Whenever, the Internet of Things (IoT) applications and devices increased, the capability of the its access frequently stressed. That can lead a significant bottleneck problem for network performance in different layers of an end point to end point (P2P) communication route. So, an appropriate characteristic (i.e., classification) of the time changing traffic prediction has been used to solve this issue. Nevertheless, stills remain at great an open defy. Due to of the most of the presenting solutions depend on machine learning (ML) methods, that though give high calculation cost, where they are not taking into account the fine-accurately flow classification of the IoT devices is needed. Therefore, this paper presents a new model based on the Spike Neural Network (SNN) called IoT-Traffic Classification (IoT-TCSNN) to classify IoT devices traffic. The model consists of four phases: data preprocessing, feature extraction, classier and evaluation. The proposed model performance is evaluated according to evaluation metrics: accuracy, precision, recall and F1-score and energy usage in comparison with two models: ML based Support Vector Machine IoT-TCSVM and ML based Deep Neural Network (IoT-TCDNN). The evaluations result has been shown that IoT-TCSNN consumes less energy in contrast to IoT-TCDNN and IoT-TCSVM. Also, it gives high accuracy in comparison with IoT-TCSVM.
The characteristic of our time is the tremendous technological progress and the wide use of the Internet. Children have had a large share of this progress.as they are becoming fond of having the technological equipment of tablets and mobile phones which become indispensable for these children cannot do without them .
Recently, the phenomenon of using mobile phones and tablets by children has become more widespread, and the society in general and parents, in particular, have ignored the reasons for their health .Despite the many advantages and benefits for children who are well trained to use these devices properly that have enhanced their cognitive and social abilities, there are many disadvantages that could harm children's growth if
The railways network is one of the huge infrastructure projects. Therefore, dealing with these projects such as analyzing and developing should be done using appropriate tools, i.e. GIS tools. Because, traditional methods will consume resources, time, money and the results maybe not accurate. In this research, the train stations in all of Iraq’s provinces were studied and analyzed using network analysis, which is one of the most powerful techniques within GIS. A free trial copy of ArcGIS®10.2 software was used in this research in order to achieve the aim of this study. The analysis of current train stations has been done depending on the road network, because people used roads to reach those train stations. The data layers for this st
... Show More<span lang="EN-US">Iraqi people have been without energy for nearly two decades, even though their geographic position provides a high intensity of radiation appropriate for the construction of solar plants capable of producing significant quantities of electricity. Also, the annual sunny hours in Iraq are between 3,600 to 4,300 hours which makes it perfect to use the photovoltaics arrays to generate electricity with very high efficiency compared to many countries, especially in Europe. This paper shows the amount of electric energy generated by the meter square of crystalline silicon in the photovoltaic (PV) array that already installed in 18 states in Iraq for each month of the year. The results of the meter-square of PV arr
... Show MoreThe auditory system can suffer from exposure to loud noise and human health can be affected. Traffic noise is a primary contributor to noise pollution. To measure the noise levels, 3 variables were examined at 25 locations. It was found that the main factors that determine the increase in noise level are traffic volume, vehicle speed, and road functional class. The data have been taken during three different periods per day so that they represent and cover the traffic noise of the city during heavy traffic flow conditions. Analysis of traffic noise prediction was conducted using a simple linear regression model to accurately predict the equivalent continuous sound level. The difference between the predicted and the measured noise shows that
... Show MoreThis work bases on encouraging a generous and conceivable estimation for modified an algorithm for vehicle travel times on a highway from the eliminated traffic information using set aside camera image groupings. The strategy for the assessment of vehicle travel times relies upon the distinctive verification of traffic state. The particular vehicle velocities are gotten from acknowledged vehicle positions in two persistent images by working out the distance covered all through elapsed past time doing mollification between the removed traffic flow data and cultivating a plan to unequivocally predict vehicle travel times. Erbil road data base is used to recognize road locales around road segments which are projected into the commended camera
... Show MoreThe Internet of Things (IoT) is an expanding domain that can revolutionize different industries. Nevertheless, security is among the multiple challenges that it encounters. A major threat in the IoT environment is spoofing attacks, a type of cyber threat in which malicious actors masquerade as legitimate entities. This research aims to develop an effective technique for detecting spoofing attacks for IoT security by utilizing feature-importance methods. The suggested methodology involves three stages: preprocessing, selection of important features, and classification. The feature importance determines the most significant characteristics that play a role in detecting spoofing attacks. This is achieved via two techniques: decision tr
... Show MoreImage is an important digital information that used in many internet of things (IoT) applications such as transport, healthcare, agriculture, military, vehicles and wildlife. etc. Also, any image has very important characteristic such as large size, strong correlation and huge redundancy, therefore, encrypting it by using single key Advanced Encryption Standard (AES) through IoT communication technologies makes it vulnerable to many threats, thus, the pixels that have the same values will be encrypted to another pixels that have same values when they use the same key. The contribution of this work is to increase the security of transferred image. This paper proposed multiple key AES algorithm (MECCAES) to improve the security of the tran
... Show MoreThe study of traffic on the roads the governorate of Karbala, Where is the study of traffic on the roads measure is necessary to determine the extent of the road and highlighting the importance of its role in the transfer of individuals from original to destination as well as the importance of the region that attracted its movement. This research aims to analyze the traffic in the governorate of Karbala through the study and analysis of surveys of traffic that were made in the governorate. Based on this analysis, it has been reached to identify volumes of the traffic and its density and how the roads are efficient and accommodating these volumes, the results of the traffic survey of the studied roads in the area of the study have shown t
... Show MoreAt present, smooth movement on the roads is a matter which is needed for each user. Many roads, especially in urban areas geometrically improved because of the number of vehicles increase from time to time.
In this research, Highway capacity software, HCS, 2000, will be adopted to determine the effectiveness of roundabout in terms of capacity of roundabout, delay and level of service of roundabout.
The results of the analysis indicated that the Ahmed Urabi roundabout operates under level of service F with an average control delay of 300 seconds per vehicle during the peak hours.
The through movements of Alkarrada- Aljadiriya direction (Major Direction) represent the heaviest traff
... Show MoreThe aim of this research is to explore the time and space distribution of traffic volume demand and investigate its vehicle compositions. The four selected links presented the activity of transportation facilities and different congestion points according to directions. The study area belongs to Al-Rusafa sector in Baghdad city that exhibited higher rate of traffic congestions of working days at peak morning and evening periods due to the different mixed land uses. The obtained results showed that Link (1) from Medical city intersection to Sarafiya intersection, demonstrated the highest traffic volume in both peak time periods morning AM and afternoon PM where the demand exceeds the capacity along the link corridor. Also, higher values f
... Show More