Preferred Language
Articles
/
voavo4YBIXToZYALzpsk
Intrusion detection method for internet of things based on the spiking neural network and decision tree method
...Show More Authors

The prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices’ power usage. Also, a rand order code (ROC) technique is used with SNN to detect cyber-attacks. The proposed method is evaluated by comparing its performance with two other methods: IDS-DNN and IDS-SNNTLF by using three performance metrics: detection accuracy, latency, and energy usage. The simulation results have shown that IDS-SNNDT attained low power usage and less latency in comparison with IDS-DNN and IDS-SNNTLF methods. Also, IDS-SNNDT has achieved high detection accuracy for cyber-attacks in contrast with IDS-SNNTLF.

Preview PDF
Quick Preview PDF
Publication Date
Mon Feb 04 2019
Journal Name
Journal Of The College Of Education For Women
Most preference colours for Iraqi Femal clothes in university level and theire psychology efect
...Show More Authors

Colour is part of human environ ment and is present almost every
where in cluding clothes.
Clours have positive and negative effects on the person's psychology.
Thus we can ask the following question: what are the clours preffered
by the Iraqi females in the university level and what is the lightness and purity
of these colours and their effect on their psychology?
In this research we included 563 Baghdad university female student for
the year 2005-2006.
The question are included anumber of qnestions that gave answers to
the research main objectives.

View Publication Preview PDF
Publication Date
Sat Dec 31 2022
Journal Name
Iraqi Geological Journal
Geochemical Criteria for Discriminating Shallow and Deep Environments in Oligocene-Miocene Succession, Western Iraq
...Show More Authors

The geochemical study of the Oligocene-Miocene succession Anah, Euphrates, and Fatha formations, western Iraq, was carried out to discriminate their depositional environments. Different major and trace patterns were observed between these formations. The major elements (Ca, Mg, Fe, Mn, K, and Na) and trace elements (Li, V, Cr, Co, Ni, Cu, Zn, Ga, Rb, Sr, Zr, Cs, Ba, Hf, W, Pb, Th, and U) are a function of the setting of the depositional environments. The reefal facies have lower concentrations of MgO, Li, Cr, Co, Ni, Ga, Rb, Zr, and Ba than marine and lagoonal facies but have higher concentrations of CaO, V, and Sr than it. Whereas dolomitic limestone facies are enriched V, and U while depletion in Li, Cr, Ni, Ga, Rb, Sr, Zr, Ba, an

... Show More
View Publication
Crossref
Publication Date
Sun Jul 30 2023
Journal Name
Iraqi Journal Of Science
Using Visual Cryptography and hash function for Fragile Watermarking to Detect Electronic Document Forgery
...Show More Authors

     Recent developments in technology and the area of digital communications have rendered digital images increasingly susceptible to tampering and alteration by persons who are not authorized to do so. This may appear to be acceptable, especially if an image editing process is necessary to delete or add a particular scene that improves the quality the image. But what about images used in authorized governmental transactions? The consequences can be severe; any altered document is considered forged under the law and may cause confusion. Also, any document that cannot be verified as being authentic is regarded as a fake and cannot be used, inflicting harm on people. The suggested work intends to reduce fraud in electronic documents u

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Wed Mar 15 2023
Journal Name
Journal Of The Turkish-german Gynecological Association
Obstetric and neonatal complications in large for gestational age pregnancy with late gestational diabetes
...Show More Authors

View Publication Preview PDF
Scopus (2)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Wed Apr 03 2013
Journal Name
Iraqi Journal Of Medical Sciences
Ligasure versus clamp and tie technique to achieve henostasis in thyroidectomy for benign diseases
...Show More Authors

Publication Date
Thu Jun 01 2017
Journal Name
Journal Of Economics And Administrative Sciences
Proposed Entropy Loss function and application to find Bayesian estimator for Exponential distribution parameter
...Show More Authors

The aim of this paper to find Bayes estimator under new loss function assemble between symmetric and asymmetric loss functions, namely, proposed entropy loss function, where this function that merge between entropy loss function and the squared Log error Loss function, which is quite asymmetric in nature. then comparison a the Bayes estimators of exponential distribution under the proposed function, whoever, loss functions ingredient for the proposed function the using a standard mean square error (MSE) and Bias quantity (Mbias), where the generation of the random data using the simulation for estimate exponential distribution parameters different sample sizes (n=10,50,100) and (N=1000), taking initial

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Dec 05 2023
Journal Name
Baghdad Science Journal
A Novel System for Confidential Medical Data Storage Using Chaskey Encryption and Blockchain Technology
...Show More Authors

Secure storage of confidential medical information is critical to healthcare organizations seeking to protect patient's privacy and comply with regulatory requirements. This paper presents a new scheme for secure storage of medical data using Chaskey cryptography and blockchain technology. The system uses Chaskey encryption to ensure integrity and confidentiality of medical data, blockchain technology to provide a scalable and decentralized storage solution. The system also uses Bflow segmentation and vertical segmentation technologies to enhance scalability and manage the stored data. In addition, the system uses smart contracts to enforce access control policies and other security measures. The description of the system detailing and p

... Show More
View Publication Preview PDF
Scopus (2)
Scopus Crossref
Publication Date
Wed Aug 25 2021
Journal Name
Caai Transactions On Intelligence Technology
Shoulder girdle recognition using electrophysiological and low frequency anatomical contraction signals for prosthesis control
...Show More Authors

View Publication Preview PDF
Scopus (13)
Crossref (11)
Scopus Clarivate Crossref
Publication Date
Sat Dec 30 2023
Journal Name
Iraqi Journal Of Science
Anatomical study for leaves and Epidermal properties in Athionema R.BR. species (Brassicaceae) in Iraq.
...Show More Authors

The research included anatomical study of nine wild species of the genus
Athionema R.BR. from BrassicaceA family in Iraq, and these species are:
A.arabicum (L.), A.carneum (Banks et sol.),A. cordifolium (DC.), A.fimbriatum
(Boiss.),A. froedinii (Rech. F.), A. speciosum (Boiss. et Huet), A. syriacum
(Boiss.),A. grandiflorum (Boiss. et Hoh.) , A.trinervium (D.C.).The research
covered the anatomical characteristic of the leaf Epidermis as well as leaves
venation, also transvers sections for leaves were studied ,and revealed that some
anatomical characteristics have taxonomic importance in distinguishing the species.
This research also showed the presence of important variations in internal charecters
for leaves an

... Show More
View Publication Preview PDF
Publication Date
Fri Jan 26 2024
Journal Name
Iraqi Journal Of Science
Longitudinal and Transverse Electron Scattering Form Factors for 13C Nucleus with Core-Polarization Effects
...Show More Authors

Inelastic electron scattering have been studied for (3.68 )
2
1
2
3
MeV

,
(7.55 )
2
1
2
5
MeV

(15.11 )
2
3
2
3
MeV

states in the 13C nucleus. 4He is considered as an inert core with
nine nucleons out of it (the model space of nucleus). Form factors are calculated by
using Cohen-Kurath interaction for 1p-shell model space with Modified Surface
Delta Interaction (MSDI) as a residual interaction for higher configuration. The
study of core-polarization effects on the form factors is based on microscopic
theory, which combines shell model wave functions and configurations with higher
energy as the first order perturbation. The radial wave functions

... Show More
View Publication Preview PDF