Preferred Language
Articles
/
voavo4YBIXToZYALzpsk
Intrusion detection method for internet of things based on the spiking neural network and decision tree method
...Show More Authors

The prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices’ power usage. Also, a rand order code (ROC) technique is used with SNN to detect cyber-attacks. The proposed method is evaluated by comparing its performance with two other methods: IDS-DNN and IDS-SNNTLF by using three performance metrics: detection accuracy, latency, and energy usage. The simulation results have shown that IDS-SNNDT attained low power usage and less latency in comparison with IDS-DNN and IDS-SNNTLF methods. Also, IDS-SNNDT has achieved high detection accuracy for cyber-attacks in contrast with IDS-SNNTLF.

Preview PDF
Quick Preview PDF
Publication Date
Wed Jun 01 2022
Journal Name
International Journal Of Early Childhood Special Education
A study of the level of skill self-esteem and some aspects of attention (acute - focus - diversion) and their relationship to the performance of the spiking and serve among young tennis players
...Show More Authors

The purpose of this paper is to identifying the level of skill self-esteem of the young tennis players in the Governorate of Baghdad, identifying some aspects of attention (acuteness, concentration, and diversion of attention) among the young tennis players of the Baghdad governorate, and identify the skills of serve and serve spiking in tennis by young tennis players in Baghdad governorate. The researchers used the descriptive approach in the correlative relations style for its suitability and the research problem. the research sample was chosen in a deliberate way from the youth team players in tennis for the Governorate of Baghdad and the participants in the 2021-2022 sports season, whose number is (20) male players and (4) young playe

... Show More
Publication Date
Tue Aug 03 2021
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The impact of the procedures of the Banking Compliance Controller on the decision to grant credit and default: Applied research in a sample of Iraqi banks
...Show More Authors

Abstracts:

The Central Bank is the backbone of the banking system as a whole, and in order to maintain the banking system, one of the most important functions that the Central Bank performs is the function of supervising and controlling banks, with several tools and methods, and one of the most important of these tools is its creation of the function of a compliance observer, which obligated commercial banks to appoint a person in A bank that performs this function according to certain conditions and granting it some powers that would build a sound and compliant banking system. The function of the compliance observer is to follow up on the bank’s compliance with the instructions and decisions issued by

... Show More
View Publication Preview PDF
Publication Date
Sat Sep 30 2023
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Determinants of Investment Allocations in the Agricultural Sector in Iraq : A Comparison Between the Method of least Squares Approach and the errror Correction Model
...Show More Authors

Abstract

                 The research aimed to test the relationship between the size of investment allocations in the agricultural sector in Iraq and their determinants using the Ordinary Least Squares (OLS) method compared to the Error Correction Model (ECM) approach. The time series data for the period from 1990 to 2021 was utilized. The analysis showed that the estimates obtained using the ECM were more accurate and significant than those obtained using the OLS method. Johansen's test indicated the presence of a long-term equilibrium relationship between the size of investment allocations and their determinants. The results of th

... Show More
View Publication Preview PDF
Publication Date
Fri Mar 01 2024
Journal Name
Baghdad Science Journal
Using the Elzaki decomposition method to solve nonlinear fractional differential equations with the Caputo-Fabrizio fractional operator
...Show More Authors

The techniques of fractional calculus are applied successfully in many branches of science and engineering, one of the techniques is the Elzaki Adomian decomposition method (EADM), which researchers did not study with the fractional derivative of Caputo Fabrizio. This work aims to study the Elzaki Adomian decomposition method (EADM) to solve fractional differential equations with the Caputo-Fabrizio derivative. We presented the algorithm of this method with the CF operator and discussed its convergence by using the method of the Cauchy series then, the method has applied to solve Burger, heat-like, and, couped Burger equations with the Caputo -Fabrizio operator. To conclude the method was convergent and effective for solving this type of

