The Internet of Things (IoT) is an expanding domain that can revolutionize different industries. Nevertheless, security is among the multiple challenges that it encounters. A major threat in the IoT environment is spoofing attacks, a type of cyber threat in which malicious actors masquerade as legitimate entities. This research aims to develop an effective technique for detecting spoofing attacks for IoT security by utilizing feature-importance methods. The suggested methodology involves three stages: preprocessing, selection of important features, and classification. The feature importance determines the most significant characteristics that play a role in detecting spoofing attacks. This is achieved via two techniques: decision tree (DT) and mutual information (MI). For classification, adaptive boosting (AdaBoost), XGBoost and categorical boosting (CatBoosting) are used to categorize incoming data as normal or spoofing. The experimental results indicate the efficiency of the suggested approach for correctly identifying spoofing attacks with high accuracy, fewer false positives, and reduced time needed. By utilizing feature importance and robust classification algorithms, the system can accurately differentiate between legitimate and malicious IoT traffic, thereby improving the overall security of IoT networks. The CatBoost classifier outperformed the AdaBoost and XGBoost classifiers in terms of accuracy.
For several applications, it is very important to have an edge detection technique matching human visual contour perception and less sensitive to noise. The edge detection algorithm describes in this paper based on the results obtained by Maximum a posteriori (MAP) and Maximum Entropy (ME) deblurring algorithms. The technique makes a trade-off between sharpening and smoothing the noisy image. One of the advantages of the described algorithm is less sensitive to noise than that given by Marr and Geuen techniques that considered to be the best edge detection algorithms in terms of matching human visual contour perception.
Corona virus sickness has become a big public health issue in 2019. Because of its contact-transparent characteristics, it is rapidly spreading. The use of a face mask is among the most efficient methods for preventing the transmission of the Covid-19 virus. Wearing the face mask alone can cut the chance of catching the virus by over 70\%. Consequently, World Health Organization (WHO) advised wearing masks in crowded places as precautionary measures. Because of the incorrect use of facial masks, illnesses have spread rapidly in some locations. To solve this challenge, we needed a reliable mask monitoring system. Numerous government entities are attempting to make wearing a face mask mandatory; this process can be facilitated by using face m
... Show MoreThe seizure epilepsy is risky because it happens randomly and leads to death in some cases. The standard epileptic seizures monitoring system involves video/EEG (electro-encephalography), which bothers the patient, as EEG electrodes are attached to the patient’s head.
Seriously, helping or alerting the patient before the seizure is one of the issue that attracts the researchers and designers attention. So that there are spectrums of portable seizure detection systems available in markets which are based on non-EEG signal.
The aim of this article is to provide a literature survey for the latest articles that cover many issues in the field of designing portable real-time seizure detection that includes the use of multiple
... Show MoreVoice Activity Detection (VAD) is considered as an important pre-processing step in speech processing systems such as speech enhancement, speech recognition, gender and age identification. VAD helps in reducing the time required to process speech data and to improve final system accuracy by focusing the work on the voiced part of the speech. An automatic technique for VAD using Fuzzy-Neuro technique (FN-AVAD) is presented in this paper. The aim of this work is to alleviate the problem of choosing the best threshold value in traditional VAD methods and achieves automaticity by combining fuzzy clustering and machine learning techniques. Four features are extracted from each speech segment, which are short term energy, zero-crossing rate, auto
... Show MorePavement crack and pothole identification are important tasks in transportation maintenance and road safety. This study offers a novel technique for automatic asphalt pavement crack and pothole detection which is based on image processing. Different types of cracks (transverse, longitudinal, alligator-type, and potholes) can be identified with such techniques. The goal of this research is to evaluate road surface damage by extracting cracks and potholes, categorizing them from images and videos, and comparing the manual and the automated methods. The proposed method was tested on 50 images. The results obtained from image processing showed that the proposed method can detect cracks and potholes and identify their severity levels wit
... Show MoreConcentrated research topic in the study of key variables in the work of the inspectors general offices , which are in the application of quality management standards audit work and reduce the incidence of corruption. It highlights the importance of current research in being a serious attempt aimed at highlighting the role of the importance of standards of quality management audit work , because they represent a router and leader of the accountant or ( Sergeant ) in the performance of his work and the extent of compliance with these standards , as well as highlight the role of quality audit in reducing the incidence of corruption , of during the professional performance of Higher auditors and determine the responsibilities entrus
... Show MoreThe current research aims to reveal the impact of the strategy of cooperative integration of fragmented information in the acquisition of physical concepts and science processes among fourth scientific students through the null hypotheses:
1- There is no statistically significant difference at the level of significance (0.05) between the average grades of female students of the experimental group studying physics according to the strategy of cooperative integration of fragmented information and those who follow the traditional method in the test of acquiring physical concepts.
2-There is no statistically significant difference at the level of indication (0.05) between the average grades of female students of the experimen
... Show MoreBackground: Although mammography is a powerful screening tool in detection of early breast cancer, it is imperfect, particularly for women with dense breast, which have a higher risk to develop cancer and decrease the sensitivity of mammogram, Automated breast ultrasound is a recently introduced ultrasonography technique, developed with the purpose to standardize breast ultrasonography and overcome some limitations of handheld ultrasound, this study aims to evaluate the diagnostic efficacy of Automated breast ultrasound and compare it with handheld ultrasound in the detection and characterization of breast lesions in women with dense breasts. Objectives: To evaluate the diagnostic efficacy of Automated breast ultrasound and compare
... Show MoreBackground: Although mammography is a powerful screening tool in detection of early breast cancer, it is imperfect, particularly for women with dense breast, which have a higher risk to develop cancer and decrease the sensitivity of mammogram, Automated breast ultrasound is a recently introduced ultrasonography technique, developed with the purpose to standardize breast ultrasonography and overcome some limitations of handheld ultrasound, this study aims to evaluate the diagnostic efficacy of Automated breast ultrasound and compare it with handheld ultrasound in the detection and characterization of breast lesions in women with dense breasts.
Objectives:<
... Show More