Preferred Language
Articles
/
voavo4YBIXToZYALzpsk
Intrusion detection method for internet of things based on the spiking neural network and decision tree method
...Show More Authors

The prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices’ power usage. Also, a rand order code (ROC) technique is used with SNN to detect cyber-attacks. The proposed method is evaluated by comparing its performance with two other methods: IDS-DNN and IDS-SNNTLF by using three performance metrics: detection accuracy, latency, and energy usage. The simulation results have shown that IDS-SNNDT attained low power usage and less latency in comparison with IDS-DNN and IDS-SNNTLF methods. Also, IDS-SNNDT has achieved high detection accuracy for cyber-attacks in contrast with IDS-SNNTLF.

Preview PDF
Quick Preview PDF
Publication Date
Sun Sep 01 2013
Journal Name
Journal Of Economics And Administrative Sciences
The method of ABC and it, s roules in the Determining the cost of the Project constraction sector
...Show More Authors

Abstract

The basic orientation of the research is an attempting to apply the cost determining method according in the contract sector projects for Al- Iraq ceneral company, that this subject has a big value according to its modernity and  its influence on the future  and the eaning of the company.

The research aims to find out the effect of the method for determining cost based on the activity in determining the cost of the construction sector projects.The research was conducted in Iraq General Company for the implementation of irrigation projects. Bani search on three assumptions, the first is (that the application of the method for determining the cost on the basis of

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Jun 15 2024
Journal Name
Iraqi Journal Of Laser
Estimation of mean photon number based on single photon detection of weak coherent pulses
...Show More Authors

The demand for single photon sources in quantum key distribution (QKD) systems has necessitated the use of weak coherent pulses (WCPs) characterized by a Poissonian distribution. Ensuring security against eavesdropping attacks requires keeping the mean photon number (µ) small and known to legitimate partners. However, accurately determining µ poses challenges due to discrepancies between theoretical calculations and practical implementation. This paper introduces two experiments. The first experiment involves theoretical calculations of µ using several filters to generate the WCPs. The second experiment utilizes a variable attenuator to generate the WCPs, and the value of µ was estimated from the photons detected by the BB

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Sep 15 2023
Journal Name
Al-academy
The aesthetics of employing the Cap Cut program in the montage and effects of digital content on the Internet
...Show More Authors

Traditional programs and the tedious and financially costly processes they require are no longer the best choice for content makers. The continuous development and development have led to the emergence of competitive software that offers capabilities that are more suitable for aesthetic needs, as it breaks down stereotypical frameworks from the familiar to the unfamiliar to be more suitable for graphic subjects in terms of dealing with the requirements of the digital content industry. Video for communication platforms, as it has more advantages than traditional software and the flexibility and high quality it offers at the level of the final product, All of this contributed to supplementing the image with aesthetic employments with data

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Jun 30 2016
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Determination of the Optimum Conditions for the Production of Gamma Alumina (ɤ-Al2O3) By the Precipitation Method of the Sodium Aluminate Solution
...Show More Authors

Design of experiments (DOE) was made by Minitab software for the study of three factors used in the precipitation process of the Sodium Aluminate solution prepared from digestion of α-Al2O3  to determine the optimum conditions to a produce Boehmite which is used in production of ɤ-Al2O3 during drying and calcination processes, the factors are; the temperature of the sodium aluminate solution, concentration of HCl acid added for the precipitation and the pH of the solution at which the precipitation was ended. The design of the experiments leads to 18 experiments.

   The results show that the optimum conditions for the precipitation of the sodium aluminate solution which

... Show More
View Publication Preview PDF
Publication Date
Tue Jan 14 2025
Journal Name
South Eastern European Journal Of Public Health
Deep learning-based threat Intelligence system for IoT Network in Compliance With IEEE Standard
...Show More Authors

The continuous advancement in the use of the IoT has greatly transformed industries, though at the same time it has made the IoT network vulnerable to highly advanced cybercrimes. There are several limitations with traditional security measures for IoT; the protection of distributed and adaptive IoT systems requires new approaches. This research presents novel threat intelligence for IoT networks based on deep learning, which maintains compliance with IEEE standards. Interweaving artificial intelligence with standardization frameworks is the goal of the study and, thus, improves the identification, protection, and reduction of cyber threats impacting IoT environments. The study is systematic and begins by examining IoT-specific thre

... Show More
View Publication
Crossref
Publication Date
Wed Feb 01 2023
Journal Name
International Journal Of Advanced And Applied Sciences
Application of the updated DeLone and McLean IS success method to investigate e-CRM effectiveness
...Show More Authors

Information and communication technology has a significant influence on employee procedures. Businesses are investing in e-CRM technologies, yet it is difficult to assess the performance of their e-CRM platforms. The DeLone and McLean Information Systems Success framework can be modified to the current e-CRM assessment difficulties. The new framework's different aspects provide a concise framework for organizing the e-CRM key metrics identified in this study. The purpose of this study is to apply and verify that the Updated DeLone and McLean IS Model can be employed to explain e-CRM adoption among employees, along with the extended Updated DeLone and McLean Model with its five output factors, namely system quality, service quality,

... Show More
View Publication
Scopus (4)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Sun Jun 30 2013
Journal Name
College Of Islamic Sciences
 Assignment method in the Holy Quran and some of its applications in Surat Al-Anaam
...Show More Authors

Research objective: This research aims to unveil how to use the method of referral in understanding the Holy Quran.
        The reason for choosing the research: The one that invited me to write on this topic is the importance of the referral method, so I liked the research in it, and unveiled this wonderful Qur’anic method, so that it helps to understand the intention of God Almighty in his dear book.
       The research plan: The research was divided into three topics and a conclusion.
   As for the first topic, it is divided into two requirements. The first requirement deals with the definition of referral language.
In the second re

... Show More
View Publication Preview PDF
Publication Date
Mon Dec 20 2021
Journal Name
Baghdad Science Journal
Unifying The Evaluation Criteria Of Many Objectives Optimization Using Fuzzy Delphi Method
...Show More Authors

Many objective optimizations (MaOO) algorithms that intends to solve problems with many objectives (MaOP) (i.e., the problem with more than three objectives) are widely used in various areas such as industrial manufacturing, transportation, sustainability, and even in the medical sector.  Various approaches of MaOO algorithms are available and employed to handle different MaOP cases. In contrast, the performance of the MaOO algorithms assesses based on the balance between the convergence and diversity of the non-dominated solutions measured using different evaluation criteria of the quality performance indicators. Although many evaluation criteria are available, yet most of the evaluation and benchmarking of the MaOO with state-of-art a

... Show More
View Publication Preview PDF
Scopus (6)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Sun Jun 01 2014
Journal Name
International Journal Of Inventive Engineering And Science,
Increase the Capacity Amount of Data Hiding to Least Significant BIT Method
...Show More Authors

Publication Date
Sun Jan 01 2012
Journal Name
كلية التربية-الجامعة المستنصرية
Study the diffusion of Hydrogen in metals using a Runge-Kutta method
...Show More Authors