... Show More
View Publication Preview PDF
Scopus (3)
Scopus Crossref
Publication Date
Sat May 01 2021
Journal Name
Journal Of Physics: Conference Series
Morphological study of bronchial tree and lung in Iraqi weasel (Herpestes javanicus)
...Show More Authors
Abstract<p>The current study aimed to identify the morphological description and branches of the bronchial tree and lung for the weasel <italic>Herpestes javanicus</italic> as one of the Iraqi mammals inhabiting the Iraqi environment. In the current study, 10 samples with an mean weight of 288-564 g were used, trachea and lung were removed from the samples and confirmed using proven solutions and laboratory tests were conducted on 5 samples of the study to identify the branches of the bronchial tree using the technique of casting resin and then exposing the samples to erosion. Weasel has a pair of bright pink sponge lungs that occupy most of the thoracic cavity. The lungs look similar </p> ... Show More
View Publication
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Sun Dec 04 2011
Journal Name
Baghdad Science Journal
Modifying Hebbian Network for Text Cipher
...Show More Authors

The objective of this work is to design and implement a cryptography system that enables the sender to send message through any channel (even if this channel is insecure) and the receiver to decrypt the received message without allowing any intruder to break the system and extracting the secret information. This work modernize the feedforward neural network, so the secret message will be encrypted by unsupervised neural network method to get the cipher text that can be decrypted using the same network to get the original text. The security of any cipher system depends on the security of the related keys (that are used by the encryption and the decryption processes) and their corresponding lengths. In this work, the key is the final weights

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Mar 01 2016
Journal Name
Al-academy
THE METHOD OF EXPRESSION IN INNATE AND POPULAR IRAQI SCULPTURAL CONTEMPORARY STUDYING BETWEEN (Hadi KadhimNassif) and (Ibrahim al nakash): كفاح عبد المجيد
...Show More Authors

The innate art,is a major tributary in the art world, It is a bold achievement, has a special flavor, With self-identity, linked to the origins and roots of human ,That goes back to the past and the history and culture of peoples. This business is not limited to only aesthetic side, but is loaded with religious and magical experience, and have social functions, This creations stayed live, breathe, grow, and change with the transformation of society, these processors emerged, from local people have not been trained academically.Their Elvis came from community culture,Which are, Mesopotamian thoroughbreds.This culture that we desperately need today, in order to increase ourselves Iraqi force, In the face of the modern world, which is locke

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Jan 31 2019
Journal Name
Journal Of Engineering
Design of New Hybrid Neural Structure for Modeling and Controlling Nonlinear Systems
...Show More Authors

This paper proposes a new structure of the hybrid neural controller based on the identification model for nonlinear systems. The goal of this work is to employ the structure of the Modified Elman Neural Network (MENN) model into the NARMA-L2 structure instead of Multi-Layer Perceptron (MLP) model in order to construct a new hybrid neural structure that can be used as an identifier model and a nonlinear controller for the SISO linear or nonlinear systems. Weight parameters of the hybrid neural structure with its serial-parallel configuration are adapted by using the Back propagation learning algorithm. The ability of the proposed hybrid neural structure for nonlinear system has achieved a fast learning with minimum number

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Jun 22 2021
Journal Name
Expert Systems
Hybrid intelligent technology for plant health using the fusion of evolutionary optimization and deep neural networks
...Show More Authors

Scopus (2)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Thu Mar 14 2019
Journal Name
Al-khwarizmi Engineering Journal
Sculptured Surface Design and Implementation by Lofting Design Method Using Cross-sectional B-Spline Curves
...Show More Authors

This research presents a particular designing strategy for a free form of surfaces, constructed by the lofting design method. The regarded surfaces were created by sliding a B-spline curves (profile curves), in addition to describing an automatic procedure for selective identification of sampling points in reverse engineering applications using Coordinate Measurement Machine. Two models have been implemented from (Ureol material) to represent the different cases of B-spline types to clarify its scope of application. The interior data of the desired surfaces was designed by MATLAB software, which then were transformed to UG-NX9 software for connecting the sections that were designed in MATLAB program and obtaining G-code programs for the

... Show More
View Publication Preview PDF
Crossref