Preferred Language
Articles
/
0hinJ5gBVTCNdQwCQrkX
Deep learning-based threat Intelligence system for IoT Network in Compliance With IEEE Standard
...Show More Authors

The continuous advancement in the use of the IoT has greatly transformed industries, though at the same time it has made the IoT network vulnerable to highly advanced cybercrimes. There are several limitations with traditional security measures for IoT; the protection of distributed and adaptive IoT systems requires new approaches. This research presents novel threat intelligence for IoT networks based on deep learning, which maintains compliance with IEEE standards. Interweaving artificial intelligence with standardization frameworks is the goal of the study and, thus, improves the identification, protection, and reduction of cyber threats impacting IoT environments. The study is systematic and begins by examining IoT-specific threat data recovered from the publicly available data sets CICIDS2017 and IoT-23. Classification of network anomalies and feature extraction are carried out with the help of deep learning models such as CNN and LSTM. This paper’s proposed system complies with IEEE standards like IEEE 802.15.4 for secure IoT transmission and IEEE P2413 for architecture. A testbed is developed in order to use the model and assess its effectiveness in terms of overall accuracy, detection ratio, and time to detect an event. The findings of the study prove that threat intelligence systems built with deep learning provide explicit security to IoT networks when they are designed as per the IEEE guidelines. The proposed model retains a high detection rate, is scalable, and is useful in protecting against new forms of attacks. This research develops an approach to provide standard-compliant cybersecurity solutions to enable trust and reliability in the IoT applications across the industrial sectors. More future research can be devoted to the implementation of this system within the context of the newest advancements in technologies, such as edge computing.

Crossref
View Publication
Publication Date
Thu Dec 31 2020
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Auditing the accounts of research and exploration stage in accordance with the financial reporting standard (6)
...Show More Authors

The oil and gas production industry is considered the most important industries in the modern world because of its large relative significance among the group of energy recourses required for the world, where the natural resources represent the oil and natural gas fields, phosphate, gold, coal, forests and others. The most important advantage of the natural resources is its need for huge financial investments for a relatively long period of time from the beginning of the work until the start of extracting natural resources. Also, there are numerous cases where the natural source is not feasible exploited economically and is not discovered until after the passage of a long period of time from the start of work and paying relatively high a

... Show More
View Publication Preview PDF
Publication Date
Tue Jun 01 2021
Journal Name
2021 Ieee/cvf Conference On Computer Vision And Pattern Recognition Workshops (cvprw)
Alps: Adaptive Quantization of Deep Neural Networks with GeneraLized PositS
...Show More Authors

View Publication
Scopus (13)
Crossref (13)
Scopus Clarivate Crossref
Publication Date
Mon Jun 01 2020
Journal Name
Journal Of Planner And Development
The "actor network theory" approach in dealing with landscapes in historical centers
...Show More Authors

The historical center's landscape suffers from neglect, despite their importance and broad capabilities in enhancing the cultural value of the historical center, as landscape includes many heterogeneous human and non-human components, material and immaterial, natural and manufactured, also different historical layers, ancient, modern and contemporary. Due to the difference in these components and layers, it has become difficult for the designer to deal with it. Therefore, the research was directed by following a methodology of actor-network theory as it deals with such a complex system and concerned with an advanced method to connect the various components of considering landscape as a ground that can include various elements and deal wi

... Show More
View Publication Preview PDF
Publication Date
Sat Dec 17 2022
Journal Name
Applied Sciences
A Hybrid Artificial Intelligence Model for Detecting Keratoconus
...Show More Authors

Machine learning models have recently provided great promise in diagnosis of several ophthalmic disorders, including keratoconus (KCN). Keratoconus, a noninflammatory ectatic corneal disorder characterized by progressive cornea thinning, is challenging to detect as signs may be subtle. Several machine learning models have been proposed to detect KCN, however most of the models are supervised and thus require large well-annotated data. This paper proposes a new unsupervised model to detect KCN, based on adapted flower pollination algorithm (FPA) and the k-means algorithm. We will evaluate the proposed models using corneal data collected from 5430 eyes at different stages of KCN severity (1520 healthy, 331 KCN1, 1319 KCN2, 1699 KCN3 a

