Preferred Language
Articles
/
voavo4YBIXToZYALzpsk
Intrusion detection method for internet of things based on the spiking neural network and decision tree method
...Show More Authors

The prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices’ power usage. Also, a rand order code (ROC) technique is used with SNN to detect cyber-attacks. The proposed method is evaluated by comparing its performance with two other methods: IDS-DNN and IDS-SNNTLF by using three performance metrics: detection accuracy, latency, and energy usage. The simulation results have shown that IDS-SNNDT attained low power usage and less latency in comparison with IDS-DNN and IDS-SNNTLF methods. Also, IDS-SNNDT has achieved high detection accuracy for cyber-attacks in contrast with IDS-SNNTLF.

Preview PDF
Quick Preview PDF
Publication Date
Sat Feb 02 2019
Journal Name
Journal Of The College Of Education For Women
The effect of external environment on the process of decision-making associated with the closing of private industrial firms: The Iraqi experiment, (1976-1985)
...Show More Authors


Abstract
The research hypothesizes is that the external Environment
has the responsibility concerning decisions making and behavioral
upon industrial firms. It is, Furthermore, an attempt to review the
problem of closures of private industrial firms in the country, during
the period (1976-1985), i.e. prior to and during the Iraqian- Iranian
war.
The behavioral approach of industrial geography has been
adopted as a theoretical background and the statistical test has
been practiced for the applied purposes.
As result, the research comes out with suggestions,
depending upon previous trials in the field of direction and
formulation of the of the private industrial sector. The chief point
among th

... Show More
View Publication Preview PDF
Publication Date
Sun Jun 02 2024
Journal Name
Methods And Objects Of Chemical Analysis
Simultaneous Spectrophotometric Determination of Piroxicam, Naproxen, Diclofenac Sodium and Mefenamic Acid in Pharmaceutical Formulations by Partial Least Squares Method
...Show More Authors

A chemometric method, partial least squares regression (PLS) was applied for the simultaneous determination of piroxicam (PIR), naproxen (NAP), diclofenac sodium (DIC), and mefenamic acid (MEF) in synthetic mixtures and commercial formulations. The proposed method is based on the use of spectrophotometric data coupled with PLS multivariate calibration. The Spectra of drugs were recorded at concentrations in the linear range of 1.0 - 10 μg mL-1 for NAP and from 1.0 - 20 μg mL-1 for PIR, DIC, and MEF. 34 sets of mixtures were used for calibration and 10 sets of mixtures were used for validation in the wavelength range of 200 to 400 nm with the wavelength interval λ = 1 nm in methanol. This method has been used successfully to quant

... Show More
View Publication
Scopus (4)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Fri Mar 31 2023
Journal Name
Journal Of Al-qadisiyah For Computer Science And Mathematics
A Cryptosystem for Database Security Based on RC4 Algorithm
...Show More Authors

Because of vulnerable threats and attacks against database during transmission from sender to receiver, which is one of the most global security concerns of network users, a lightweight cryptosystem using Rivest Cipher 4 (RC4) algorithm is proposed. This cryptosystem maintains data privacy by performing encryption of data in cipher form and transfers it over the network and again performing decryption to original data. Hens, ciphers represent encapsulating system for database tables

View Publication
Crossref (1)
Crossref
Publication Date
Tue Nov 01 2016
Journal Name
2016 International Conference On Advances In Electrical, Electronic And Systems Engineering (icaees)
Efficient routing algorithm for VANETs based on distance factor
...Show More Authors

There has been a great deal of research into the considerable challenge of managing of traffic at road junctions; its application to vehicular ad hoc network (VANET) has proved to be of great interest in the developed world. Dynamic topology is one of the vital challenges facing VANET; as a result, routing of packets to their destination successfully and efficiently is a non-simplistic undertaking. This paper presents a MDORA, an efficient and uncomplicated algorithm enabling intelligent wireless vehicular communications. MDORA is a robust routing algorithm that facilitates reliable routing through communication between vehicles. As a position-based routing technique, the MDORA algorithm, vehicles' precise locations are used to establish th

