli, Proteus, Pseudomonas. The octahedral geometrical structures are proved depending on the outcomes from the preceding procedures. Keywords: pyrimidin-2-amine, acetyl isothiocyanate, complexes, Antimicrobial activity