The prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices’ power usage. Also, a rand order code (ROC) technique is used with SNN to detect cyber-attacks. The proposed method is evaluated by comparing its performance with two other methods: IDS-DNN and IDS-SNNTLF by using three performance metrics: detection accuracy, latency, and energy usage. The simulation results have shown that IDS-SNNDT attained low power usage and less latency in comparison with IDS-DNN and IDS-SNNTLF methods. Also, IDS-SNNDT has achieved high detection accuracy for cyber-attacks in contrast with IDS-SNNTLF.
Tigris River water that comes from Turkey represents the main water resource of this river in Iraq. The expansion in water river implementations has formed a source of trouble for the workers in the water resources management field in Iraqi. Unfortunately, there is no agreement between Iraq and Turkey till now to share the water of this international river. Consequently, the optimal operation of water resources systems, particularly a multi-objective, multi-reservoir, is of the most necessity at the present time.
In this research two approaches, were used the dynamic programming (DP) approach and simulation model to find the optimal monthly operation of Ilisu Dam (from an Iraqi point of view) through a comp
... Show MoreAThe Bridge Maintenance Management System (BMMS) is an application system that uses existing data from a Bridge Management System database for monitoring and analysis of current bridges performance, as well as for estimating the current and future maintenance and rehabilitation needs of the bridges. In a transportation context, the maintenance management is described as a cost-effective process to operate, construct, and maintain physical money. This needs analytical tools to support the allocation of resources, materials, equipment, including personnel, and supplies. Therefore, Geographic Information System (GIS) can be considered as one tool to develop the road and bridge maintenanc
The purpose of this paper is to define fuzzy subspaces for fuzzy space of orderings and we prove some results about this definition in which it leads to a lot of new results on fuzzy space of orderings. Also we define the sum and product over such spaces such that: If f = < a1,…,an > and g = < b1,…bm>, their sum and product are f + g = < a1…,an, b1, …, bm> and f × g =
Family social institution mission in the community, if and repaired Magistrate society and often lead that institution a positive role in the socialization, but a variety of factors ailing infect system family Vtfkdh role effective and influential in society and stands at the forefront of those factors disintegration family, whether caused by the death of one or both parents, divorce or separation, or whether the result of domestic weakness and poor family behavioral practices. And gaining the study of great importance and that the scarcity of studies that address the problem of delinquency female, is no secret that stand on the fact the role of disintegration family in the events of that problem will help and a large degree in the devel
... Show MoreMany critics suggest that Beckett’s early plays are comic because they focus their analyses on the use comic elements. Waiting for Godot is one of Beckett’s early plays, and it has been heavily analyzed and read as a comic text partly because its subtitle is “a tragicomedy in two acts” and also because of the comic techniques used in the play. The present paper, however, attempts to read the play as a piece in which comedy fails to produce any effects on the characters who remain apparently very desperate and frustrated throughout the play. The characters perform different comic acts, but they do not really feel amused or entertained. The paper suggests that the acts these characters put on stage are only means to pass t
... Show More