Preferred Language
Articles
/
CBadRIgBVTCNdQwCWXaU
Traffic Classification of IoT Devices by Utilizing Spike Neural Network Learning Approach
...Show More Authors

Whenever, the Internet of Things (IoT) applications and devices increased, the capability of the its access frequently stressed. That can lead a significant bottleneck problem for network performance in different layers of an end point to end point (P2P) communication route. So, an appropriate characteristic (i.e., classification) of the time changing traffic prediction has been used to solve this issue. Nevertheless, stills remain at great an open defy. Due to of the most of the presenting solutions depend on machine learning (ML) methods, that though give high calculation cost, where they are not taking into account the fine-accurately flow classification of the IoT devices is needed. Therefore, this paper presents a new model based on the Spike Neural Network (SNN) called IoT-Traffic Classification (IoT-TCSNN) to classify IoT devices traffic. The model consists of four phases: data preprocessing, feature extraction, classier and evaluation. The proposed model performance is evaluated according to evaluation metrics: accuracy, precision, recall and F1-score and energy usage in comparison with two models: ML based Support Vector Machine IoT-TCSVM and ML based Deep Neural Network (IoT-TCDNN). The evaluations result has been shown that IoT-TCSNN consumes less energy in contrast to IoT-TCDNN and IoT-TCSVM. Also, it gives high accuracy in comparison with IoT-TCSVM.

Scopus Crossref
View Publication
Publication Date
Tue Apr 01 2025
Journal Name
Mesopotamian Journal Of Cybersecurity
The Impact of Feature Importance on Spoofing Attack Detection in IoT Environment
...Show More Authors

The Internet of Things (IoT) is an expanding domain that can revolutionize different industries. Nevertheless, security is among the multiple challenges that it encounters. A major threat in the IoT environment is spoofing attacks, a type of cyber threat in which malicious actors masquerade as legitimate entities. This research aims to develop an effective technique for detecting spoofing attacks for IoT security by utilizing feature-importance methods. The suggested methodology involves three stages: preprocessing, selection of important features, and classification. The feature importance determines the most significant characteristics that play a role in detecting spoofing attacks. This is achieved via two techniques: decision tr

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (1)
Scopus Crossref
Publication Date
Sat Jul 01 2017
Journal Name
Journal Of Nano Research
Electroluminescence Devices from Quantum Dots with TPD Polymer White Light Generation
...Show More Authors

Quantum dots of CdSe, CdS and ZnS QDs were prepared by chemical reaction and used to fabricate organic quantum dot hybrid junction device. QD-LEDs were fabricated using ITO/TPD: PMMA/CdSe/Al, ITO/TPD: PMMA/CdS/Al and ITO/TPD: PMMA/ZnS/Al QDs devices which synthesized by phase segregation method. The hybrid white light emitting devices consists, of two-layers deposited successively on the ITO glass substrate; the first layer was of N, N’-bis (3-methylphenyl)-N, N’-bis (phenyl) benzidine (TPD) polymer mixed with polymethyl methacrylate (PMMA) polymers in ratio 1:1, while the second layer was 0.5wt% from each type of the (CdSe, CdS and ZnS) QDs for each device.The optical properties of QDs were characterized by UV-Vis. and photolum

... Show More
View Publication
Scopus (4)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Thu Jun 30 2022
Journal Name
Journal Of Economics And Administrative Sciences
Industrial Sector and Development of Iraqi Economy by Kaldor's Approach For Years (2017-2030)
...Show More Authors

The study aims to clarify the impact of growth in the industrial sector on economic growth in the Iraqi economics according to the methodology of Kaldor for (2017-2030) , taking into consideration the effect of the accumulation of capital in the calculation of growth rates in the economy through productivity estimate of Total Factor Productivity (TFP) to growth in the economy, which is why the study assumes a formula to comply with the laws of Kaldor growth models developed requirements. This study is the most important to find out  the development of the laws of Kaldor among Arabic studies, especially the first and third, so that the relationship between the growth of industrial production and economic growth as represented

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jul 21 2023
Journal Name
Journal Of Engineering
Quality Evaluation of Al-Rasheed Ready Concrete Mixture Plant By Using Six Sigma Approach
...Show More Authors

