The Internet of Things (IoT) is an expanding domain that can revolutionize different industries. Nevertheless, security is among the multiple challenges that it encounters. A major threat in the IoT environment is spoofing attacks, a type of cyber threat in which malicious actors masquerade as legitimate entities. This research aims to develop an effective technique for detecting spoofing attacks for IoT security by utilizing feature-importance methods. The suggested methodology involves three stages: preprocessing, selection of important features, and classification. The feature importance determines the most significant characteristics that play a role in detecting spoofing attacks. This is achieved via two techniques: decision tree (DT) and mutual information (MI). For classification, adaptive boosting (AdaBoost), XGBoost and categorical boosting (CatBoosting) are used to categorize incoming data as normal or spoofing. The experimental results indicate the efficiency of the suggested approach for correctly identifying spoofing attacks with high accuracy, fewer false positives, and reduced time needed. By utilizing feature importance and robust classification algorithms, the system can accurately differentiate between legitimate and malicious IoT traffic, thereby improving the overall security of IoT networks. The CatBoost classifier outperformed the AdaBoost and XGBoost classifiers in terms of accuracy.
An experimental and numerical study was carried out to investigate the heat transfer by natural convection in a three dimensional annulus enclosure filled with porous media (silica sand) between two inclined concentric cylinders with (and without) annular fins attached to the inner cylinder under steady state condition. The experiments were carried out for a range of modified Rayleigh number (0.2 ≤Ra*≤ 11) and extended to Ra*=500 for numerical study and for annulus inclination angle of (δ = 0˚, 30˚, 60˚ and 90˚). The numerical study was to give the governing equation under assumptions that used Darcy law and Boussinesq’s approximation and then it was solved numerically using finite difference approximation. It was found that t
... Show MoreThe Internet makes the world like a small village. It has the ability to make groups of the same ideas, thoughts, and identity close to each other by gathering them in one place. It is a way to communicate and share information and opinion; shaping and sharing of comprising individuals with common interests and the participation of individuals in a fruitful dialogue results in achieving a set of goals promote ideas and mobilizing people about issues and events of common interests.
To address the relationship of the internet via interactive communication and its ability to achieve social capital and discuss issues and various social events, the study sees that the problem of the study could be formulated as follows:
Consid
... Show MoreTo study the qualitative changes in testis tissue after carbon tetrachloride (CCl4) administration and to determine whether citric acid (CA) has a protective effect against testis damage induced by CCl4. This study compared two types of CA by measuring the histoarchitecture of the testis and serum levels of progesterone, estrogen and testosterone on mice. One of the most produced organic acid is citric acid. In this study, CA produced by microbial fermentation using Aspergillus Niger 5mg/kg and derived from citrus limon 400mg/kg (lemon). Mice were treated with daily intraperitoneal (i.p.) injection for seven successive days after randomly separated into six groups: (1) control, (2) CCl4 (0.02%), (3) limon citric acid (400 mg/kg), (4) CCl4 (
... Show MoreThis study aimed at indicators of technical analysis and their impact on a group of trading stock indices related to it, by standing on the methods used in technical analysis and its various models, diagnosing the obstacles and difficulties that the participants face in predicting stock prices, and proposing solutions and recommendations to overcome and overcome them. From a scientific and practical perspective.
Where the research community consisted of (25) Iraqi private commercial banks, while the research sample consisted of (3) banks with a percentage of (12%) of the research community. The study used the analytical approach to the financial statements during the period between (1/2/ 2022-30/4/2022),
... Show MoreTwelve pends were selected and distributed on three verticals transects paths on the Tigers river in Al Rasheed county.Passing through land covers, that classified and covers the whole region. Based on the 8 Landsat of the year 2015. It was oriental classified by using Erdas 10.2 . The pedons were distributed on the area of each varicty of these classes. the series of soil according of the transect series (DW74,MMg,DMu6 , Df96) respectively were represented P1 , P2 , P3 , P4 .
The second transits series(DM97,MM5,DM96,DF115) respectively were represented P5 , P6 , P7 , P8 .The third transits series(DM46,MMg,MF12,MM11) re
... Show MoreBackground: The fracture of instruments within root canal during endodontic treatment is a common incidence, fracture because of fatigue through flexure occurs due to metal fatigue, this study aimed to assess the effect of curvature angle and rotational speed on the cyclic fatigue of different type of Endodontic NiTi Rotary Instruments and compare among them. Materials and method: Three types of rotary instruments with tip size 0.25: ProTaPer F2 (Densply, Malifier) Revo-S SU( 0.06 taper, MicroMega) and RaCe system (0.06 taper, FKG, Dentaire), Forty file of each instrument were used within two canals with angle of curvature (40 &60 )at two speed (250&400)RPM, twelve group were formed for all instruments(total number=120),ten file fo
... Show MoreThe issue, the existence of God Almighty, and the creativity of the universes including the whale, and assets and how diversified, and faith in him and his lordship and divinity, is a delicate issue, and very important and dangerous, and it occupied human thought old and new, and still occupy it until God takes the land and on it. Many complex issues of thought, behavior, and ethics have resulted in the belief of many communities in the existence of the Almighty, having ruled their minds, depicting their beliefs and distancing their thoughts about slippage and abuse. When they looked at the wonders of creatures and the minutes of the assets, they thought about the planetary and astronomical motion systems. His existence was denied by ath
... Show MoreThe bodies responsible for the organization of accounting in the world seek to keep abreast of repaid development, by provide the information required by users, which they need to make efficient decision that return them to the desired benefits, and avoid the risks they could face if they made their decision based on misleading information, or insufficient, or not accurate, Hence, the IASB has undertaken to review the standards, and make the necessary adjustment and clarifications to remove the ambiguities that some of the paragraphs may have in IFRS issued.
And the Iraqi Central Bank obliges banks to convert from local accounting standards to apply IFRS only a step towards keeping pace with developments
... Show More