The Internet of Things (IoT) is an expanding domain that can revolutionize different industries. Nevertheless, security is among the multiple challenges that it encounters. A major threat in the IoT environment is spoofing attacks, a type of cyber threat in which malicious actors masquerade as legitimate entities. This research aims to develop an effective technique for detecting spoofing attacks for IoT security by utilizing feature-importance methods. The suggested methodology involves three stages: preprocessing, selection of important features, and classification. The feature importance determines the most significant characteristics that play a role in detecting spoofing attacks. This is achieved via two techniques: decision tree (DT) and mutual information (MI). For classification, adaptive boosting (AdaBoost), XGBoost and categorical boosting (CatBoosting) are used to categorize incoming data as normal or spoofing. The experimental results indicate the efficiency of the suggested approach for correctly identifying spoofing attacks with high accuracy, fewer false positives, and reduced time needed. By utilizing feature importance and robust classification algorithms, the system can accurately differentiate between legitimate and malicious IoT traffic, thereby improving the overall security of IoT networks. The CatBoost classifier outperformed the AdaBoost and XGBoost classifiers in terms of accuracy.
Heart sound is an electric signal affected by some factors during the signal's recording process, which adds unwanted information to the signal. Recently, many studies have been interested in noise removal and signal recovery problems. The first step in signal processing is noise removal; many filters are used and proposed for treating this problem. Here, the Hankel matrix is implemented from a given signal and tries to clean the signal by overcoming unwanted information from the Hankel matrix. The first step is detecting unwanted information by defining a binary operator. This operator is defined under some threshold. The unwanted information replaces by zero, and the wanted information keeping in the estimated matrix. The resulting matrix
... Show MoreAnomaly detection is still a difficult task. To address this problem, we propose to strengthen DBSCAN algorithm for the data by converting all data to the graph concept frame (CFG). As is well known that the work DBSCAN method used to compile the data set belong to the same species in a while it will be considered in the external behavior of the cluster as a noise or anomalies. It can detect anomalies by DBSCAN algorithm can detect abnormal points that are far from certain set threshold (extremism). However, the abnormalities are not those cases, abnormal and unusual or far from a specific group, There is a type of data that is do not happen repeatedly, but are considered abnormal for the group of known. The analysis showed DBSCAN using the
... Show MoreThe research aims at shedding light on the impact of the organizational commitment on the performance of the Iraqi insurance company as a service company that provides many services to customers both internal (individuals working) or external, Whenever the company was able to adopt new concepts to increase the understanding and knowledge of how their attention to individuals working and to provide an appropriate working environment, and to clarify the objectives and strategies for them, and create a sense of their importance, as reflected on job performance in attracting new customers, and build long-term relationships with them . In order to achieve this, the research relied on the questionnaire as a main tool for collecting data and in
... Show MoreEvaluation was carried out on the existing furrow irrigation system located in an open agricultural field within Hor Rajabh Township, south of Baghdad, Iraq (latitude: 33°09’ N, longitude: 44°24’ E). Two plots were chosen for comparison: treatment plot T1, which used subsurface water retention technology (SWRT) with a furrow irrigation system. While the treatment plot T2 was done by using a furrow irrigation procedure without SWRT. A comparison between the two treatment plots was carried out to study the efficiency of the applied water on crop yield. In terms of agricultural productivity and water use efficiency, plot T1 outperformed plot T2, according to the study’s final fin
The effect of metal nanoparticles on the anaerobic digestion of sludge and the sludge bacterial community are still not well-understood, and both improvements and inhibitions have been reported. This study investigated the impact of 2, 10, and 30 mg/g TS silver and copper oxide nanoparticles (AgNPs and CuONPs) on the mesophilic anaerobic digestion of sludge and the bacterial community structure. The reactors were monitored for changes in tCOD, sCOD, TS, VS, biogas generation, and cell viability. Also, the relative abundance and taxonomic distribution of the bacterial communities were analyzed at the phylum and genus levels, including the genera involved in anaerobic digestion. Both AgNPs and CuONPs exhibited some inhibition on anaer
... Show MoreIn the midst of rapid changes and difficultiesand the tough competition faced by the Iraqi banks, it has become necessary to focus on a significant aspect of administrative work; that is strategic planning and the key role of implementation within this process in improving the banking service quality. It has emerged as a critical and main competitive weapon for distinguishing the services provided by banks from each other in an effort to participate in increasing market share of the bank in question in question; in its growth, continuation and profit increase.
The research has addressed the relation between the independent variable (implementation within strategic planning), and the dependent variable (banking service quality and
... Show MoreThe research aims to shed light on the amount of proceeds annual tax for each of the way the contract total and percentage of completion method - see which is better - as well as the current problems arising from the application method of the contract in full in settling accounts tax - to identify problems - related to postpone settling accounts tax in accordance with the way the contract fully and determine the advantages and disadvantages of each of the methods through practical application , and then use the results as inputs to help in the decision to confirm the continuation of the GCT using a full decade in settling accounts tax for long-term construction contracts or forgo them.
Were the result of research the existence of
... Show Moreفي هذا العصر - الذي داهمت في الأخطار لغة الفصاحة والبيان - يبقى القرآن الكريم أعظم حافظ للغة السليمة ، وأكبر معين لأهلها للحفاظ على ثرائها وبلاغتها ، فهي باقية ببقائه ما بقي الليل والنهار .
وهذا البحث يدور حول حفظ القرآن الكريم وأثره على لغة الطفل، ويتكون من مقدمة : وفيها بيان أهمية الموضوع ، وخطة البحث ، ومنهجه، وثلاثة مباحث:
المبحث الأول : فضل حفظ القرآن الكريم ، وفوائد حفظه إجمالاً ، والمبحث الثاني :
... Show More