The prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices’ power usage. Also, a rand order code (ROC) technique is used with SNN to detect cyber-attacks. The proposed method is evaluated by comparing its performance with two other methods: IDS-DNN and IDS-SNNTLF by using three performance metrics: detection accuracy, latency, and energy usage. The simulation results have shown that IDS-SNNDT attained low power usage and less latency in comparison with IDS-DNN and IDS-SNNTLF methods. Also, IDS-SNNDT has achieved high detection accuracy for cyber-attacks in contrast with IDS-SNNTLF.
Compression for color image is now necessary for transmission and storage in the data bases since the color gives a pleasing nature and natural for any object, so three composite techniques based color image compression is implemented to achieve image with high compression, no loss in original image, better performance and good image quality. These techniques are composite stationary wavelet technique (S), composite wavelet technique (W) and composite multi-wavelet technique (M). For the high energy sub-band of the 3 rd level of each composite transform in each composite technique, the compression parameters are calculated. The best composite transform among the 27 types is the three levels of multi-wavelet transform (MMM) in M technique wh
... Show MoreLocalization is an essential issue in pervasive computing application. FM performs worse in some indoor environment when its structure is same to some extent the outdoor environment like shopping mall. Furthermore, FM signal are less varied over time, low power consumption and less effected by human and small object presence when it compared to Wi-Fi. Consequently, this paper focuses on FM radio signal technique and its characteristics that make it suitable to be used for indoor localization, its benefits, areas of applications and limitations.
Compression for color image is now necessary for transmission and storage in the data bases since the color gives a pleasing nature and natural for any object, so three composite techniques based color image compression is implemented to achieve image with high compression, no loss in original image, better performance and good image quality. These techniques are composite stationary wavelet technique (S), composite wavelet technique (W) and composite multi-wavelet technique (M). For the high energy sub-band of the 3rd level of each composite transform in each composite technique, the compression parameters are calculated. The best composite transform among the 27 types is the three levels of multi-wavelet
... Show MoreThis paper proposes a new password generation technique on the basis of mouse motion and a special case location recognized by the number of clicks to protect sensitive data for different companies. Two, three special locations click points for the users has been proposed to increase password complexity. Unlike other currently available random password generators, the path and number of clicks will be added by admin, and authorized users have to be training on it.
This method aims to increase combinations for the graphical password generation using mouse motion for a limited number of users. A mathematical model is developed to calculate the performance
A new technique for embedding image data into another BMP image data is presented. The image data to be embedded is referred to as signature image, while the image into which the signature image is embedded is referred as host image. The host and the signature images are first partitioned into 8x8 blocks, discrete cosine transformed “DCT”, only significant coefficients are retained, the retained coefficients then inserted in the transformed block in a forward and backward zigzag scan direction. The result then inversely transformed and presented as a BMP image file. The peak signal-to-noise ratio (PSNR) is exploited to evaluate the objective visual quality of the host image compared with the original image.
يهدف البحث الى أعداد بعض تمرينات الاساسية لسلاح الشيش بأستخدام المرايا في تطوير قدرة مستوى تعلم الطالبات في المبارزة ومعرفة الفروق بين المجموعتين التجريبي والضابطة بتأثير استخدام المرايا في مستوى اداء بعض مهارات سلاح الشيش لطالبات المرحلة الثالثة , وقد أستخدمت الباحثتان المنهج التجريبي على عينة من طالبات المرحلة الثالثة , وقد بلغ عددهم (45) طالبة , وقد خرجت الباحثتين بعدة أستنتاجات وهي:- - أن المنهاج التعليمي
... Show MoreThe objective of the research is to identify the effect of an instructional design according to the active learning modelsالباحثين in the achievement of the students of the fifth grade, the instructional design was constructed according to the active learning models for the design of education. The research experience was applied for a full academic year (the first & the second term of 2017-2018). The sample consisted of 58 students, 28 students for the experimental group and 30 students for the control group. The experimental design was adopted with partial and post-test, the final achievement test consisted of (50) objectives and essays items on two terms, the validity of the test was verified by the adoption of the Kudoric
... Show MoreSamarium ion selective electrodes we1·e construct.ed and prepared
then tested as probefor Samarium ion detection and determination in different aqueous solutions.
The sensitive membrane is made of PVC which contains Samarium
picrate complexed with either 18-crown-6 or 15-crown-5 ethers as active species.
Different plasticizers: phthalates (DBPH), phosphates (DBP) and
phosphonates (DOPP) were incorporated into the membranes as solvent
mediators.
Every membrane was evaluated practically following &n
... Show MoreDocumentary Credit passes through many practical phases starting from Opening credit and matching documents and payment of the amount of credit……etc. It is worthy to mention that there are several aspects that are varied and differed from Bank to another one which can offer Competitive Advantage for the bank …This will be shown in this research.
For the purpose of achieving the objective of this research within the theoretical aspect, the researcher had seen and briefed several books and researches which are mainly related to the subject of the research.
As for the practical aspect, has included Questionnaire which included many questions that are fit and suitable to the hypotheses.
Research sample has
... Show More