Preferred Language
Articles
/
CBadRIgBVTCNdQwCWXaU
Traffic Classification of IoT Devices by Utilizing Spike Neural Network Learning Approach
...Show More Authors

Whenever, the Internet of Things (IoT) applications and devices increased, the capability of the its access frequently stressed. That can lead a significant bottleneck problem for network performance in different layers of an end point to end point (P2P) communication route. So, an appropriate characteristic (i.e., classification) of the time changing traffic prediction has been used to solve this issue. Nevertheless, stills remain at great an open defy. Due to of the most of the presenting solutions depend on machine learning (ML) methods, that though give high calculation cost, where they are not taking into account the fine-accurately flow classification of the IoT devices is needed. Therefore, this paper presents a new model based on the Spike Neural Network (SNN) called IoT-Traffic Classification (IoT-TCSNN) to classify IoT devices traffic. The model consists of four phases: data preprocessing, feature extraction, classier and evaluation. The proposed model performance is evaluated according to evaluation metrics: accuracy, precision, recall and F1-score and energy usage in comparison with two models: ML based Support Vector Machine IoT-TCSVM and ML based Deep Neural Network (IoT-TCDNN). The evaluations result has been shown that IoT-TCSNN consumes less energy in contrast to IoT-TCDNN and IoT-TCSVM. Also, it gives high accuracy in comparison with IoT-TCSVM.

Scopus Crossref
View Publication
Publication Date
Fri Jul 01 2022
Journal Name
International Journal Of Nonlinear Analysis And Applications
Survey on distributed denial of service attack detection using deep learning: A review
...Show More Authors

Distributed Denial of Service (DDoS) attacks on Web-based services have grown in both number and sophistication with the rise of advanced wireless technology and modern computing paradigms. Detecting these attacks in the sea of communication packets is very important. There were a lot of DDoS attacks that were directed at the network and transport layers at first. During the past few years, attackers have changed their strategies to try to get into the application layer. The application layer attacks could be more harmful and stealthier because the attack traffic and the normal traffic flows cannot be told apart. Distributed attacks are hard to fight because they can affect real computing resources as well as network bandwidth. DDoS attacks

... Show More
View Publication
Publication Date
Tue Dec 06 2022
Journal Name
Iraqi National Journal Of Nursing Specialties
Evaluation of Blended Learning in Nursing Education at the Middle Region in Iraq
...Show More Authors

Abstract

Objective(s): To evaluate blended learning in nursing education at the Middle Region in Iraq.

Methodology: A descriptive study, using evaluation approach, is conducted to evaluate blended learning in nursing education in Middle Region in Iraq from September 26th, 2021 to March 22nd, 2022. The study is carried out at two Colleges of Nursing at the University of Baghdad and University of Tikrit in Iraq. A convenient, non-probability, sample of (60) undergraduate nursing students is selected. The sample is comprised of (30) student from each college of nursing, Self-report questionnaire is constructed from the literature, for e

... Show More
View Publication Preview PDF
Publication Date
Wed Mar 08 2023
Journal Name
Sensors
A Critical Review of Remote Sensing Approaches and Deep Learning Techniques in Archaeology
...Show More Authors

To date, comprehensive reviews and discussions of the strengths and limitations of Remote Sensing (RS) standalone and combination approaches, and Deep Learning (DL)-based RS datasets in archaeology have been limited. The objective of this paper is, therefore, to review and critically discuss existing studies that have applied these advanced approaches in archaeology, with a specific focus on digital preservation and object detection. RS standalone approaches including range-based and image-based modelling (e.g., laser scanning and SfM photogrammetry) have several disadvantages in terms of spatial resolution, penetrations, textures, colours, and accuracy. These limitations have led some archaeological studies to fuse/integrate multip

... Show More
View Publication
Scopus (18)
Crossref (13)
Scopus Clarivate Crossref
Publication Date
Tue Dec 31 2013
Journal Name
Al-khwarizmi Engineering Journal
Design of an Adaptive PID Neural Controller for Continuous Stirred Tank Reactor based on Particle Swarm Optimization
...Show More Authors

 A particle swarm optimization algorithm and neural network like self-tuning PID controller for CSTR system is presented. The scheme of the discrete-time PID control structure is based on neural network and tuned the parameters of the PID controller by using a particle swarm optimization PSO technique as a simple and fast training algorithm. The proposed method has advantage that it is not necessary to use a combined structure of identification and decision because it used PSO. Simulation results show the effectiveness of the proposed adaptive PID neural control algorithm in terms of minimum tracking error and smoothness control signal obtained for non-linear dynamical CSTR system.