... Show More
View Publication
Scopus (8)
Crossref (7)
Scopus Crossref
Publication Date
Mon May 11 2020
Journal Name
Baghdad Science Journal
A Cryptosystem for Database Security Based on TSFS Algorithm
...Show More Authors

Implementation of TSFS (Transposition, Substitution, Folding, and Shifting) algorithm as an encryption algorithm in database security had limitations in character set and the number of keys used. The proposed cryptosystem is based on making some enhancements on the phases of TSFS encryption algorithm by computing the determinant of the keys matrices which affects the implementation of the algorithm phases. These changes showed high security to the database against different types of security attacks by achieving both goals of confusion and diffusion.

View Publication Preview PDF
Scopus (7)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Tue Feb 14 2023
Journal Name
Journal Of Educational And Psychological Researches
The Effectiveness of Teaching Practices of Science and Mathematics Teachers Based on the National Framework for Future Skills in the Omani School
...Show More Authors

Abstract

The research aims to identify the level of effectiveness of the teaching practices of science and mathematics teachers in light of the national framework for future skills in Omani schools. To achieve the objectives of the study, the researchers used the descriptive approach, as he designed a note card consisting of (30) phrases distributed on three axes: basic skills, practical skills, and technical skills. After verifying the validity and reliability of the tools, they were applied to a sample of (116) teachers. The results of the research revealed that the level of effectiveness of the teaching practices of mathematics teachers has recorded a medium degree with a mean (3.05). The results a

... Show More
View Publication Preview PDF
Publication Date
Mon Apr 15 2019
Journal Name
Proceedings Of The International Conference On Information And Communication Technology
Re-evaluation of the stable improved LEACH routing protocol for wireless sensor network
...Show More Authors

View Publication
Scopus (16)
Crossref (12)
Scopus Clarivate Crossref
Publication Date
Wed Sep 28 2022
Journal Name
Journal Of The College Of Education For Women
The Effect of the Rapid Learning Method in Developing Creative Thinking Among Second-Grade Students in the Middle School in the Subject of History
...Show More Authors

The current research aims to examine the effect of the rapid learning method in developing creative thinking among second-grade female students in the subject of history. Thus, the researcher has adopted an experimental design of two groups to suit the nature of the research. The sample of the study consists of (36) randomly selected students from Al-Shafaq Secondary School for Women, which are divided randomly into two groups. The first group represents the experimental; it includes (31) students who studied the subject of history using the quick learning method. The second group, on the other hand, is the control group, which consists of (32) students, who studied the same subject using the traditional way. Before starting with the exp

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Mar 01 2019
Journal Name
Al-khwarizmi Engineering Journal
Implementation of Neural Control for Continuous Stirred Tank Reactor (CSTR)
...Show More Authors

In this paper a dynamic behavior and control of  a jacketed continuous stirred tank reactor (CSTR)  is developed using different control strategies, conventional feedback control (PI and PID), and neural network (NARMA-L2, and NN Predictive) control. The dynamic model for CSTR process is described by a first order lag system with dead time.

The optimum tuning of control parameters are found by two different methods; Frequency Analysis Curve method (Bode diagram) and Process Reaction Curve using the mean of Square Error (MSE) method. It is found that the Process Reaction Curve method is better than the Frequency Analysis Curve method and PID feedback controller is better than PI feedback controller.

The results s

... Show More
View Publication Preview PDF
Publication Date
Thu Apr 30 2020
Journal Name
Journal Of Economics And Administrative Sciences
Comparison Between Tree regression (TR), and Negative binomial regression (NBR) by Using Simulation.
...Show More Authors

            In this paper, the process of comparison between the tree regression model and the negative binomial regression. As these models included two types of statistical methods represented by the first type "non parameter statistic" which is the tree regression that aims to divide the data set into subgroups, and the second type is the "parameter statistic" of negative binomial regression, which is usually used when dealing with medical data, especially when dealing with large sample sizes. Comparison of these methods according to the average mean squares error (MSE) and using the simulation of the experiment and taking different sample

... Show More
View Publication Preview PDF
Crossref