Preferred Language
Articles
/
voavo4YBIXToZYALzpsk
Intrusion detection method for internet of things based on the spiking neural network and decision tree method
...Show More Authors

The prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices’ power usage. Also, a rand order code (ROC) technique is used with SNN to detect cyber-attacks. The proposed method is evaluated by comparing its performance with two other methods: IDS-DNN and IDS-SNNTLF by using three performance metrics: detection accuracy, latency, and energy usage. The simulation results have shown that IDS-SNNDT attained low power usage and less latency in comparison with IDS-DNN and IDS-SNNTLF methods. Also, IDS-SNNDT has achieved high detection accuracy for cyber-attacks in contrast with IDS-SNNTLF.

Preview PDF
Quick Preview PDF
Publication Date
Wed Jun 28 2023
Journal Name
The Iraqi Journal Of Veterinary Medicine
Haemoglobin Epsilon as a Biomarker for the Molecular Detection of Canine ‎Lymphoma
...Show More Authors

Lymphoma is a cancer arising from B or T lymphocytes that are central immune system ‎components. It is one of the three most common cancers encountered in the canine; ‎lymphoma affects middle-aged to older dogs and usually stems from lymphatic tissues, ‎such as lymph nodes, lymphoid tissue, or spleen. Despite the advance in the management of ‎canine lymphoma, a better understanding of the subtype and tumor aggressiveness is still ‎crucial for improved clinical diagnosis to differentiate malignancy from hyperplastic ‎conditions and to improve decision-making around treating and what treatment type to use. ‎This study aimed to evaluate a potential novel biomarker related to iron metabolism,

... Show More
View Publication
Scopus Crossref
Publication Date
Thu Jan 01 2009
Journal Name
Computer And Information Science 2009
The Stochastic Network Calculus Methodology
...Show More Authors

Home Computer and Information Science 2009 Chapter The Stochastic Network Calculus Methodology Deah J. Kadhim, Saba Q. Jobbar, Wei Liu & Wenqing Cheng Chapter 568 Accesses 1 Citations Part of the Studies in Computational Intelligence book series (SCI,volume 208) Abstract The stochastic network calculus is an evolving new methodology for backlog and delay analysis of networks that can account for statistical multiplexing gain. This paper advances the stochastic network calculus by deriving a network service curve, which expresses the service given to a flow by the network as a whole in terms of a probabilistic bound. The presented network service curve permits the calculation of statistical end-to-end delay and backlog bounds for broad

... Show More
View Publication
Crossref (1)
Scopus Crossref
Publication Date
Sat Jan 01 2022
Journal Name
Indonesian Journal Of Electrical Engineering And Computer Science (ijeecs)
Increasing validation accuracy of a face mask detection by new deep learning model-based classification
...Show More Authors

During COVID-19, wearing a mask was globally mandated in various workplaces, departments, and offices. New deep learning convolutional neural network (CNN) based classifications were proposed to increase the validation accuracy of face mask detection. This work introduces a face mask model that is able to recognize whether a person is wearing mask or not. The proposed model has two stages to detect and recognize the face mask; at the first stage, the Haar cascade detector is used to detect the face, while at the second stage, the proposed CNN model is used as a classification model that is built from scratch. The experiment was applied on masked faces (MAFA) dataset with images of 160x160 pixels size and RGB color. The model achieve

... Show More
Crossref (4)
Crossref
Publication Date
Sat Jan 01 2022
Journal Name
Indonesian Journal Of Electrical Engineering And Computer Science
Increasing validation accuracy of a face mask detection by new deep learning model-based classification
...Show More Authors

During COVID-19, wearing a mask was globally mandated in various workplaces, departments, and offices. New deep learning convolutional neural network (CNN) based classifications were proposed to increase the validation accuracy of face mask detection. This work introduces a face mask model that is able to recognize whether a person is wearing mask or not. The proposed model has two stages to detect and recognize the face mask; at the first stage, the Haar cascade detector is used to detect the face, while at the second stage, the proposed CNN model is used as a classification model that is built from scratch. The experiment was applied on masked faces (MAFA) dataset with images of 160x160 pixels size and RGB color. The model achieve