View Publication Preview PDF
Publication Date
Wed Oct 17 2018
Journal Name
International Journal Of Civil Engineering And Technology (ijciet)
ESTIMATION OF MUNICIPAL SOLID WASTE GENERATION AND LANDFILL VOLUME GENERATION AND LANDFILL VOLUME USING ARTIFICIAL NEURAL NETWORKS
...Show More Authors

Publication Date
Mon Jul 01 2019
Journal Name
Journal Of Educational And Psychological Researches
Developing Undergraduate Students' Geography Learning Skills during Fieldwork and Their Attitude toward It: Developing Undergraduate Students' Geography Learning Skills during Fieldwork and Their Attitude toward It
...Show More Authors

Abstract

This study identified the developing of a range of students' geography learning skills and the change in their attitudes toward fieldwork as a consequence of leaning experiences that occurred within a field trip. The sample of the study consisted of (27) students within a special topic course enrolled in Geography Department at Umm Al-Qura University in Saudi Arabia in semester 2, 2018. A range of students' geography learning skills were measured by the skills questionnaire that consisted of 12 geography skills after completing field work. Changes in students' at

... Show More
View Publication Preview PDF
Publication Date
Tue Jan 02 2018
Journal Name
Journal Of Educational And Psychological Researches
The impact of learning strategies in the collection of biology and their systemic thinking
...Show More Authors

Research Summary The aim of the search for knowledge of the effect generative learning strategy in: 1 - Achievement of the second grade. 2 - Systemic thinking for the second grade students when studying the biology. The study sample increased (60) students distributed into two equal experimental and control groups. Prepare the test of 40 pieces of multiple choice type and prepare a test for systematic thinking according to three skills 1. Understand the relationships between the parts of the systemic form and complement the sentences given 2 - complement the relationships between parts of the systemic form 3. Building the systemic form. It was a search result 1- There is a difference of statistical significance (at level 0.05) between th

... Show More
View Publication Preview PDF
Publication Date
Thu Jun 30 2016
Journal Name
Al-kindy College Medical Journal
Evaluating the Students Perception of Academic Learning Environments in AL-Kindy Collage of Medicine
...Show More Authors

Background: Educational environment is one of the most important determinants of an effective curriculum. Students' perceptions of their educational environment have a significant impact on their behavior and academic progress. Objective: 1. To identify students’ perception to the educational environment.2. To identify any gender or class level differences in the students’ perception.Type of the study: This is a descriptive cross-sectional studyMethodology: The study was carried out on convenient sample of 150 students of 2nd and 5th grade. This study was done in Al Kindy Medical College, Baghdad, Iraq and conducted during the period from the 1st of October 2013 till the end of March 2014, by using DREEM questionnaire a validated uni

... Show More
View Publication Preview PDF
Publication Date
Sat Jan 26 2019
Journal Name
Association Of Arab Universities Journal Of Engineering Sciences
Secure Mobile Sink Node location in Wireless Sensor Network using Dynamic Routing Protocol
...Show More Authors

The important device in the Wireless Sensor Network (WSN) is the Sink Node (SN). That is used to store, collect and analyze data from every sensor node in the network. Thus the main role of SN in WSN makes it a big target for traffic analysis attack. Therefore, securing the SN position is a substantial issue. This study presents Security for Mobile Sink Node location using Dynamic Routing Protocol called (SMSNDRP), in order to increase complexity for adversary trying to discover mobile SN location. In addition to that, it minimizes network energy consumption. The proposed protocol which is applied on WSN framework consists of 50 nodes with static and mobile SN. The results havw shown in each round a dynamic change in the route to reach mobi

... Show More
Publication Date
Wed May 01 2013
Journal Name
Journal Of Computer Science
PROTOCOLS FOR SECURE ROUTING AND TRANSMISSION IN MOBILE AD HOC NETWORK: A REVIEW
...Show More Authors

Mobile ad hoc network security is a new area for research that it has been faced many difficulties to implement. These difficulties are due to the absence of central authentication server, the dynamically movement of the nodes (mobility), limited capacity of the wireless medium and the various types of vulnerability attacks. All these factor combine to make mobile ad hoc a great challenge to the researcher. Mobile ad hoc has been used in different applications networks range from military operations and emergency disaster relief to community networking and interaction among meeting attendees or students during a lecture. In these and other ad hoc networking applications, security in the routing protocol is necessary to protect against malic

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (5)
Scopus Crossref