The Internet of Things (IoT) is an expanding domain that can revolutionize different industries. Nevertheless, security is among the multiple challenges that it encounters. A major threat in the IoT environment is spoofing attacks, a type of cyber threat in which malicious actors masquerade as legitimate entities. This research aims to develop an effective technique for detecting spoofing attacks for IoT security by utilizing feature-importance methods. The suggested methodology involves three stages: preprocessing, selection of important features, and classification. The feature importance determines the most significant characteristics that play a role in detecting spoofing attacks. This is achieved via two techniques: decision tr
... Show MoreThe real estate prices in the Iraqi market have witnessed a significant increase in the prices of residential units, including land plots and residential buildings, especially after the approval of the new exchange rate and the provision of financial loans to employees and citizens. Therefore, real estate loans are considered one of the financing tools in the housing sector, whether these loans are directed towards the construction of new housing or the rehabilitation of existing buildings for housing. The housing market is an important component of the economic and social system, as housing is a commodity that is influenced by supply, demand, and the trade of materials involved in housing unit production. The housing system is also
... Show MoreThis study aims to reveal the role of one of the artificial intelligence (AI) techniques, “ChatGPT,” in improving the educational process by following it as a teaching method for the subject of automatic analysis for students of the Chemistry Department and the subject of computer security for students of the Computer Science Department, from the fourth stage at the College of Education for Pure Science (Ibn Al-Haitham), and its impact on their computational thinking to have a good educational environment. The experimental approach was used, and the research samples were chosen intentionally by the research community. Research tools were prepared, which included a scale for CT that included 12 items and the achievement test in b
... Show MoreBackground: Most primary hypothyroidism patients also experience inefficiency and irregularity. It is possible to understand the significance of myo-inositol in treating the thyroid gland by relating it to the synthesis of thyroid hormones. Study aimed to estimate serum of inositol 1,4,5-triphosphate (IP3) in primary hypothyroidism disorder and through that level it can shed light on whether it is accused of inactivity of the thyroid gland and at the same time open the doors for the use as a treatment.
Subject and Methods: The study was taken from the analytical cross-sectional design.120 subjects were divided into three groups, the first group included 40 healthy subjects, the s
... Show MoreThe analysis of time series considers one of the mathematical and statistical methods in explanation of the nature phenomena and its manner in a specific time period.
Because the studying of time series can get by building, analysis the models and then forecasting gives the priority for the practicing in different fields, therefore the identification and selection of the model is of great importance in spite of its difficulties.
The selection of a standard methods has the ability for estimation the errors in the estimated the parameters for the model, and there will be a balance between the suitability and the simplicity of the model.
In the analysis of d
... Show MoreInterval methods for verified integration of initial value problems (IVPs) for ODEs have been used for more than 40 years. For many classes of IVPs, these methods have the ability to compute guaranteed error bounds for the flow of an ODE, where traditional methods provide only approximations to a solution. Overestimation, however, is a potential drawback of verified methods. For some problems, the computed error bounds become overly pessimistic, or integration even breaks down. The dependency problem and the wrapping effect are particular sources of overestimations in interval computations. Berz (see [1]) and his co-workers have developed Taylor model methods, which extend interval arithmetic with symbolic computations. The latter is an ef
... Show More The present study aimed at ((building an educational -learning design based on the theory of Merrill in (CDT) and measuring the effectiveness of this design in the motivation and achievement of the high school fifth grade students to art education in the subject of the history of modern art)). The research community is made of fifth grade preparatory students in the secondary school of Umm Ayman in the Directorate of Education of Baghdad / Ar-Rusafa in a simple random way. The study sample (58 students) was chosen from section (e) to study according to Merrill theory (CDT) and section (d) to study according to the traditional way.
The pilot design of the control and experimental equivalent groups that have partial control in t
Personality regard as one of the human soul pillars that has been built throughout the life of people, starting from the fertilizing process to different stages of people ages. Over time, numerous scientific studies have shown that fetus has the ability to hear and feel and he is being stereotyped since the first stages of formation. Accordingly, the process of forming human personality set up since that date. Besides, the socialization means that take different resources to enhance human personality such as holy Quran, school, social media, and social environment. The emergence of social media made the world as a small village which gives the chance for all people, over the world, to obtain the knowledge easily and limitless. Thus, the
... Show MoreThe parameter and system reliability in stress-strength model are estimated in this paper when the system contains several parallel components that have strengths subjects to common stress in case when the stress and strengths follow Generalized Inverse Rayleigh distribution by using different Bayesian estimation methods. Monte Carlo simulation introduced to compare among the proposal methods based on the Mean squared Error criteria.