The prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices’ power usage. Also, a rand order code (ROC) technique is used with SNN to detect cyber-attacks. The proposed method is evaluated by comparing its performance with two other methods: IDS-DNN and IDS-SNNTLF by using three performance metrics: detection accuracy, latency, and energy usage. The simulation results have shown that IDS-SNNDT attained low power usage and less latency in comparison with IDS-DNN and IDS-SNNTLF methods. Also, IDS-SNNDT has achieved high detection accuracy for cyber-attacks in contrast with IDS-SNNTLF.
Praise be to God alone, and prayers and peace be upon the one after whom there is no prophet, and after:
This is a regular judicial search for the issuance, validity, and cancellation of regulations in the Saudi system. It came in an introduction and four demands and a conclusion of the most important results, then a list of the most important sources and references, in which I presented: A brief study on the issuance of regulations in the Kingdom of Saudi Arabia and the stages that they pass through, their validity and application, and the rules that govern this system in terms of people, places and times, then canceling and amending regulations And its rulings, I referred to it to the original sources approved in this section,
... Show MoreIt is not long time since globalization has started along with knowledge economy and, communication media and technical information control on the world. As a result serious events appeared like failure in businesses, financial corruption and shortage of administration and control.
In spite of the great efforts held by international organizations and foundations to find organizational frames that adopt independence, que
... Show MoreOxidative stress is oxidative damage caused by free radicals and reactive oxygen species (ROS). These ROS can cause oxidative damage to cellular components, including membrane lipids, receptors, enzymes, proteins, and nucleic acids. It would eventually lead to cell apoptosis and the appearance of certain pathological conditions. This work investigates the antioxidant potentials of chamomile extract in vitro by evaluating the extract activity to scavenge 2,2-Diphenyl-1-picrylhydrazyl (DPPH), also in vivo by investigating its effects on oxidative stress-induced rats by assessing the total oxidant status (TOS) and total antioxidant capacity in the radiation exposed rats with and without the treatment with chamomile extract. The results
... Show MoreA hydraulic platform was manufactured to serve palm trees and to enhance palm tree services, with a height of 12 meters, by the General Company for Hydraulic Industries, one of the Ministry of Industry's formations. This platform was tested in the field after being manufactured according to a randomized complete block design using split-split plots with three factors. The first factor represented the shape of the orchard land, with two levels (flat land and uneven land), serving as the main plots. The second factor had three levels representing palm tree heights (4, 8, and 12 meters), which served as the sub-plots. The third factor was the palm tree services, represented at three levels (pruning, pollination, and harvesting), with each trea
... Show MoreIraqi legislator taxation married women in charge of the income tax treatment of the man in charge of tax and the application of the principle of equality of individuals to bear public burdens. The factor legislator women in charge of special treatment in some cases, taking into account the circumstances family allow tax in the case of whether she was married to a man is unable to completely work and does not have a resource, as well as giving the legislator allow for her children. it observed that the amount of allowing still little is notcommensurate with the high cost of living in addition to limiting the tax allowances granted within the limits of the taxpayer and his immediate family did not take the legisla
... Show MoreIn this paper ,the problem of point estimation for the two parameters of logistic distribution has been investigated using simulation technique. The rank sampling set estimator method which is one of the Non_Baysian procedure and Lindley approximation estimator method which is one of the Baysian method were used to estimate the parameters of logistic distribution. Comparing between these two mentioned methods by employing mean square error measure and mean absolute percentage error measure .At last simulation technique used to generate many number of samples sizes to compare between these methods.