An intrusion detection system (IDS) is key to having a comprehensive cybersecurity solution against any attack, and artificial intelligence techniques have been combined with all the features of the IoT to improve security. In response to this, in this research, an IDS technique driven by a modified random forest algorithm has been formulated to improve the system for IoT. To this end, the target is made as one-hot encoding, bootstrapping with less redundancy, adding a hybrid features selection method into the random forest algorithm, and modifying the ranking stage in the random forest algorithm. Furthermore, three datasets have been used in this research, IoTID20, UNSW-NB15, and IoT-23. The results are compared with the three datasets men
... Show MoreAuthors in this work design efficient neural networks, which are based on the modified Levenberg - Marquardt (LM) training algorithms to solve non-linear fourth - order three -dimensional partial differential equations in the two kinds in the periodic and in the non-periodic - Periodic. Software reliability growth models are essential tools for monitoring and evaluating the evolution of software reliability. Software defect detection events that occur during testing and operation are often treated as counting processes in many current models. However, when working with large software systems, the error detection process should be viewed as a random process with a continuous state space, since the number of faults found during testin
... Show MoreA robust video-bitrate adaptive scheme at client-aspect plays a significant role in keeping a good quality of video streaming technology experience. Video quality affects the amount of time the video has turned off playing due to the unfilled buffer state. Therefore to maintain a video streaming continuously with smooth bandwidth fluctuation, a video buffer structure based on adapting the video bitrate is considered in this work. Initially, the video buffer structure is formulated as an optimal control-theoretic problem that combines both video bitrate and video buffer feedback signals. While protecting the video buffer occupancy from exceeding the limited operating level can provide continuous video str
... Show MoreThe aim of this study is to provide an overview of various models to study drug diffusion for a sustained period into and within the human body. Emphasized the mathematical compartment models using fractional derivative (Caputo model) approach to investigate the change in sustained drug concentration in different compartments of the human body system through the oral route or the intravenous route. Law of mass action, first-order kinetics, and Fick's perfusion principle were used to develop mathematical compartment models representing sustained drug diffusion throughout the human body. To adequately predict the sustained drug diffusion into various compartments of the human body, consider fractional derivative (Caputo model) to investiga
... Show MoreThe widespread use of the Internet of things (IoT) in different aspects of an individual’s life like banking, wireless intelligent devices and smartphones has led to new security and performance challenges under restricted resources. The Elliptic Curve Digital Signature Algorithm (ECDSA) is the most suitable choice for the environments due to the smaller size of the encryption key and changeable security related parameters. However, major performance metrics such as area, power, latency and throughput are still customisable and based on the design requirements of the device.
The present paper puts forward an enhancement for the throughput performance metric by p
... Show MoreThe estimation of the parameters of linear regression is based on the usual Least Square method, as this method is based on the estimation of several basic assumptions. Therefore, the accuracy of estimating the parameters of the model depends on the validity of these hypotheses. The most successful technique was the robust estimation method which is minimizing maximum likelihood estimator (MM-estimator) that proved its efficiency in this purpose. However, the use of the model becomes unrealistic and one of these assumptions is the uniformity of the variance and the normal distribution of the error. These assumptions are not achievable in the case of studying a specific problem that may include complex data of more than one model. To
... Show MoreThe research aims to identify the effect of teaching-learning design based on the constructivism theory on the life skills of middle stage students. The sample consisted of (60) students from one of the middle schools in Baghdad's governorate. The experimental group and control group consisted of 30 students for each group, the research tool was the life skills scale composed of (78) items. The scale proved its validity and reliability, which was found to be (0.85). The results showed a statistically significant difference in life skills between the two groups of research in favor of the experimental group, which studied the educational design according to models of constructivism theory compared to the usual method of teaching.
The study aims to provide a Suggested model for the application of Virtual Private Network is a tool that used to protect the transmitted data through the Web-based information system, and the research included using case study methodology in order to collect the data about the research area ( Al-Rasheed Bank) by using Visio to design and draw the diagrams of the suggested models and adopting the data that have been collected by the interviews with the bank's employees, and the research used the modulation of data in order to find solutions for the research's problem.
The importance of the study Lies in dealing with one of the vital topics at the moment, namely, how to make the information transmitted via
... Show MoreThe increase of the scenographic designer role on account of the character of the director in the Iraqi theater constituted a clear phenomenon that has been manifested in many shows, which necessitated a stance on the nature of this relation and delimiting the work space for each one of them inside the theater show. The research focuses on determining the work relation between the directorial vision and the scenographic proposal in the Iraq theater show. The research is divided into four chapters, the first one addressed the methodological framework, where the research problem was stated in the following question (has the scenographic designer been able through his scenographic proposal to remove the director from his position being the
... Show MoreAbstract---The aim of the current research is to identify the level of logical reasoning skills in chemistry students at the Faculty of Education for Pure Sciences/ Ibn Al-Haytham for the academic year (2021-2022). The differences in their level of skills according to the gender variable (males and females) and the academic stages (first- second - third - fourth). The descriptive approach was adopted because it corresponds to the nature of the research objectives. The research sample consisted of (400 )students selected in a relatively random stratified way. The researcher constructed a logical reasoning test, which includes (6) sub-skills , which is (proportional - probabilistic- synthetic- deductive- logic- variable adjustment). The psych
... Show More