In this communication, introduce the split Mersenne and Mersenne-Lucas hybrid quaternions, also obtaining generating functions and Binet formulas for these hybrid quaternions and investigating some properties among them.
The prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices
... Show MoreThis study aims to find out the effect of the mediator on scaffolding fourth yearstudent- teachers' teaching competencies and their self-efficacy. The present study combines scaffolding and self-efficacy by using a mediator on scaffolding students affects teaching competencies and selfefficacy and from the results of which the existence of student-teachers’ selfawareness was ensured as an effect of the same independent variable. The model affects their teaching competencies and led them to be aware of the needs of their pupils and themselves.
Background: To evaluate the ISO depth of cure of bulkfill composites and depth of cure which determined by Vickers microhardness test. Materials and Methods: Bulkfill resin composite specimens (n=150) were prepared of three bulkfill composite materials (TetricEvo Ceram, Quixfil and SDR) and light cured by Flash max p3 for 3, 10, 20 seconds and by wood pecker for 10, 20 seconds respectively, a mold was filled with one of the three bulkfill composites and light cured. The specimens removed from the mold and scraped by plastic spatula and the remaining length (absolute length) was measured which represent the ISO depth of cure. After that the specimens were returned into the mold and a microhardness indentation device applied on the specimen
... Show MoreGA Al Omran, AA Noaimi, Z Al Madfai, H Al Hamamy, Journal of the Faculty of Medicine Baghdad, 2012
The prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices
... Show MoreEntrepreneurial events are understood to be imperious in accelerating the economic development of nations owing to a large number of jobs it creates. Thus, both developed and developing countries understand the importance of entrepreneurship education to instil student interest in entrepreneurial action. This study investigates the moderating effect of entrepreneurship education (EEP) on the relationship between attitude (ATT), subjective norms (SNMS), and perceived behavioural control (PBC) towards entrepreneurship intention (EINT) of university undergraduate students. The study population covered 794 students from all the four faculties of Northwest University Kano, that were taught a compulsory entrepreneurship education course in their
... Show More