The prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices’ power usage. Also, a rand order code (ROC) technique is used with SNN to detect cyber-attacks. The proposed method is evaluated by comparing its performance with two other methods: IDS-DNN and IDS-SNNTLF by using three performance metrics: detection accuracy, latency, and energy usage. The simulation results have shown that IDS-SNNDT attained low power usage and less latency in comparison with IDS-DNN and IDS-SNNTLF methods. Also, IDS-SNNDT has achieved high detection accuracy for cyber-attacks in contrast with IDS-SNNTLF.
Background: Odontogenic tumors are a diverse group of lesions with a variety of clinical behavior and histopathologic subtypes, from hamartomatous and benign to malignant. The study aimed to examine the clinical and pathological features of odontogenic tumors in Baghdad over the last 11 years (2011–2021). Materials and Methods: The present retrospective study analyzed all formalin-fixed, paraffin-embedded tissue blocks of patients diagnosed with an odontogenic tumor that were retrieved from archives at a teaching hospital/College of Dentistry in Baghdad University, Iraq, between 2011 and 2021. The diagnosis of each case was confirmed by examining the hematoxylin and eosin stained sections by two expert pathologists. Data from pati
... Show MoreThe present analysis targets to recognize the influence of the separate teaching approach on the accomplishment of grammar for scholars of the College of Islamic Sciences. The target of attaining this target led the investigations developing the subsequent null theories: 1. No statistically substantial variance is happened at the consequence level of 0.05 between the mean scores of the scholars in the investigational category who learnt consistent with the separate learning approach and the mean scores of the scholars in the control category who learnt in the conventional method in the accomplishment test. 2. No statistically substantial variance has been observed at the consequence level of 0.05 in the mean differences between the
... Show MorePoly vinyl alcohol has been studied for its ability to form crystallites by using annealing method. Semicrystalline films of poly vinyl alcohol (PVA) were prepared by casting 11.5 wt. % and 13 wt. % PVA aqueous solution onto glass slides at annealing temperature range 90 -120°C and duration time 15- 60 minute. This allowed the macromolecules to form crystallites, small regions of folded and compacted chains separated by amorphous regions where single PVA chain may pass through several of these crystallites. Degree of crystallinity of PVA films (hydrogels) was determined by method of density; on the other hand the swelling behavior was conducted by the determination of water uptake, wet degree of crystallinity, gel fraction and solubilit
... Show MoreScleral acrylic resin is widely used to synthesize ocular prosthesis. However, the properties of this material change over time, thus requiring the prosthesis to be refabricated. Many studies were conducted to improve these properties by reinforcing this material with nanoparticles. This study aims to evaluate the effect of silver nanoparticle powder on the mechanical properties (transverse flexural strength, impact strength, shear bond strength, surface microhardness, and surface roughness) of scleral acrylic resin used for ocular prostheses. Two concentrations were selected from the pilot study and evaluated for their effects on scleral acrylic resin properties. According to the pilot study, 0.01 and 0.02wt% AgNPs powder improved
... Show MorePVA, Starch/PVA, and Starch/PVA/sugar samples of different
concentrations (10, 20, 30 and 40 % wt/wt) were prepared by casting
method. DSC analysis was carried; the results showed only one glass
transition temperature (Tg) for the samples involved, which suggest
that starch/PVA and starch/PVA/sugar blends are miscible. The
miscibility is attributed to the hydrogen bonds between PVA and
starch. This is in a good agreement with (FTIR) results. Tg and Tm
decrease with starch and sugar content compared with that for
(PVA). Systematic decrease in ultimate strength, due to starch and
sugar ratio increase, is attributed to (PVA), which has more hydroxyl
groups that made its ultimate strength higher than that for
Proxy-based sliding mode control PSMC is an improved version of PID control that combines the features of PID and sliding mode control SMC with continuously dynamic behaviour. However, the stability of the control architecture maybe not well addressed. Consequently, this work is focused on modification of the original version of the proxy-based sliding mode control PSMC by adding an adaptive approximation compensator AAC term for vibration control of an Euler-Bernoulli beam. The role of the AAC term is to compensate for unmodelled dynamics and make the stability proof more easily. The stability of the proposed control algorithm is systematically proved using Lyapunov theory. Multi-modal equation of motion is derived using the Galerkin metho
... Show MoreMedium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the
Abstract
The study seeks to use one of the techniques (Data mining) a (Logic regression) on the inherited risk through the use of style financial ratios technical analysis and then apply for financial fraud indicators,Since higher scandals exposed companies and the failure of the audit process has shocked the community and affected the integrity of the auditor and the reason is financial fraud practiced by the companies and not to the discovery of the fraud by the auditor, and this fraud involves intentional act aimed to achieve personal and harm the interests of to others, and doing (administration, staff) we can say that all frauds carried out through the presence of the motives and factors that help th
... Show MoreBackground: Sprite coding is a very effective technique for clarifying the background video object. The sprite generation is an open issue because of the foreground objects which prevent the precision of camera motion estimation and blurs the created sprite. Objective: In this paper, a quick and basic static method for sprite area detection in video data is presented. Two statistical methods are applied; the mean and standard deviation of every pixel (over all group of video frame) to determine whether the pixel is a piece of the selected static sprite range or not. A binary map array is built for demonstrating the allocated sprite (as 1) while the non-sprite (as 0) pixels valued. Likewise, holes and gaps filling strategy was utilized to re
... Show More