The fast evolution of cyberattacks in the Internet of Things (IoT) area, presents new security challenges concerning Zero Day (ZD) attacks, due to the growth of both numbers and the diversity of new cyberattacks. Furthermore, Intrusion Detection System (IDSs) relying on a dataset of historical or signature‐based datasets often perform poorly in ZD detection. A new technique for detecting zero‐day (ZD) attacks in IoT‐based Conventional Spiking Neural Networks (CSNN), termed ZD‐CSNN, is proposed. The model comprises three key levels: (1) Data Pre‐processing, in this level a thorough cleaning process is applied to the CIC IoT Dataset 2023, which contains both malicious and the most recent attack patterns in network traffic, ensuring data quality for analysis, (2) CSNN‐based Detection, where outlier identification is conducted by comparing two dataset groups (the normal set and the attack set) within the same time period to enhance anomaly detection and (3) In the evaluation level, the detection performance of the proposed model is assessed by comparing it with two benchmark models: ZD‐Deep Learning (ZD‐DL) and ZD‐ Convolutional Neural Network (ZD‐CNN). The implementation results demonstrate that ZD‐ CSNN achieves superior accuracy in detecting zero‐day attacks compared to both ZD‐DL and ZD‐CNN.
The aim of this study is to compare the effects of three methods: problem-based learning (PBL), PBL with lecture method, and conventional teaching on self-directed learning skills among physics undergraduates. The actual sample size comprises of 122 students, who were selected randomly from the Physics Department, College of Education in Iraq. In this study, the pre- and post-test were done and the instruments were administered to the students for data collection. The data was analyzed and statistical results rejected null hypothesis of this study. This study revealed that there are no signifigant differences between PBL and PBL with lecture method, thus the PBL without or with lecture method enhances the self-directed learning skills bette
... Show MoreBackground: The change in the concepts of cavity preparation and the development of reliable adhesive materials lead to the development of alternative methods of caries removal. Chemo-mechanical caries removal (CMCR) involves the chemical softening of carious dentin, followed by its removal with manual excavation. The present study was conducted to evaluate clinically the efficiency of caries removal using a new chemo-mechanical agent (Papacarie) compared to the conventional drilling method in reduction of total bacterial count. Material and methods: The study is a split mouth design. The sample composes from sixty mandibular deciduous molars teeth in thirty children, between six to nine years of age with bilateral class I deep occlusal car
... Show MoreAt a time of increasing human potential in the face of crises and risks through the use of technology on a large scale and steadily in various fields of life, and the vulnerability of business organizations as a result of mistakes. The failure of a sudden these errors or omissions or symptoms. Also, some crises occur outside the control of management, others caused by leakage of important information and sometimes secret may be a strategy or a new plan or new project occurs outside the organization to the opposite of what is planned. Therefore, the crisis management are critical to all organizations, because the active management of the crisis helps to ensure the continued prosperity of the organization. Here comes from the resea
... Show MoreDeepFake is a concern for celebrities and everyone because it is simple to create. DeepFake images, especially high-quality ones, are difficult to detect using people, local descriptors, and current approaches. On the other hand, video manipulation detection is more accessible than an image, which many state-of-the-art systems offer. Moreover, the detection of video manipulation depends entirely on its detection through images. Many worked on DeepFake detection in images, but they had complex mathematical calculations in preprocessing steps, and many limitations, including that the face must be in front, the eyes have to be open, and the mouth should be open with the appearance of teeth, etc. Also, the accuracy of their counterfeit detectio
... Show MoreIn recent years, the migration of the computational workload to computational clouds has attracted intruders to target and exploit cloud networks internally and externally. The investigation of such hazardous network attacks in the cloud network requires comprehensive network forensics methods (NFM) to identify the source of the attack. However, cloud computing lacks NFM to identify the network attacks that affect various cloud resources by disseminating through cloud networks. In this paper, the study is motivated by the need to find the applicability of current (C-NFMs) for cloud networks of the cloud computing. The applicability is evaluated based on strengths, weaknesses, opportunities, and threats (SWOT) to outlook the cloud network. T
... Show MoreIn this research, the water quality of the potable water network in
Al-Shuala Baghdad city were evaluated and compare them with the
Iraqi standards (IQS) for drinking water and World Health
Organization standards (WHO), then water quality index (WQI) were
calculator: pH, heavy metals (lead, cadmium and iron), chlorides,
total hardness, turbidity, dissolved oxygen, total dissolved solid and
electrical conductivity. Water samples are collected weekly during
the period from February 2015 to April 2015 from ten sites. Results
show that the chlorides, total dissolved solid and electrical
conductivity less than acceptable limit of standards, but total
hardness and heavy metals in some samples higher than acceptabl
The goal of this work is to check the presence of PNS (photon number splitting) attack in quantum cryptography system based on BB84 protocol, and to get a maximum secure key length as possible. This was achieved by randomly interleaving decoy states with mean photon numbers of 5.38, 1.588 and 0.48 between the signal states with mean photon numbers of 2.69, 0.794 and 0.24. The average length for a secure key obtained from our system discarding the cases with Eavesdropping was equal to 125 with 20 % decoy states and 82 with 50% decoy states for mean photon number of 0.794 for signal states and 1.588 for decoy states.
This study was conducted in College of Science \ Computer Science Department \ University of Baghdad to compare between automatic sorting and manual sorting, which is more efficient and accurate, as well as the use of artificial intelligence in automated sorting, which included artificial neural network, image processing, study of external characteristics, defects and impurities and physical characteristics; grading and sorting speed, and fruits weigh. the results shown value of impurities and defects. the highest value of the regression is 0.40 and the error-approximation algorithm has recorded the value 06-1 and weight fruits fruit recorded the highest value and was 138.20 g, Gradin
In information security, fingerprint verification is one of the most common recent approaches for verifying human identity through a distinctive pattern. The verification process works by comparing a pair of fingerprint templates and identifying the similarity/matching among them. Several research studies have utilized different techniques for the matching process such as fuzzy vault and image filtering approaches. Yet, these approaches are still suffering from the imprecise articulation of the biometrics’ interesting patterns. The emergence of deep learning architectures such as the Convolutional Neural Network (CNN) has been extensively used for image processing and object detection tasks and showed an outstanding performance compare
... Show MoreThe research aimed to identify “The impact of an instructional-learning design based on the brain- compatible model in systemic thinking among first intermediate grade female students in Mathematics”, in the day schools of the second Karkh Educational directorate.In order to achieve the research objective, the following null hypothesis was formulated:There is no statistically significant difference at the significance level (0.05) among the average scores of the experimental group students who will be taught by applying an (instructional- learning) design based to on the brain–compatible model and the average scores of the control group students who will be taught through the traditional method in the systemic thinking test.The resear
... Show More