The objective of this research work is to evaluate the quality of central concrete plant of Al-Rasheed Company by using Six Sigma approach which is a measure of quality that strives for near elimination of defects using the statistical methods to improve outputs that are critical to customers. The fundamental objective of Six Sigma methodology is the implementation of a measurement-based strategy that focuses on process improvement and variation reduction to reach delighting customers, and then suggesting an improvement system to improve the production of concrete in Al-Rasheed State Contracting Construction Company.
A field survey includes two parts (open and close questionnaire) that aimed to get the data and information required f

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue May 17 2022
Journal Name
Egyptian Journal Of Chemistry
Determination of Ferrous Ion in Pure & Pharmaceutical Preparation by Continuous Flow Injection Analysis Via Turbidmetric Utilizing NAG-4SX3-3D Analyzer
...Show More Authors

Scopus (3)
Scopus Clarivate Crossref
Publication Date
Sun Jun 01 2025
Journal Name
Al-khwarizmi Engineering Journal
Recent Tools of Software-Defined Networking Traffic Generation and Data Collection
...Show More Authors

أثبتت الشبكات المحددة بالبرمجيات (SDN) تفوقها في معالجة مشاكل الشبكة العادية مثل قابلية التوسع وخفة الحركة والأمن. تأتي هذه الميزة من SDN بسبب فصل مستوى التحكم عن مستوى البيانات. على الرغم من وجود العديد من الأوراق والدراسات التي تركز على إدارة SDN، والرصد، والتحكم، وتحسين QoS، إلا أن القليل منها يركز على تقديم ما يستخدمونه لتوليد حركة المرور وقياس أداء الشبكة. كما أن المؤلفات تفتقر إلى مقارنات بين الأدوات والأ

... Show More
View Publication
Scopus (2)
Crossref (2)
Scopus Crossref
Publication Date
Wed Sep 01 2021
Journal Name
Iop Conference Series: Earth And Environmental Science
IDW Interpolation of Soil Moisture Retention Curve Utilizing GIS
...Show More Authors

View Publication
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Wed Jun 01 2022
Journal Name
Baghdad Science Journal
Utilizing Attapulgite as Anti-Spill Liners of Crude Oil
...Show More Authors

The efficiency of attapulgite liners as anti-seepage for crude oil is examined. Consideration is given to the potential use of raw attapulgite and mixture attapulgite with prairie hay and coconut husk as liners to prevent crude oil seepage. Attapulgite clay used in this study was brought from Injana formation /Western Desert of Iraq. Two types of Crude oil brought from Iraqi oil fields were used in experiments; heavy crude oil from East-Baghdad oil field and light crude oil from Nassiriya oil field. Initially the basic properties of attapulgite and crude oils were determined. The attapulgite clay was subjected to mineralogical, chemical and scanning electron microscope analyses. Raw Attapulgite 150µm, 75µm, and 53µm were tested

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (1)
Scopus Crossref
Publication Date
Tue Jun 18 2024
Journal Name
2023 Asee Annual Conference & Exposition Proceedings
Study of Artificial Intelligence Computing Devices for Undergraduate Computer Science and Engineering Labs
...Show More Authors

View Publication
Crossref
Publication Date
Sun Dec 09 2018
Journal Name
Baghdad Science Journal
Optimal UAV Deployment for Data Collection in Deadline-based IoT Applications
...Show More Authors

The deployment of UAVs is one of the key challenges in UAV-based communications while using UAVs for IoT applications. In this article, a new scheme for energy efficient data collection with a deadline time for the Internet of things (IoT) using the Unmanned Aerial Vehicles (UAV) is presented. We provided a new data collection method, which was set to collect IoT node data by providing an efficient deployment and mobility of multiple UAV, used to collect data from ground internet of things devices in a given deadline time. In the proposed method, data collection was done with minimum energy consumption of IoTs as well as UAVs. In order to find an optimal solution to this problem, we will first provide a mixed integer linear programming m

... Show More
View Publication Preview PDF
Scopus (4)
Scopus Clarivate Crossref