Whenever, the Internet of Things (IoT) applications and devices increased, the capability of the its access frequently stressed. That can lead a significant bottleneck problem for network performance in different layers of an end point to end point (P2P) communication route. So, an appropriate characteristic (i.e., classification) of the time changing traffic prediction has been used to solve this issue. Nevertheless, stills remain at great an open defy. Due to of the most of the presenting solutions depend on machine learning (ML) methods, that though give high calculation cost, where they are not taking into account the fine-accurately flow classification of the IoT devices is needed. Therefore, this paper presents a new model based on the Spike Neural Network (SNN) called IoT-Traffic Classification (IoT-TCSNN) to classify IoT devices traffic. The model consists of four phases: data preprocessing, feature extraction, classier and evaluation. The proposed model performance is evaluated according to evaluation metrics: accuracy, precision, recall and F1-score and energy usage in comparison with two models: ML based Support Vector Machine IoT-TCSVM and ML based Deep Neural Network (IoT-TCDNN). The evaluations result has been shown that IoT-TCSNN consumes less energy in contrast to IoT-TCDNN and IoT-TCSVM. Also, it gives high accuracy in comparison with IoT-TCSVM.
The research's purpose is to highlight the role that the Approach of the strategic decision play in universities' governorships, assuming that the universities' governorship are definite result that can be reached by modern universities through their active strategic decisions that they take based on the correct way of thinking and the appropriate entrance that achieve the strategic goal of these decisions. The current research depended on two curriculums necessitated by the research requirement which are the analytical description curriculum and compare curriculum, the field research was done in the (Baghdad and Al-Mustansiriya) universities, the samples that were selected were the president, assistants and members of the board'
... Show MoreWith the increasing reliance on microgrids as flexible and sustainable solutions for energy distribution, securing decentralized electricity grids requires robust cybersecurity strategies tailored to microgrid-specific vulnerabilities. The research paper focuses on enhancing detection capabilities and response times in the face of coordinated cyber threats in microgrid systems by implementing advanced technologies, thereby supporting decentralized operations while maintaining robust system performance in the presence of attacks. It utilizes advanced power engineering techniques to strengthen cybersecurity in modern power grids. A real-world CPS testbed was utilized to simulate the smart grid environment and analyze the impact of cyberattack
... Show MoreThe aim of this research is to adopt a close range photogrammetric approach to evaluate the pavement surface condition, and compare the results with visual measurements. This research is carried out on the road of Baghdad University campus in AL-Jaderiyiah for evaluating the scaling, surface texture for Portland cement concrete and rutting, surface texture for asphalt concrete pavement. Eighty five stereo images of pavement distresses were captured perpendicular to the surface using a DSLR camera. Photogrammetric process was carried out by using ERDAS IMAGINE V.8.4. The results were modeled by using a relationship between the photogrammetric and visual techniques and selected the highest coefficient of determination (R2). The first techniqu
... Show MoreElzaki Transform Adomian decomposition technique (ETADM), which an elegant combine, has been employed in this work to solve non-linear Riccati matrix differential equations. Solutions are presented to demonstrate the relevance of the current approach. With the use of figures, the results of the proposed strategy are displayed and evaluated. It is demonstrated that the suggested approach is effective, dependable, and simple to apply to a range of related scientific and technical problems.
In this paper we used frequentist and Bayesian approaches for the linear regression model to predict future observations for unemployment rates in Iraq. Parameters are estimated using the ordinary least squares method and for the Bayesian approach using the Markov Chain Monte Carlo (MCMC) method. Calculations are done using the R program. The analysis showed that the linear regression model using the Bayesian approach is better and can be used as an alternative to the frequentist approach. Two criteria, the root mean square error (RMSE) and the median absolute deviation (MAD) were used to compare the performance of the estimates. The results obtained showed that the unemployment rates will continue to increase in the next two decade
... Show MoreA method has been demonstrated to synthesise effective zeolite membranes from existing crystals without a hydrothermal synthesis step.
The aim of this research is to adopt a close range photogrammetric approach to evaluate the pavement surface condition, and compare the results with visual measurements. This research is carried out on the road of Baghdad University campus in AL-Jaderiyiah for evaluating the scaling, surface texture for Portland cement concrete and rutting, surface texture for asphalt concrete pavement. Eighty five stereo images of pavement distresses were captured perpendicular to the surface using a DSLR camera. Photogrammetric process was carried out by using ERDAS IMAGINE V.8.4. The results were modeled by using a relationship between the photogrammetric and visual techniques and selected the highest coefficient of determinatio
... Show MoreConflict is a common but complicated phenomenon. It has been extensively researched in many domains, including philosophy, sociology, psychology, and linguistics. Using the Critical Discourse Approach, this study examines the issue of self-society conflict in The Handmaid’s Tale. The significance of this work lies in the identification and explanation of the discursive strategies that force the ideological polarization of the positively portrayed self versus the negatively portrayed other. The purpose of this study is to answer two questions: what are the discursive strategies used in The Handmaid’s Tale to create a positive or negative representation, and how are these strategies implemented? Five extracts from The Handmaid’s
... Show MoreInternet paths sharing the same congested link can be identified using several shared congestion detection techniques. The new detection technique which is proposed in this paper depends on the previous novel technique (delay correlation with wavelet denoising (DCW) with new denoising method called Discrete Multiwavelet Transform (DMWT) as signal denoising to separate between queuing delay caused by network congestion and delay caused by various other delay variations. The new detection technique provides faster convergence (3 to 5 seconds less than previous novel technique) while using fewer probe packets approximately half numbers than the previous novel technique, so it will reduce the overload on the network caused by probe packets.
... Show More