The Internet of Things (IoT) is an expanding domain that can revolutionize different industries. Nevertheless, security is among the multiple challenges that it encounters. A major threat in the IoT environment is spoofing attacks, a type of cyber threat in which malicious actors masquerade as legitimate entities. This research aims to develop an effective technique for detecting spoofing attacks for IoT security by utilizing feature-importance methods. The suggested methodology involves three stages: preprocessing, selection of important features, and classification. The feature importance determines the most significant characteristics that play a role in detecting spoofing attacks. This is achieved via two techniques: decision tree (DT) and mutual information (MI). For classification, adaptive boosting (AdaBoost), XGBoost and categorical boosting (CatBoosting) are used to categorize incoming data as normal or spoofing. The experimental results indicate the efficiency of the suggested approach for correctly identifying spoofing attacks with high accuracy, fewer false positives, and reduced time needed. By utilizing feature importance and robust classification algorithms, the system can accurately differentiate between legitimate and malicious IoT traffic, thereby improving the overall security of IoT networks. The CatBoost classifier outperformed the AdaBoost and XGBoost classifiers in terms of accuracy.
Most recent studies have focused on using modern intelligent techniques spatially, such as those
developed in the Intruder Detection Module (IDS). Such techniques have been built based on modern
artificial intelligence-based modules. Those modules act like a human brain. Thus, they should have had the
ability to learn and recognize what they had learned. The importance of developing such systems came after
the requests of customers and establishments to preserve their properties and avoid intruders’ damage. This
would be provided by an intelligent module that ensures the correct alarm. Thus, an interior visual intruder
detection module depending on Multi-Connect Architecture Associative Memory (MCA)
Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreIn accounting studies, more than one method is used to measure income and balance sheets elements. One of these methods is called the fair value, which use to determine the assets and liabilities ad it includes the benefits or self-satisfaction ability. This paper aims to focus on the importance of fair value as a basis of accounting measurement and its effects to achieve the relevant characteristics by using the equation is used by (Kythreotis) in his research, And Also , Editing this equation depending on the financial data and information of Iraqi Banks as a case.
Mammography is at present one of the available method for early detection of masses or abnormalities which is related to breast cancer. The most common abnormalities that may indicate breast cancer are masses and calcifications. The challenge lies in early and accurate detection to overcome the development of breast cancer that affects more and more women throughout the world. Breast cancer is diagnosed at advanced stages with the help of the digital mammogram images. Masses appear in a mammogram as fine, granular clusters, which are often difficult to identify in a raw mammogram. The incidence of breast cancer in women has increased significantly in recent years.
This paper proposes a computer aided diagnostic system for the extracti
This study included the isolation and identification of Aspergillus flavus isolates associated with imported American rice grains and local corn grains which collected from local markets, using UV light with 365 nm wave length and different media (PDA, YEA, COA, and CDA ). One hundred and seven fungal isolates were identified in rice and 147 isolates in corn.4 genera and 7 species were associated with grains, the genera were Aspergillus ,Fusarium ,Neurospora ,Penicillium . Aspergillus was dominant with occurrence of 0.47% and frequency of 11.75% in rice grains whereas in corn grains the genus Neurospora was dominant with occurrence of 1.09% and frequency 27.25% ,results revealed that 20 isolates out of 50 A. flavus isolates were able
... Show MoreThe meniscus has a crucial function in human anatomy, and Magnetic Resonance Imaging (M.R.I.) plays an essential role in meniscus assessment. It is difficult to identify cartilage lesions using typical image processing approaches because the M.R.I. data is so diverse. An M.R.I. data sequence comprises numerous images, and the attributes area we are searching for may differ from each image in the series. Therefore, feature extraction gets more complicated, hence specifically, traditional image processing becomes very complex. In traditional image processing, a human tells a computer what should be there, but a deep learning (D.L.) algorithm extracts the features of what is already there automatically. The surface changes become valuable when
... Show MoreThis research aims to determine the extent of the contribution of organizational downsizing strategies to enhance the health of the researched organization represented by the Directorate of Education in Nineveh, and to achieve this goal, the study provided a simplified intellectual framework for the most important topics covered by writers and researchers for search variables, reinforced by an applied analytical framework for the opinions of (79) individuals responsible for the researched organization. The research adopted organizational downsizing as an independent variable that includes three dimensions represented by (reduction of human resources, job redesign, systemic strategy), while the organizational health represented th
... Show MoreThe research (Comic Scene Construction between Dramatic Situation and Acting Performance in Feature Film) has been divided into the following: the methodological framework which consists of the problem of the research: how to construct the comic scene between the dramatic situation and acting performance in the feature film. The research importance and aims are: identifying how to construct the comic scene between the dramatic situation and acting performance in the feature film. The limits of the research are also stated.
The research is divided into three sections: the first is the comic situation and the Aristotelian discourse in which the comic situation is clarified starting from the Aristotelian discourse. The second section: me
Waveform transport of Pseudo plastic fluid in complaint symmetric channel with culvature properties has designed. The efforts of magnetic force, which has applied by radiate direction in the analysis, is considered by using the influence of Hartmann number. Walls properties with slip conditions on velocity distribution as well as stream function are used. The analysis of" heat and mass transfer" has taken into account. More popularized factual constraints known by the convective conditions are applied. The partial differential equations of motion, temperature and concentration is reduced under the simulation of low quantity of wave number and Reynolds number and then transformed to or