The prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices
... Show MoreThe poor hole cleaning efficiency could causes many problems such as high torque, drag, poor hydraulics and pipe stuck. These inherent problems result in an avoidable high operation cost which this study tried to address. In this study, the effect of cutting density on hole cleaning efficiency in deviated and horizontal wells was investigated. Experiments were conducted using 40 feet (12 m) long of flow loop made from iron and PVC. However, the test section was made from PVC with (5.1m) long and (4” ID) for outer pipe and (2” OD) inner pipe. The cutting transport ratio (CTR) was determined from weight measurements for each test. Cutting Transport Ratio has been investigated for effects of the following parameters; flow rate, cu
... Show MoreOil industry played a major role in delineating the course and type o development in both imported and exported Arabic countries alike where its revenues has perform an essential role in forming programs and plans of development on both national and international level in addition to anticipation of future consuming.
Iraq, as an oil producer country with a revenues –based economy depends on oil in building its economy totally including its infrastructure having a the greatest conformed reservoir which make the government budget depends largely on oil revenues where its strategic importance lies in funding all aspects of expenders as it is considered the prime source of foreign currency. The chall
... Show MoreMany of researchers have written about social responsibility and business strategy and competitive advantage, and they have given particular attention to the relationship between economic and social responsibility , but what is missing in this aspect is how the economic units that use their core competencies to advance social responsibility initiatives so that they can achieve a significant competitive advantage and create value for it ?
The current research aims to verify the view that "the economic and social objectives in the long term is not contradictory in nature but complementary objectives essential", as well as make sure that the s
... Show MoreThe current study aims at identifying the impact of using learning acceleration model on the achievement of mathematics for third intermediategrade students. Forachieving this, the researchers chose the School (Al-Kholood Secondary School for Girls) affiliated to the General Directorate of Babylon Education / Hashemite Education Department for the academic year (2021/2021), The sample reached to (70) female students from the third intermediate grade, with (35) female students for each of the two research groups. The two researchers prepared an achievement test consisting of (25) objective items of multiple choice type, The psychometric properties of the test were confirmed, and after the completion of the experiment, the achievement test wa
... Show MoreError control schemes became a necessity in network-on-chip (NoC) to improve reliability as the on-chip interconnect errors increase with the continuous shrinking of geometry. Accordingly, many researchers are trying to present multi-bit error correction coding schemes that perform a high error correction capability with the simplest design possible to minimize area and power consumption. A recent work, Multi-bit Error Correcting Coding with Reduced Link Bandwidth (MECCRLB), showed a huge reduction in area and power consumption compared to a well-known scheme, namely, Hamming product code (HPC) with Type-II HARQ. Moreover, the authors showed that the proposed scheme can correct 11 random errors which is considered a high
... Show MoreThe prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices
... Show MoreDocument source identification in printer forensics involves determining the origin of a printed document based on characteristics such as the printer model, serial number, defects, or unique printing artifacts. This process is crucial in forensic investigations, particularly in cases involving counterfeit documents or unauthorized printing. However, consistent pattern identification across various printer types remains challenging, especially when efforts are made to alter printer-generated artifacts. Machine learning models are often used in these tasks, but selecting discriminative features while minimizing noise is essential. Traditional KNN classifiers require a careful selection of distance metrics to capture relevant printing
... Show More