The Internet of Things (IoT) is an expanding domain that can revolutionize different industries. Nevertheless, security is among the multiple challenges that it encounters. A major threat in the IoT environment is spoofing attacks, a type of cyber threat in which malicious actors masquerade as legitimate entities. This research aims to develop an effective technique for detecting spoofing attacks for IoT security by utilizing feature-importance methods. The suggested methodology involves three stages: preprocessing, selection of important features, and classification. The feature importance determines the most significant characteristics that play a role in detecting spoofing attacks. This is achieved via two techniques: decision tree (DT) and mutual information (MI). For classification, adaptive boosting (AdaBoost), XGBoost and categorical boosting (CatBoosting) are used to categorize incoming data as normal or spoofing. The experimental results indicate the efficiency of the suggested approach for correctly identifying spoofing attacks with high accuracy, fewer false positives, and reduced time needed. By utilizing feature importance and robust classification algorithms, the system can accurately differentiate between legitimate and malicious IoT traffic, thereby improving the overall security of IoT networks. The CatBoost classifier outperformed the AdaBoost and XGBoost classifiers in terms of accuracy.
Atheists have spread in the modern era, so that atheism has become a bad phenomenon in the world in general and in Islamic societies in particular, so the research aims to study the individual and social effects left by atheism on the atheists themselves, and the research included multiple axes: atheism linguistically and idiomatically, atheism in the Qur’an Noble and Modern (and Contemporary) Atheism Statistics: and the reasons for atheism: Studying the phenomenon of atheism in Iraq as a model, then studying the effects of atheism: on the individual first, then atheism and its impact on society, then the conclusion, recommendations, sources and references
Making the data secure is more and more concerned in the communication era. This research is an attempt to make a more secured information message by using both encryption and steganography. The encryption phase is done with dynamic DNA complementary rules while DNA addition rules are done with secret key where both are based on the canny edge detection point of the cover image. The hiding phase is done after dividing the cover image into 8 blocks, the blocks that are used for hiding selected in reverse order exception the edge points. The experiments result shows that the method is reliable with high value in PSNR
The purpose of this research is to highlight the relationship between the administrative investigation and the improvement of institutional performance, and the research sought to achieve a set of cognitive and applied goals. the administrative investigation is the modern trend of managing the offices of the general hginspectors and the main source to build the necessary standards to manage and invest its resources efficiently and effectively required to achieve the goals it seeks. The institutional performance is the cornerstone for the implementation of all tasks and duties carried out by institutions operating within the borders of a particular country, The significant change
... Show MoreArt education is one among the fundamental subjects for elementary school students, because it contributes to assembling learners’ personalities and developing their technical skills. For this reason, this research comes, which aims to understand the effect of the task groups’ strategy in developing the performance of elementary school students in art education. to realize the goal of the research, the researcher put the subsequent hypotheses:
-There is not any statistically significant difference at the amount (5%) between the typical many students between the experimental group that studied consistent with the strategy of task groups and therefore the control group that studied in keeping with the same old method that they obt
paid recent developments in the information and communications technology and the accompanying developments in the global market to pay particular accounting information users to demand more sophistication in terms of corporate financial reporting systems, which led to the emergence of a new type of reporting (financial reporting in real time). where is the information and communications technology mainstay Nations for the development and progress, thanks to the development of technology that have made the transmission of information easily conducted and high speed to all who need it, communication is instantaneous and the flow of information via the internet dramatically exceeded the border temporal and spatial anywhere in the w
... Show MoreLecture method is still need to a part of PBL in order to explain the difficult and abstract concepts in all fields of physics particularly thermodynamics. Introducing and promoting PBL in the lecture method is wise step for innovation in teaching and learning. The objective of this study is to compare the effects of using three methods: problem-based learning (PBL), PBL with lecture method, and conventional teaching on undergraduate physics students’ understanding of thermodynamics. The actual sample size comprises of 122 students, who were selected randomly from the Physics Department, College of Education in Iraq in the academic year 2011-2012. In this study, the pre- and post-test were done and the instruments were administered to the
... Show MoreThis research was based on two pillars. The first is a comparison between of research done and the result of a particular variable of research indebendently in the united state, and second, knowledge and determine the effect of managers practices on the contributions of personnel. The manager and staff are considered to be the most important elements in the organization and all of them have a duty towards the others which governed by the relationship rules of procedure of the ministry researched, on the one hand and the interests of the organization and hence employees , whether executives or employees within management formations that the availability of an acceptable level of good pract
... Show More