The Internet of Things (IoT) is an expanding domain that can revolutionize different industries. Nevertheless, security is among the multiple challenges that it encounters. A major threat in the IoT environment is spoofing attacks, a type of cyber threat in which malicious actors masquerade as legitimate entities. This research aims to develop an effective technique for detecting spoofing attacks for IoT security by utilizing feature-importance methods. The suggested methodology involves three stages: preprocessing, selection of important features, and classification. The feature importance determines the most significant characteristics that play a role in detecting spoofing attacks. This is achieved via two techniques: decision tree (DT) and mutual information (MI). For classification, adaptive boosting (AdaBoost), XGBoost and categorical boosting (CatBoosting) are used to categorize incoming data as normal or spoofing. The experimental results indicate the efficiency of the suggested approach for correctly identifying spoofing attacks with high accuracy, fewer false positives, and reduced time needed. By utilizing feature importance and robust classification algorithms, the system can accurately differentiate between legitimate and malicious IoT traffic, thereby improving the overall security of IoT networks. The CatBoost classifier outperformed the AdaBoost and XGBoost classifiers in terms of accuracy.
The study area is witnessing divergence where I am North wind North East wind as we find that the north wind is getting replicated as we move from the south, The reason can be attributed to the nature of the surface of the region, with at least repeat this wind the northern region to the presence of mountain ranges, while we find that energizes the surface in the center and south helped to increase repeat this wind gusts, It also finds that the North wind East prevail in the northern region and least replicated as we move from the north to the south and to the fact that North stations are within blowing this wind sites for the circles near the display of high pressure located centers to the north-east, north and distancing itself from pa
... Show MoreAnalyze the relationship between genetic variations in the MTHFR gene at SNPs (rs1801131 and rs1801133) and the therapy outcomes for Iraqi patients with rheumatoid arthritis (RA). The study was conducted on a cohort of 95 RA Iraqi patients. Based on their treatment response, the cohort was divided into two groups: the responder (47 patients) and the nonresponder (48 patients), identified after at least three months of methotrexate (MTX) treatment. A polymerase chain reaction-restriction fragment length polymorphism (PCR–RFLP) technique was employed to analyze the MTHFR variations, specifically at rs1801133 and rs1801131. Overall, rs1801131 followed both codominant and dominate models, in which in
Background: Psoriasis is an immune-mediated inflammatory disease with unknown aetiology that may be associated with the defect in proliferation and differentiation of the keratinocytes related to inflammatory cell infiltration. According to published reports, it is universal in occurrence; its prevalence in different populations varies from 0.1% to 11.8%. Receiving Apremilast resulted in a strong reduction in interleukin 17 and interleukin 23, as well as reduced expression of other inflammatory cytokines and improvement of psoriatic lesions. Objectives: This study aimed to assess the impact of Apremilast on levels of IL-17, IL-23, and lipids in obese psoriatic patients. Methods: Thirty obese patients with psoriasis were included in
... Show MoreA hand gesture recognition system provides a robust and innovative solution to nonverbal communication through human–computer interaction. Deep learning models have excellent potential for usage in recognition applications. To overcome related issues, most previous studies have proposed new model architectures or have fine-tuned pre-trained models. Furthermore, these studies relied on one standard dataset for both training and testing. Thus, the accuracy of these studies is reasonable. Unlike these works, the current study investigates two deep learning models with intermediate layers to recognize static hand gesture images. Both models were tested on different datasets, adjusted to suit the dataset, and then trained under different m
... Show MoreFeature selection (FS) constitutes a series of processes used to decide which relevant features/attributes to include and which irrelevant features to exclude for predictive modeling. It is a crucial task that aids machine learning classifiers in reducing error rates, computation time, overfitting, and improving classification accuracy. It has demonstrated its efficacy in myriads of domains, ranging from its use for text classification (TC), text mining, and image recognition. While there are many traditional FS methods, recent research efforts have been devoted to applying metaheuristic algorithms as FS techniques for the TC task. However, there are few literature reviews concerning TC. Therefore, a comprehensive overview was systematicall
... Show MoreThe research stems from its goal of identifying the impact of visual management on the strategic acceleration of business organizations and the state of this effect through the knowledge embedding in the Iraqi oil companies. The oil sector was tested, represented by (3) oil companies, and a sample of (151) individuals who participated in activating the visual management, distributed in higher management levels. The research relied on the descriptiveanalytical approach and the questionnaire was a main tool for collecting data and information. The results showed that visual management positively affects strategic acceleration. Moreover, This effect is amplified by the mediating role played by Embedding Knowledge.
This study seeks to shed light on the aspects of visual pollution and its impact on the aesthetics of the town of Al-Eizariya known to suffer from the phenomenon. In order to identify the real causes of the problem which develops in various forms and patterns, threatening not only the aesthetic appearance of the towns, but also causes the emergence of new problems and phenomena that will have negative repercussions on the population. The researcher uses the analytical descriptive method to analyze the phenomenon of visual pollution in terms of reality, development, manifestations and spread and uses photos which document the visual pollution and its impact on the aesthetics of the known. The study concluded the existence of a strong rela
... Show MoreAim: To evaluation the effect of Lactobacillus acidophilus on Enterohemorrhagic Escherichia coli (EHEC) serotype O157:H7 with detection of some virulence factors. Methods: Two hundred and fifty specimens (stool) from children under five years for both sexes were collected from some hospitals. All isolates were diagnosed according to morphological characteristics, biochemical tests. Monoplex pattern of PCR was used also for detection different genes in (7) Escherichia coli )O157:H7 (isolates; include 16SrRNA, eae, lifA, Stx1,Stx2 that encoded for ribosomal RNA, intimin, lymphocyte inhibitory factor, shiga toxins. Three types of probiotics strains were obtained, Lactobacillus fermentum, Lactobacillus plantarum and Lactobacillus acidophilus (A
... Show More