... Show More
View Publication
Scopus (4)
Crossref (4)
Scopus Crossref
Publication Date
Sun Jan 04 2015
Journal Name
Journal Of Educational And Psychological Researches
Effectiveness of the self-questioning strategy in the achievement of the third stage Institutes of teacher preparation and decision - making in Chemistry
...Show More Authors

This research aims to find out "the effectiveness of the self-questioning strategy in the achievement of students Phase III institutes of teacher preparation and decision-making in chemistry." The researcher follows approach quasi-experimental with a post-test, and the sample consisted of (27) from " Teachers Training Institute-AL-Byaa "in Directorate of Education Baghdad Karkh / 2 students divided into two unequal groups: experimental its number (14) students studied using reciprocal teaching strategy and control its number (13) students have studied in the usual way.The two groups were equivalent extraneous variables.

The researcher was prepare achievement test consist of 40 items was the adoption of a measure of decision-makin

... Show More
View Publication Preview PDF
Publication Date
Fri Jan 01 2016
Journal Name
Aip Conference Proceedings
Analysis of performance measures with single channel fuzzy queues under two class by using ranking method
...Show More Authors

View Publication Preview PDF
Scopus (2)
Scopus Clarivate Crossref
Publication Date
Wed Jun 27 2018
Journal Name
Iraqi Journal Of Science
Proposed Method of Air Traffic Routing in Dynamic Environment Usiing Modifed rrt With Collision Avoid Nace
...Show More Authors

     In the current Airlines Air Traffic Management (ATM), the Air Traffic Control Operators (ATCO), with the Air Traffic Control systems (ATC), operate air traffic paths with a small number of fixed routes. Problems of fixed routes appear such that even when they reduce the chance for conflict, they also produce flight paths plans that do not reduce flight time or fuel usage. In nowadays Airlines are heavily overloaded and anxious to minimize the aircrafts fuel usage costs, increase airplanes, and optimize the paths or the flight routes in order to find the most optimal suitable flight paths. This paper presents a new path planning method that deal with such problem effectively, the idea was to produce flights routes

... Show More
View Publication Preview PDF
Publication Date
Wed May 10 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Adsorption of Thymol From Aqueous Solution Using Granulated Surfactant Initiated Modified Bentonite via Packed Column Method
...Show More Authors

    The adsorption study of thymol, was carried out at (25±0.1) °C, using granulated surfactant modified Iraqi Na – montmorillonite clay (initiated modified bentonite); in a down-flow packed column, the modified mineral was characterized by FT-IR spectroscopy.  A linear calibration graph for thymol was obtained, which obey Beer's law in the concentration range of 5-50 mg/L at 274 nm against reagent blank. Single-factor-at-a-time approach; showed that the equilibrium time required for complete adsorption was 45 minute with flow rate (4.0drop/ mint). The adsorption of thymol increased with rising pH of the adsorbate solution, increase of solute uptake when  the initial adsor

... Show More
View Publication Preview PDF
Publication Date
Wed Jul 05 2017
Journal Name
Https://www.researchgate.net/journal/international-journal-of-science-and-research-ijsr-2319-7064
Evaluation of Water Quality using Bhargava Water Quality Index Method and GIS, Case Study: Euphrates River in Al-Najaf City
...Show More Authors

ENGLISH

Crossref (1)
Crossref
Publication Date
Sun Dec 01 2019
Journal Name
Regenerative Therapy
In vitro periodontal ligament cell expansion by co-culture method and formation of multi-layered periodontal ligament-derived cell sheets
...Show More Authors

Objective: Per-implantitis is one of the implant treatment complications. Dentists have failed to restore damaged periodontium by using conventional therapies. Tissue engineering (stem cells, scaffold and growth factors) aims to reconstruct natural tissues. The paper aimed to isolate both periodontal ligament stem cells (PDLSCs) and bone marrow mesenchymal stem cells (BMMSCs) and use them in a co-culture method to create three-layered cell sheets for reconstructing natural periodontal ligament (PDL) tissue. Materials and methods: BMMSCs were isolated from rabbit tibia and femur, and PDLSC culture was established from the lower right incisor. The cells were co-cultured to induce BMMSC differentiation into PDL cells. Cell morphology, stem cel

... Show More
View Publication
Scopus (16)
Crossref (15)
Scopus Clarivate Crossref