The fast evolution of cyberattacks in the Internet of Things (IoT) area, presents new security challenges concerning Zero Day (ZD) attacks, due to the growth of both numbers and the diversity of new cyberattacks. Furthermore, Intrusion Detection System (IDSs) relying on a dataset of historical or signature‐based datasets often perform poorly in ZD detection. A new technique for detecting zero‐day (ZD) attacks in IoT‐based Conventional Spiking Neural Networks (CSNN), termed ZD‐CSNN, is proposed. The model comprises three key levels: (1) Data Pre‐processing, in this level a thorough cleaning process is applied to the CIC IoT Dataset 2023, which contains both malicious and t
This paper is concerned with combining two different transforms to present a new joint transform FHET and its inverse transform IFHET. Also, the most important property of FHET was concluded and proved, which is called the finite Hankel – Elzaki transforms of the Bessel differential operator property, this property was discussed for two different boundary conditions, Dirichlet and Robin. Where the importance of this property is shown by solving axisymmetric partial differential equations and transitioning to an algebraic equation directly. Also, the joint Finite Hankel-Elzaki transform method was applied in solving a mathematical-physical problem, which is the Hotdog Problem. A steady state which does not depend on time was discussed f
... Show MoreThe research aims at the possibility of measuring the technical and scale efficiency (SE) of the departments of the College of Administration and Economics at the University of Baghdad for a period lasting 8 years, from the academic year 2013-2014 to 2018-2019 using the method of Applied Data Analysis with an input and output orientation to maintain the distinguished competitive position and try to identify weaknesses in performance and address them. Nevertheless, the research problem lies in diagnosing the most acceptable specializations in the labor market and determining the reasons for students’ reluctance to enter some departments. Furthermore, the (Win4DEAp) program was used to measure technical and scale efficiency (SE) and rely on
... Show MoreBackground:Nocturnal Enuresis is a common problem affecting 20% of five years old children and up to 2% of adolescent and young adult. Although it is a self limiting benign condition, it has social and psychological impact on the child and his family. Many pathophysiological theories had been suggested, but none is confirmed. Hypercalciuria has been suggested to be associated with higher incidence of nocturnal enuresis. Objectives:The aim of our study to test the value of Ca/Cr ratio, on random urine sample, in diagnosing hypercalciuria in enuretic children. Type of study: Cross sectional study.Methods:Forty four enuretic children were enrolled in this study and forty five children without nocturnal enuresis were taken as control group.
... Show MoreThe study aimed to assess the level of ANG‑2 in MM patients at diagnosis and in remission state and elaborate on its correlation with interleukin‑6 (IL‑6) and beta‑2 microglobulin (B2M) levels. Sixty MM patients; 20 newly diagnosed (ND), and 40 patients in remission were included. Twenty healthy individuals were included as a control group. Plasma levels of ANG‑2, B2M, and IL‑6 were tested by enzyme‑lin ked immunosorbent assay. There are significant statistical differences between ND patients and those in remission in hemoglobin, neutrophil count, blood urea, serum creatinine, glomerular filtration rate, B2M, IL6, and ANG‑2 (P = 0.001, 0.033, 0.005, 0.001, 0.001, 0.001, 0.004, and 0.001, respectively). ANG‑2 showed signifi
... Show MoreIntrusion detection systems (IDS) are useful tools that help security administrators in the developing task to secure the network and alert in any possible harmful event. IDS can be classified either as misuse or anomaly, depending on the detection methodology. Where Misuse IDS can recognize the known attack based on their signatures, the main disadvantage of these systems is that they cannot detect new attacks. At the same time, the anomaly IDS depends on normal behaviour, where the main advantage of this system is its ability to discover new attacks. On the other hand, the main drawback of anomaly IDS is high false alarm rate results. Therefore, a hybrid IDS is a combination of misuse and anomaly and acts as a solution to overcome the dis
... Show MoreIn this paper, we present multiple bit error correction coding scheme based on extended Hamming product code combined with type II HARQ using shared resources for on chip interconnect. The shared resources reduce the hardware complexity of the encoder and decoder compared to the existing three stages iterative decoding method for on chip interconnects. The proposed method of decoding achieves 20% and 28% reduction in area and power consumption respectively, with only small increase in decoder delay compared to the existing three stage iterative decoding scheme for multiple bit error correction. The proposed code also achieves excellent improvement in residual flit error rate and up to 58% of total power consumption compared to the other err
... Show MoreMatrix acidizing is a good stimulation process in which acid is introduced into the reservoir near the wellbore area via the wellbore or coil tubing. In the oil industry, formation damage is a prevalent problem. Bypassing wellbore damage by producing wormholes in carbonate reservoirs is the main purpose of acidizing the matrix of the formation. When doing lab tests, scientists are looking for a wormhole-inducing injection rate that can be used in the field. Meantime the ongoing works on the Ahdeb oil field's Mishrif reservoir, several reports have documented the difficulties encountered during stimulation operations, including high injection pressures that make it difficult to inject acid into the reservoir formation; and only a few
... Show More