The Internet of Things (IoT) is an expanding domain that can revolutionize different industries. Nevertheless, security is among the multiple challenges that it encounters. A major threat in the IoT environment is spoofing attacks, a type of cyber threat in which malicious actors masquerade as legitimate entities. This research aims to develop an effective technique for detecting spoofing attacks for IoT security by utilizing feature-importance methods. The suggested methodology involves three stages: preprocessing, selection of important features, and classification. The feature importance determines the most significant characteristics that play a role in detecting spoofing attacks. This is achieved via two techniques: decision tree (DT) and mutual information (MI). For classification, adaptive boosting (AdaBoost), XGBoost and categorical boosting (CatBoosting) are used to categorize incoming data as normal or spoofing. The experimental results indicate the efficiency of the suggested approach for correctly identifying spoofing attacks with high accuracy, fewer false positives, and reduced time needed. By utilizing feature importance and robust classification algorithms, the system can accurately differentiate between legitimate and malicious IoT traffic, thereby improving the overall security of IoT networks. The CatBoost classifier outperformed the AdaBoost and XGBoost classifiers in terms of accuracy.
Developing and researching antenna designs are analogous to excavating in an undiscovered mine. This paper proposes a multi-band antenna with a new hexagonal ring shape, theoretically designed, developed, and analyzed using a CST before being manufactured. The antenna has undergone six changes to provide the best performance. The results of the surface current distribution and the electric field distribution on the surface of the hexagonal patch were theoretically analyzed and studied. The sequential approach taken to determine the most effective design is logical, and prevents deviation from the work direction. After comparing the six theoretical results, the fifth model proved to be the best for making a prototype. Measured results rep
... Show MoreThe research involves examining the influence of partial solar eclipse on the strength of neutral hydrogen from the Sun. Baghdad University Radio Telescope (BURT) was used to monitor the partial solar eclipse on the 25th of October, 2022. Radio observations from the Sun were recorded from 11:30 AM to 03:36 PM. This means that the HI emission from the Sun was recorded before, during and after the event. It was noticed, that at the moment of maximum eclipse, ~ 46% of the Sun’s disk was covered by the Moon. For the purpose of this research, the solar radio wave intensity was monitored and the solar flux density was determined at different times, i.e. before, during and after the partial solar eclipse. The obtained results showed that
... Show MoreAbstract:
There is a close relationship between rigidity and distort structure of production and productivity and inflation rates. The effects of this relationship are distorted the contribution rate of the productive sectors and the disproportionate of exchange rate in foreign trade.
raising the general level of prices is one of the way that have been used by previous governments (inflationary financing or deficit financing) in order to speed up the process of capital formation, depending on the availability of economic resources idle.
The fabricating inflation for development does not represent a true understanding of the nature of the
... Show MoreIn this paper, a harvested prey-predator model involving infectious disease in prey is considered. The existence, uniqueness and boundedness of the solution are discussed. The stability analysis of all possible equilibrium points are carried out. The persistence conditions of the system are established. The behavior of the system is simulated and bifurcation diagrams are obtained for different parameters. The results show that the existence of disease and harvesting can give rise to multiple attractors, including chaos, with variations in critical parameters.
The research aims to investigate the possibility of joint auditing in improving the market value of Iraqi companies listed on the Iraq Stock Exchange. The sample was represented by 10 Iraqi companies listed in the Iraq market for the period from 2014-2017 (2 years before implementation and 2 years after implementation) and the research was based on the idea that joint auditing enhances investor confidence and raises their level of security as a result of providing quality and reliable reports, and thus This indicates good news in the market that reflects on the performance of stocks and the market value of companies that adopt joint auditing. The results of the analysis indicate an improvement in the market value, but this improv
... Show MoreStandards of audit have been defined issued them by professional organizations the audit risk is: Failure of the auditor inadvertently to amend his opinion on the financial statements in suitable method, although these statements are Interpolated Essentially. As result the deep impacts caused by electronic operating systems in the accounting data in the audit process which audit risk has gained attention of many professional sides, especially the audit process and quality is relating with level of discovery the auditor for the mistakes of origin (misrepresentations) all their types and give the necessary confidence for the auditor to express his technical opinion in fidelity and certified financial statements which prepared electronicall
... Show MoreCorruption is a phenomenon that exists in all times and places, they appear in the developing countries and in developed countries, and in all political systems. And its repercussions and economic repercussions on the society in which it is rampant, and lead to the undermining of economic development and obstruction, is also working on increasing poverty and unemployment, as well as its role in the worsening of social problems, and political instability. And corruption is deviant behavior is illegal and contrary to the teachings of the religious and moral values. The emergence of this phenomenon is due to several reasons, including political, economic, social and cultura
... Show MoreThe research discusses two variables are important, orientation marketing and quality of service, and that the purpose of the research is to see whether the telecom companies applied orientation marketing or not and to what extent is keen to apply it to suit the Iraqi environment as it has been applied research in kork Telecom company and Asia Cell Telecom are sectors service job in the business sector in Iraq, The information was obtained through the design of the questionnaire compatible runway Likert, and distribution (92) questionnaire, which (50) for the company Korek Telecom and (42) of the Asia-Cell, research population sample included a number of staff in the departments and units in the two companies, it has been support
... Show MoreThe external shocks are one of the phenomena that the Iraqi economy is exposed to over a period of time. It is referred to as changes and events that come from outside the economic system and extends to many economic variables. However, foreign direct investment may be severely affected due to the extreme sensitivity to changes and local and international developments. This type of trauma and its characteristics to help manage and cope with external shocks, and in order to avoid the standard problems experienced by some models of simple linear regression, multi-linear regression models were used with variables Scientific and other dummy variables .
The study foun
... Show More