The prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices’ power usage. Also, a rand order code (ROC) technique is used with SNN to detect cyber-attacks. The proposed method is evaluated by comparing its performance with two other methods: IDS-DNN and IDS-SNNTLF by using three performance metrics: detection accuracy, latency, and energy usage. The simulation results have shown that IDS-SNNDT attained low power usage and less latency in comparison with IDS-DNN and IDS-SNNTLF methods. Also, IDS-SNNDT has achieved high detection accuracy for cyber-attacks in contrast with IDS-SNNTLF.
Abstract
The research aims to measure family negligence and its relationship with internet addiction among university students. The researcher has developed a scale of (20) items to measure the negligence of family, which was applied to (308) male and female university students in the first and fourth stages. The research concluded that University students suffer from family negligence. The research sample has an addiction to the Internet. There is a relationship between family neglect and addiction to the Internet among university students. The researcher came out with a number of suggestions and recommendations.
Software-defined networks (SDN) have a centralized control architecture that makes them a tempting target for cyber attackers. One of the major threats is distributed denial of service (DDoS) attacks. It aims to exhaust network resources to make its services unavailable to legitimate users. DDoS attack detection based on machine learning algorithms is considered one of the most used techniques in SDN security. In this paper, four machine learning techniques (Random Forest, K-nearest neighbors, Naive Bayes, and Logistic Regression) have been tested to detect DDoS attacks. Also, a mitigation technique has been used to eliminate the attack effect on SDN. RF and KNN were selected because of their high accuracy results. Three types of ne
... Show MoreRoads irrespective of the type have specific standard horizontal distance measured at 90 degrees from a lot boundary to a development known as a setback. Non-observance of the recommended setbacks accommodated in any urban center’s master plan creates noise hazard to the public health and safety as the movement of vehicular traffic is not without the attendant noise. This study assessed noise intrusion level in shops along a section of Ibadan-Abeokuta road with due consideration to compliance with the recommended building structure setback. Analysis of noise descriptors evaluated in this study gave A-weighted equivalent sound pressure level average of 91.3 dBA, the daytime average sound level (LD) 92.27 dBA,
... Show MoreThis research aims at building a proposed training program according to the self-regulated strategies for the mathematics teachers and to identify the effect of this program on relational Mathematics of teachers. The sample of the research was (60) Math teachers; (30) teachers as experimental group and (30) teachers as control group. The results of the current research reacheded that the proposed training program according to some self-managed learning strategies, meets the needs of trainees with remarkable effectiveness to improve the level of their teaching performance to achieve the desired goals. Training teacher according to self-managed learning strategies is effective in bringing about the transition of training to their students
... Show MoreIn this work ,the modified williamos-Hall method was used to analysis the x-ray diffraction lines for powder of magnesium oxide nanoparticles (Mgo) .and for diffraction lines (111),(200),(220),(311) and (222).where by used special programs such as origin pro Lab and Get Data Graph ,to calculate the Full width at half maximum (FWHM) and integral breadth (B) to calculate the area under the curve for each of the lines of diffraction .After that , by using modified Williamson –Hall equations to determin the values of crystallite size (D),lattice strain (ε),stress( σ ) and energy (U) , where was the results are , D=17.639 nm ,ε =0.002205 , σ=0.517 and U=0.000678 respectively. And then using the scherrer method can by calculated the crystal
... Show More
Abstract
The research hypothesizes is that the external Environment
has the responsibility concerning decisions making and behavioral
upon industrial firms. It is, Furthermore, an attempt to review the
problem of closures of private industrial firms in the country, during
the period (1976-1985), i.e. prior to and during the Iraqian- Iranian
war.
The behavioral approach of industrial geography has been
adopted as a theoretical background and the statistical test has
been practiced for the applied purposes.
As result, the research comes out with suggestions,
depending upon previous trials in the field of direction and
formulation of the of the private industrial sector. The chief point
among th
A novel technique for nanoparticles with a chemical method and impact for resistance bacteria methicillin-resistant Staphylococcus aureus (MRSA), UV-visible analysis confirmed the by Fourier transform infrared spectroscopy (FT-IR) and Energy dispersive X-Ray (EDX), Scanning electron microscope (SEM) and X-ray diffraction pattern estimation antimicrobial excellent antibacterial activity against MRSA (with zone of inhibition of 11 ± 02 mm , 9 ± 01 mm,8 ± 03 mm and 7.5 ± 02 mm and 6.5 ± 02 mm) at different concentrations (0.5 ,0.25, 0.125, 0.0625, 0.03125) mg/ml while good activity was 16 ± 03 mm at 17 ± 02 mm zone at 0.25, 0.125 mg/mL, respectively. The increase in microorganism resistance to antibiotics a couple of have caused
... Show MoreShadow removal is crucial for robot and machine vision as the accuracy of object detection is greatly influenced by the uncertainty and ambiguity of the visual scene. In this paper, we introduce a new algorithm for shadow detection and removal based on different shapes, orientations, and spatial extents of Gaussian equations. Here, the contrast information of the visual scene is utilized for shadow detection and removal through five consecutive processing stages. In the first stage, contrast filtering is performed to obtain the contrast information of the image. The second stage involves a normalization process that suppresses noise and generates a balanced intensity at a specific position compared to the neighboring intensit
... Show More