The Internet of Things (IoT) is an expanding domain that can revolutionize different industries. Nevertheless, security is among the multiple challenges that it encounters. A major threat in the IoT environment is spoofing attacks, a type of cyber threat in which malicious actors masquerade as legitimate entities. This research aims to develop an effective technique for detecting spoofing attacks for IoT security by utilizing feature-importance methods. The suggested methodology involves three stages: preprocessing, selection of important features, and classification. The feature importance determines the most significant characteristics that play a role in detecting spoofing attacks. This is achieved via two techniques: decision tree (DT) and mutual information (MI). For classification, adaptive boosting (AdaBoost), XGBoost and categorical boosting (CatBoosting) are used to categorize incoming data as normal or spoofing. The experimental results indicate the efficiency of the suggested approach for correctly identifying spoofing attacks with high accuracy, fewer false positives, and reduced time needed. By utilizing feature importance and robust classification algorithms, the system can accurately differentiate between legitimate and malicious IoT traffic, thereby improving the overall security of IoT networks. The CatBoost classifier outperformed the AdaBoost and XGBoost classifiers in terms of accuracy.
Background: The bond strength of the root canal sealers to dentin is very important property for maintaining the integrity and the seal of root canal filling. The aim of this study was to evaluate and compare the push-out bond strength of root filled with total fill Bioceramic, AH Plus and Gutta-flow®2 sealers using GuttaFusion®obturation system versus single cone obturation technique. Materials and method: sixty of mandibular premolars teeth with straight roots were used in this study, these roots were instrumented using Reciproc system, instrumentation were done with copious irrigation of 3 mL 5.25% sodium hypochlorite solution (NaOCl) during all the steps of preparation, and smear layer will be removed with 1 ml of 17% EDTA kept in
... Show MoreBackground: The bond strength of the root canal sealers to dentin is very important property for maintaining the integrity and the seal of root canal filling. The aim of this study was to evaluate and compare the push-out bond strength of root filled with total fill Bioceramic, AH Plus and Gutta-flow®2 sealers using GuttaFusion®obturation system versus single cone obturation technique. Materials and method: sixty of mandibular premolars teeth with straight roots were used in this study, these roots were instrumented using Reciproc system, instrumentation were done with copious irrigation of 3 mL 5.25% sodium hypochlorite solution (NaOCl) during all the steps of preparation, and smear layer will be removed with 1 ml of 17% EDTA kept in
... Show MoreThe interests toward developing accurate automatic face emotion recognition methodologies are growing vastly, and it is still one of an ever growing research field in the region of computer vision, artificial intelligent and automation. However, there is a challenge to build an automated system which equals human ability to recognize facial emotion because of the lack of an effective facial feature descriptor and the difficulty of choosing proper classification method. In this paper, a geometric based feature vector has been proposed. For the classification purpose, three different types of classification methods are tested: statistical, artificial neural network (NN) and Support Vector Machine (SVM). A modified K-Means clustering algorithm
... Show MoreThe study aimed at designing a training program by using training for the anaerobic differential threshold stand and the effects of those trainings on the variables of (Concentration of Lactic Acid and LDH Enzyme, VO2 MaX and Cortisol Hormone). The Researchers used the experimental program with one-group style. Also, they used a sample with (8) men-players in a (free 400 m men-runners) and they used many instruments and procedures, most notably the training-program prepared for 10 weeks and for 3 training units weekly, (70-90 min) for each unit. They used the training intensity from 85-100% of the player's ability. After finishing the training program and doing some pre-tests and post-tests then statistically checking the results, the resea
... Show MoreThe study aims to identify the students’ attitudes toward recent techniques’ use in teaching; using power point software and data show to facilitate teaching approaches as well as following the approach of lecture in giving subjects, do these techniques facilitate, increase, and tackle the difficulties of subjects, do these attitudes positive or negative?, and to what extent these techniques raise up students’ motivation.
The current study aims to overcome the conflicts facing the company in its way of staying and continuing to maintain its performance excellent in light of the intense competition, which made it seek to find strong ways and links with its customers through electronic communication using electronic platforms, and this put confidence and safety in The place of suspicion and fear of not fulfilling credibility or violating the privacy, so this research comes to answer about the question: “Can the company achieve an excellent performance by relying on the customer's electronic confidence?”.
The study followed the descriptive and analytical approaches by providing a virtual model and testing the zero hypotheses, which stipulat
... Show MoreBeyond the immediate content of speech, the voice can provide rich information about a speaker's demographics, including age and gender. Estimating a speaker's age and gender offers a wide range of applications, spanning from voice forensic analysis to personalized advertising, healthcare monitoring, and human-computer interaction. However, pinpointing precise age remains intricate due to age ambiguity. Specifically, utterances from individuals at adjacent ages are frequently indistinguishable. Addressing this, we propose a novel, end-to-end approach that deploys Mozilla's Common Voice dataset to transform raw audio into high-quality feature representations using Wav2Vec2.0 embeddings. These are then channeled into our self-attentio
... Show MoreThis study was designed to investigate the effect of aqueous extract of ginger Zingiber officinale Roscoe on the histology of corpus luteum and the concentration of the hormones progesterone and estrogen during the first trimester of pregnancy (0 - 7) days from fertilization. 30 pregnant mice were divided into five experimental groups: control group (administrated with distilled water), and four groups treated at doses (284, 568, 1136,1420 mg / kg), orally administrated , daily with (0.1 ml). Microscopic examination results have shown histopathological changes in corpus luteum included: Pyknosis in some nuclei of granulosa cells, Karyorrhexis, Karyolysis in some granulosa cells, and necrosis in corpus luteum, with additional significant dec
... Show MoreAbstract
The study aims to build a training program based on the Connectivism Theory to develop e-learning competencies for Islamic education teachers in the Governorate of Dhofar, as well as to identify its effectiveness. The study sample consisted of (30) Islamic education teachers to implement the training program, they were randomly selected. The study used the descriptive approach to determine the electronic competencies and build the training program, and the quasi-experimental approach to determine the effectiveness of the program. The study tools were the cognitive achievement test and the observation card, which were applied before and after. The study found that the effectiveness of the training program
... Show MoreThis study aims to predict the organic pollution produced from the presence of some polycyclic aromatic hydrocarbons (PAHs) and determination it's concentrations (µg/L , ppb) in Tigris river water by a collection twenty-seven water samples from a selected three stations with nine sampling sites and three depths of water (5 cm , 2 m and 4 m) each site for 4.6 km distance of a geographic studied area which is located between the ( Al-Senak and AL-Sarrafiah bridges ) at Baghdad city – Iraq on May, 2012. The geographic location was determined with a Global Positioning System (GPS) and Geographic Information System (GIS) software program. The concentrations of fourteen components (PAHs) were performed using the reverse phase
... Show More