The Internet of Things (IoT) is an expanding domain that can revolutionize different industries. Nevertheless, security is among the multiple challenges that it encounters. A major threat in the IoT environment is spoofing attacks, a type of cyber threat in which malicious actors masquerade as legitimate entities. This research aims to develop an effective technique for detecting spoofing attacks for IoT security by utilizing feature-importance methods. The suggested methodology involves three stages: preprocessing, selection of important features, and classification. The feature importance determines the most significant characteristics that play a role in detecting spoofing attacks. This is achieved via two techniques: decision tree (DT) and mutual information (MI). For classification, adaptive boosting (AdaBoost), XGBoost and categorical boosting (CatBoosting) are used to categorize incoming data as normal or spoofing. The experimental results indicate the efficiency of the suggested approach for correctly identifying spoofing attacks with high accuracy, fewer false positives, and reduced time needed. By utilizing feature importance and robust classification algorithms, the system can accurately differentiate between legitimate and malicious IoT traffic, thereby improving the overall security of IoT networks. The CatBoost classifier outperformed the AdaBoost and XGBoost classifiers in terms of accuracy.
In contemporary cities, the expansion of the use of vehicles has led to the deterioration of the urban environment. To counter this, many concepts and strategies emerged that attempted to regulate mobility in cities and limit its effects. The concept of a "complete street" is one of the modern trends concerned with diversifying means of transportation and reducing the disadvantages of mechanical transportation methods This paper discusses the role that complete streets can play in developing the urban environment in the Alyarmok District of Baghdad, which suffers from traffic congestion and its associated problems.In this study, 104 people were surveyed in the Alyarmok region, and the linear regression method was used to analyze their op
... Show MoreThe goal of this work is to check the presence of PNS (photon number splitting) attack in quantum cryptography system based on BB84 protocol, and to get a maximum secure key length as possible. This was achieved by randomly interleaving decoy states with mean photon numbers of 5.38, 1.588 and 0.48 between the signal states with mean photon numbers of 2.69, 0.794 and 0.24. The average length for a secure key obtained from our system discarding the cases with Eavesdropping was equal to 125 with 20 % decoy states and 82 with 50% decoy states for mean photon number of 0.794 for signal states and 1.588 for decoy states.
The different crises and financial collapses place in many companies, particularly in developed countries as a result of administrative and financial corruption return aspects of the task to the role of the company and the external auditor, both in their emphasis on honesty and fairness of financial statements and the Provisions of accounting information and on the contrary to the truth, you may have to the loss of the rights of stakeholders, particularly existing investors, and the loss of confidence of prospective investors in the accounting information contained in the financial statements of these companies, which led to a crisis of confidence and credibility in the profession of accounting and auditing where the wonder of ma
... Show MoreThe efforts in designing and developing lightweight cryptography (LWC) started a decade ago. Many scholarly studies in literature report the enhancement of conventional cryptographic algorithms and the development of new algorithms. This significant number of studies resulted in the rise of many review studies on LWC in IoT. Due to the vast number of review studies on LWC in IoT, it is not known what the studies cover and how extensive the review studies are. Therefore, this article aimed to bridge the gap in the review studies by conducting a systematic scoping study. It analyzed the existing review articles on LWC in IoT to discover the extensiveness of the reviews and the topics covered. The results of the study suggested that many re
... Show MoreObjectives: To determine the impact of the household hazardous waste’s aspects upon the environment
pollution .and to identify the relationship between the households’ demographic characteristics and the aspects
of household hazardous waste.
Methodology: A descriptive study is conducted between December 14th 2004 to October 20th 2005that uses of
an assessment tool. A probability (simple random sampling) of (336) principal’s households which is selected
from the zones around the (14) primary health care centers as focal points, (8) in the urban and (6) in the rural
areas of Baghdad Governorate. After reliability and validity were determined Data are collected through the use
of an assessment tool that is consist
Purpose: The research aims to study the measurement of the performance of accounting units level of the research sample by using the Federal quality Model European (EFQM) Design/methodology/approach: the (EFQM) which included seven dimensions "Leadership, Strategic Planning, External Focus, Information and Analysis, Faculty / Staff and Workplace Focus, Process Effectiveness & Outcomes and Achievements" And its effect on the Control Environment, which includes three dimensions: "Integrity, management philosophy and commitment to powers" . the sample is supervisory units of colleges affiliated with the University of Baghdad in Iraq, and a sample was chosen that included fifty-one individuals in the accounting departments.
... Show MoreDetection of early clinical keratoconus (KCN) is a challenging task, even for expert clinicians. In this study, we propose a deep learning (DL) model to address this challenge. We first used Xception and InceptionResNetV2 DL architectures to extract features from three different corneal maps collected from 1371 eyes examined in an eye clinic in Egypt. We then fused features using Xception and InceptionResNetV2 to detect subclinical forms of KCN more accurately and robustly. We obtained an area under the receiver operating characteristic curves (AUC) of 0.99 and an accuracy range of 97–100% to distinguish normal eyes from eyes with subclinical and established KCN. We further validated the model based on an independent dataset with
... Show MoreShow the greatness of Allah Almighty when contemplating the benefits of trees and plants in
Life in general and trees mentioned in the Koran in particular, do not have to meditate that
He acknowledges the greatness of the Almighty Creator, and his preference over man, that he is prepared for his livelihood
And give him what he can do in this life to the fullest.
The study also stressed the need to urge people to this great blessing trees
By preserving them and wasteful wastefulness.
The study also pointed to the need to guide people towards the aesthetics and improvements of
Look through and enjoy the beauty of trees, flowers, greenery and fruits ..
Self-compacting concrete (SCC) is an innovative concrete that does not require vibration for placing and compaction. It is able to flow under its own weight, completely filling formwork and achieving full compaction, even in the presence of congested reinforcement. The effect of external sulfate attack was studied-Es (very sever exposure SO4>10000ppm) according to ACI 318-11. The mix design method of SCC used is according to EFNARC 2002, and then must satisfy the criteria of filling ability, passing ability and segregation resistance. The experimental program focuses to study two different chemical composition of sulfate resistance Portland cement with different percentage of silica fume replacement by weight of cement and W/cm (0.3 and 0.3
... Show More