Preferred Language
Articles
/
voavo4YBIXToZYALzpsk
Intrusion detection method for internet of things based on the spiking neural network and decision tree method
...Show More Authors

The prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices’ power usage. Also, a rand order code (ROC) technique is used with SNN to detect cyber-attacks. The proposed method is evaluated by comparing its performance with two other methods: IDS-DNN and IDS-SNNTLF by using three performance metrics: detection accuracy, latency, and energy usage. The simulation results have shown that IDS-SNNDT attained low power usage and less latency in comparison with IDS-DNN and IDS-SNNTLF methods. Also, IDS-SNNDT has achieved high detection accuracy for cyber-attacks in contrast with IDS-SNNTLF.

Preview PDF
Quick Preview PDF
Publication Date
Fri Dec 29 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Efficacy of Some Insect Growth Regulators (IGR) Against Jasmine White Fly Alearoclava Jasimini ( Homoptera: Aleyrodidae) on Citrus Tree
...Show More Authors

The efficacy of five insect growth regulators has been tested against white fly larva Alearoclava jasimini on citrus tree orchards. Data from field tl'ia ls con finned that percent mortalities were 43.7, 33.9, 23.7, 20.8 and     12.3  for  Admiral ( I miL)  pyriproxefen, Nomol t  1 5 SC  (!milL) Teflubenzuren , Match 050 EC (  I milL ) Lufenuren , cascade I 0 F.C (

0.9mi/L) flufenoxaron, and Dimiline 10 EC ( I milL)  Difluben- zuron. The result indicated that Admiral and Nomolt have a continuous  effect for one month , so the treatment needs to be repeated for each four weeks. Also, Admiral and Nomolt effect against eggs hatching by 41. 3 % and

    ... Show More
    View Publication Preview PDF
    Publication Date
    Sat Jan 01 2022
    Journal Name
    3rd International Scientific Conference Of Alkafeel University (iscku 2021)
    Analysis of X-ray diffraction lines profile of Tio2 nanoparticles to determine the energy per unit volume and stress by using Halder-Wagner method
    ...Show More Authors

    In this study, the Halder-Wagner method was used for an analysisX-ray lines of Tio2 nanoparticles. Where the software was used to calculate the FWHM and integral breath (β) to calculate the area under the curve for each of the lines of diffraction. After that, the general equation of the halder- Wagner method is applied to calculate the volume (D), strain (ε), stress (σ), and energy per unit(u). Volume (β). Where the value of the crystal volume was equal to (0.16149870 nm) and the strain was equal to (1.044126), stress (181.678 N / m2), and energy per unit volume (94.8474 J m-3).The results obtained from these methods were then compared with those obtained from each of the new paradigm of the HalderWagner method, the Shearer developm

    ... Show More
    View Publication
    Scopus Crossref
    Publication Date
    Sat Jun 01 2013
    Journal Name
    Journal Of Economics And Administrative Sciences
    Comparison between some well- Known methods to estimate the parameter of the proposed method of measurement and the reliability of the distribution function with two parameters Rally by simulation
    ...Show More Authors

     

     

    Abstract

                Rayleigh distribution is one of the important distributions used for analysis life time data, and has applications in reliability study and physical interpretations. This paper introduces four different methods to estimate the scale parameter, and also estimate reliability function; these methods are Maximum Likelihood, and Bayes and Modified Bayes, and Minimax estimator under squared error loss function, for the scale and reliability function of the generalized Rayleigh distribution are obtained. The comparison is done through simulation procedure, t

    ... Show More
    View Publication Preview PDF
    Crossref
    Publication Date
    Mon Dec 07 2020
    Journal Name
    The International Journal Of Artificial Organs
    Improved hand prostheses control for transradial amputees based on hybrid of voice recognition and electromyography
    ...Show More Authors

    The control of prostheses and their complexities is one of the greatest challenges limiting wide amputees’ use of upper limb prostheses. The main challenges include the difficulty of extracting signals for controlling the prostheses, limited number of degrees of freedom (DoF), and cost-prohibitive for complex controlling systems. In this study, a real-time hybrid control system, based on electromyography (EMG) and voice commands (VC) is designed to render the prosthesis more dexterous with the ability to accomplish amputee’s daily activities proficiently. The voice and EMG systems were combined in three proposed hybrid strategies, each strategy had different number of movements depending on the combination protocol between voic

