The prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices’ power usage. Also, a rand order code (ROC) technique is used with SNN to detect cyber-attacks. The proposed method is evaluated by comparing its performance with two other methods: IDS-DNN and IDS-SNNTLF by using three performance metrics: detection accuracy, latency, and energy usage. The simulation results have shown that IDS-SNNDT attained low power usage and less latency in comparison with IDS-DNN and IDS-SNNTLF methods. Also, IDS-SNNDT has achieved high detection accuracy for cyber-attacks in contrast with IDS-SNNTLF.
This study measures the indicators of social and environmental performance of the contents of the administration's prepared reports on its social and environmental performance by comparing the actual performance with the indicators set within the standards of the Global Reports Initiative (GRI), In preparing this research, the researchers relied on studying the criteria of the Global Reporting Initiative, which aims to achieve a high level of performance disclosure under sustainability, In light of contemporary global trends towards achieving sustainable development and its disclosure and the orientations of economic institutions and units in different countries towards emphasizing the extent of commitment during practicing its a
... Show MoreThis study attempts to address the importance of communicative digitization in the field of various arts for the sake of continuity of shopping and aesthetic, artistic and intellectual appreciation of artistic achievements by the recipient on various places of their residence in light of the COVID 19 crisis, and to highlight the importance of the plastic arts of the Iraqi painter exclusively and how it expresses in a contemporary way the environment or life reality in Iraq in light of this crisis. With all its implications affecting the life reality from various aspects and methods of its negative and positive employment. As for the research procedures, the researcher reviewed the research methodology represented by the descriptive ana
... Show MoreAbstract:
Saudi Arabia and United States long relation could present an important
subject to understand alliance kind in international relations types. We trying
in this study to diagnose and analyze the Saudi Arabia and United States
model to find balance and unbalance statues and its influence on the
directions of Saudi Arabia foreign policy positions.
We divided the study in two parts, each part have many sections. The
first part deal with the historian emergence of Saudi Arabia state and its
development in three stages including its foreign relations with regions and
international powers. While the second part was dedicated in analyzing and
understanding the mechanism and active facts that drawing the Sa
Inˑthis work, we introduce the algebraic structure of semigroup with KU-algebra is called KU-semigroup and then we investigate some basic properties of this structure. We define the KU-semigroup and several examples are presented. Also,we study some types of ideals in this concept such as S-ideal,k- ideal and P-ideal.The relations between these types of ideals are discussed and few results for product S-ideals of product KU-semigroups are given. Furthermore, few results of some ideals in KU-semigroup under homomorphism are discussed.
in recent years cryptography has played a big role especially in computer science for information security block cipher and public
Let R be a commutative ring with identity, and let M be a unitary left R-module. M is called Z-regular if every cyclic submodule (equivalently every finitely generated) is projective and direct summand. And a module M is F-regular if every submodule of M is pure. In this paper we study a class of modules lies between Z-regular and F-regular module, we call these modules regular modules.
Background: Herbs are being widely explored to discover alternatives to synthetic antibacterial agents.Small Cardamom often referred to as queen of spices because of its very pleasant aroma and taste, have a history as old as human race. Most people use cardamom as a spice and are largely unaware of its numerous health benefits. The purpose of this study was to evaluate the effect of different concentrations of water and alcoholic cardamom extracts on sensitivities, growth, and adherence of Mutans streptococci in vitro. Materials and Methods: In this study, saliva was collected from ten volunteers (College students 18-22 years). Agar well technique was used to study the sensitivities of Mutans streptococci to different concentrations of s
... Show MoreBackground: Propolis has received great interest because of its wide range antimicrobial activity. Propolis also called (bee glue) due to its collection by (Apismellifera) honeybees from various plants resinous substance. The aim of this study was to determine the antibacterial effect of propolis extracts (aqueous and alcoholic) on anaerobic periodontal pathogen namely Aggregatibacteractinomycetemcomitans. Materials and Methods: Strains of Aggregatibacter actinomycetemcomitans wasisolated from pockets of systemically healthy patients aged between 35-55 years old suffering from chronic periodontitis with pocket depths of 5-6 mm, the bacteria cultured on special blood Agar plates solid media. Propolis was extracted by using water and alcohol.
... Show MoreBackground: Spices and herbs have been used by many cultures to enhance the flavor and aroma of food and for their medicinal value. Black cardamom is one of these spices widely used in cooking because of its unique taste and powerful flavor. The aim of study was to test the effect of black cardamom on Mutans Streptococci in comparison to chlorhexidine gluconate (0.2%) and de-ionized water. Materials and methods: Dried fruits of black cardamom were extracted by using alcohol (70% ethanol). Saliva was collected from seven volunteers. Agar well technique with different concentrations of black cardamom extracts was used to test the sensitivities of Mutans Streptococci, as well black cardamom extracts effect on viable counts of Mutans Streptococ
... Show MoreObjectives: This study aimed to evaluate the therapeutic potential effects of ascorbic acid or and pyridoxine on diabetic renal microalbumiuria. Methods: This was a cross-sectional study on patients with diabetes mellitus at Al-Yarmouk teaching hospital from January to December 2012, Iraq-Baghdad. Twenty one patients with diabetes mellitus (D.M), 8 IDDM and 13 IDDM were selected from, the duration of disease were ranged from 2-12 years for both type (10 females and 11males) and all enrolled patients ages were ranged from 28-65years. The concentration of total protein in urine was calculated by a biuret colorimetric assay and the urine creatinine level was measured by a modified Jaffe test. Statistical analysis: results are expressed as mean
... Show More