... Show More
View Publication
Scopus (2)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Sat Dec 01 2018
Journal Name
Journal Of Hydrology
Complementary data-intelligence model for river flow simulation
...Show More Authors

View Publication
Crossref (87)
Crossref
Publication Date
Sat Sep 30 2023
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The typical path of compliance control in the verification of tax revenues
...Show More Authors

The research aims to contribute to the consolidation of scientific knowledge of compliance control and its role in verifying the proper disposal of funds to manage the wheel of the economy towards achieving targeted development and preserving public money, as well as clarifying the role of tax revenues in strengthening the public treasury and achieving social justice. The analytical descriptive approach was adopted in the process of analyzing The quantitative data collected through personal interviews, and the research reached a set of conclusions, the most important of which is the contribution of compliance control according to its three principles. (Transparency, accountability, and inclusiveness) on the availability

... Show More
View Publication Preview PDF
Publication Date
Thu Dec 01 2022
Journal Name
Baghdad Science Journal
Steganography and Cryptography Techniques Based Secure Data Transferring Through Public Network Channel
...Show More Authors

Attacking a transferred data over a network is frequently happened millions time a day. To address this problem, a secure scheme is proposed which is securing a transferred data over a network. The proposed scheme uses two techniques to guarantee a secure transferring for a message. The message is encrypted as a first step, and then it is hided in a video cover.  The proposed encrypting technique is RC4 stream cipher algorithm in order to increase the message's confidentiality, as well as improving the least significant bit embedding algorithm (LSB) by adding an additional layer of security. The improvement of the LSB method comes by replacing the adopted sequential selection by a random selection manner of the frames and the pixels wit

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Tue Oct 25 2022
Journal Name
Minar Congress 6
HANDWRITTEN DIGITS CLASSIFICATION BASED ON DISCRETE WAVELET TRANSFORM AND SPIKE NEURAL NETWORK
...Show More Authors

In this paper, a handwritten digit classification system is proposed based on the Discrete Wavelet Transform and Spike Neural Network. The system consists of three stages. The first stage is for preprocessing the data and the second stage is for feature extraction, which is based on Discrete Wavelet Transform (DWT). The third stage is for classification and is based on a Spiking Neural Network (SNN). To evaluate the system, two standard databases are used: the MADBase database and the MNIST database. The proposed system achieved a high classification accuracy rate with 99.1% for the MADBase database and 99.9% for the MNIST database

View Publication Preview PDF
Publication Date
Mon Oct 06 2014
Journal Name
Journal Of Educational And Psychological Researches
The Effect of the Problem Based Learning on EFL Learners’ Achievement
...Show More Authors

The present study discusses the problem based learning in Iraqi classroom. This method aims to involve all learners in collaborative activities and it is learner-centered method. To fulfill the aims and verify the hypothesis which reads as follow” It is hypothesized that there is no statistically significant differences between the achievements of Experimental group and control group”. Thirty learners are selected to be the sample of present study.Mann-Whitney Test for two independent samples is used to analysis the results. The analysis shows that experimental group’s members who are taught according to problem based learning gets higher scores than the control group’s members who are taught according to traditional method. This

... Show More
View Publication Preview PDF
Publication Date
Sun Jan 04 2015
Journal Name
Journal Of Educational And Psychological Researches
The Effect of the Problem Based Learning on EFL Learners’ Achievement
...Show More Authors

The present study discusses the problem based learning in Iraqi classroom. This method aims to involve all learners in collaborative activities and it is learner-centered method. To fulfill the aims and verify the hypothesis which reads as follow” It is hypothesized that there is no statistically significant differences between the achievements of Experimental group and control group”. Thirty learners are selected to be the sample of present study.Mann-Whitney Test for two independent samples is used to analysis the results. The analysis shows that experimental group’s members who are taught according to problem based learning gets higher scores than the control group’s members who are taught according to traditional method. This

... Show More
View Publication Preview PDF