    ... Show More
    View Publication
    Scopus (4)
    Crossref (5)
    Scopus Clarivate Crossref
    Publication Date
    Mon Oct 03 2022
    Journal Name
    International Journal Of Nonlinear Analysis And Applications
    Use of learning methods for gender and age classification based on front shot face images
    ...Show More Authors

    Publication Date
    Mon May 31 2021
    Journal Name
    Iraqi Journal Of Science
    Single-based and Population-based Metaheuristics for Solving NP-hard Problems
    ...Show More Authors

    Metaheuristic is one of the most well-known fields of research used to find optimum solutions for non-deterministic polynomial hard (NP-hard) problems, for which it is difficult to find an optimal solution in a polynomial time. This paper introduces the metaheuristic-based algorithms and their classifications and non-deterministic polynomial hard problems. It also compares the performance of two metaheuristic-based algorithms (Elephant Herding Optimization algorithm and Tabu Search) to solve the Traveling Salesman Problem (TSP), which is one of the most known non-deterministic polynomial hard problems and widely used in the performance evaluations for different metaheuristics-based optimization algorithms. The experimental results of Ele

    ... Show More
    View Publication Preview PDF
    Crossref (8)
    Crossref
    Publication Date
    Thu Apr 30 2020
    Journal Name
    Journal Of Economics And Administrative Sciences
    Comparison Between Tree regression (TR), and Negative binomial regression (NBR) by Using Simulation.
    ...Show More Authors

                In this paper, the process of comparison between the tree regression model and the negative binomial regression. As these models included two types of statistical methods represented by the first type "non parameter statistic" which is the tree regression that aims to divide the data set into subgroups, and the second type is the "parameter statistic" of negative binomial regression, which is usually used when dealing with medical data, especially when dealing with large sample sizes. Comparison of these methods according to the average mean squares error (MSE) and using the simulation of the experiment and taking different sample

    ... Show More
    View Publication Preview PDF
    Crossref
    Publication Date
    Mon Apr 10 2017
    Journal Name
    Ibn Al-haitham Journal For Pure And Applied Sciences
    Fabrication of Photodetector and Study of Its Structural and Optical Properties of Cadmium Oxide Thin Films Prepared by Vacuum Thermal Evaporation Method
    ...Show More Authors

         The fabricated Photodetector n-CdO /-Si factory thin films Altboukaraharara spatial silicon multi- crystallization of the type (n-Type) the deposition of a thin film of cadmium and at room temperature (300K) and thickness (300 ± 20nm) and the time of deposition (1.25sec) was antioxidant thin films cadmium (Cd) record temperature (673k) for one hour to the presence of air and calculated energy gap optical transitions electronic direct ( allowed ) a function of the absorption coefficient and permeability and reflectivity by recording the spectrum absorbance and permeability of the membrane record within the wavelengths (300 1100nm). was used several the bias ranged between 1-5 Volts. The results showed that this

    ... Show More
    View Publication Preview PDF
    Publication Date
    Fri Jun 30 2023
    Journal Name
    Journal Of The College Of Education For Women
    Investigating The Ideology of Bullying in Hunt’s Fish in a Tree: A Critical Stylistic Approach
    ...Show More Authors

             Language always conveys ideologies that represent an essential aspect of the world we live in. The beliefs and opinions of an individual or community can be organized, interacted with, and negotiated via the use of language. Recent researches have paid attention to bullying as a social issue. They have focused on the psychological aspect of bullying rather than the linguistic one. To bridge this gap, the current study is intended to investigate the ideology of bullying from a critical stylistic perspective. The researchers adopt Jeffries' (2010) critical stylistics model to analyze the data which is five extracts taken from Hunt’s Fish in a Tree (2015). The analysis demonstrates

    ... Show More
    View Publication Preview PDF
    Crossref
    Publication Date
    Sun Jun 12 2011
    Journal Name
    Baghdad Science Journal
    An algorithm for binary codebook design based on the average bitmap replacement error (ABPRE)
    ...Show More Authors

    In this paper, an algorithm for binary codebook design has been used in vector quantization technique, which is used to improve the acceptability of the absolute moment block truncation coding (AMBTC) method. Vector quantization (VQ) method is used to compress the bitmap (the output proposed from the first method (AMBTC)). In this paper, the binary codebook can be engender for many images depending on randomly chosen to the code vectors from a set of binary images vectors, and this codebook is then used to compress all bitmaps of these images. The chosen of the bitmap of image in order to compress it by using this codebook based on the criterion of the average bitmap replacement error (ABPRE). This paper is suitable to reduce bit rates

    ... Show More
    View Publication Preview PDF
    Crossref