The Internet of Things (IoT) is an expanding domain that can revolutionize different industries. Nevertheless, security is among the multiple challenges that it encounters. A major threat in the IoT environment is spoofing attacks, a type of cyber threat in which malicious actors masquerade as legitimate entities. This research aims to develop an effective technique for detecting spoofing attacks for IoT security by utilizing feature-importance methods. The suggested methodology involves three stages: preprocessing, selection of important features, and classification. The feature importance determines the most significant characteristics that play a role in detecting spoofing attacks. This is achieved via two techniques: decision tree (DT) and mutual information (MI). For classification, adaptive boosting (AdaBoost), XGBoost and categorical boosting (CatBoosting) are used to categorize incoming data as normal or spoofing. The experimental results indicate the efficiency of the suggested approach for correctly identifying spoofing attacks with high accuracy, fewer false positives, and reduced time needed. By utilizing feature importance and robust classification algorithms, the system can accurately differentiate between legitimate and malicious IoT traffic, thereby improving the overall security of IoT networks. The CatBoost classifier outperformed the AdaBoost and XGBoost classifiers in terms of accuracy.
Exploitation of mature oil fields around the world has forced researchers to develop new ways to optimize reservoir performance from such reservoirs. To achieve that, drilling horizontal wells is an effective method. The effectiveness of this kind of wells is to increase oil withdrawal. The objective of this study is to optimize the location, design, and completion of a new horizontal well as an oil producer to improve oil recovery in a real field located in Iraq. “A” is an oil and gas condensate field located in the Northeast of Iraq. From field production history, it is realized the difficulty to control gas and water production in this kind of complex carbonate reservoir with vertical producer wells. In this study, a horizont
... Show MoreIn this study, condensation polymerization was used to synthesize a number of novel liquid crystal polymers with 1,3,4-oxadiazole rings based on melamine. The new synthesized polymers were characterized by Fourier transform infrared (FTIR) and proton nuclear magnetic resonance (1HNMR) spectroscopy. Differential scanning calorimetry (DSC) and optical polarization microscopy (OPM) were used to investigate their liquid crystalline properties. The results demonstrated that throughout a wide temperature range, most of the polymers exhibited columnar (CohX) and nematic (N) liquid crystalline phases.
In this work we used the environmentally friendly method to prepared ZrO2 nanoparticles utilizing the extract of Thyms plant In basic medium and at pH 12, the ZrO2 NPs was characterized by different techniques such as FTIR, ultraviolet visible, Atomic force microscope, Scanning Electron Microscopy, X-ray diffraction and Energy dispersive X-ray. The average crystalline size was calculated using the Debye Scherres equation in value 7.65 nm. Atomic force microscope results showed the size values for ZrO2 NPs were 45.11nm, and there are several distortions due to the presence of some large sizes. Atomic force microscope results showed the typical size values for ZrO2 NPs were 45.11 nm, and there are several distortions due to the presence of so
... Show MoreIn this paper, some estimators of the unknown shape parameter and reliability function of Basic Gompertz distribution (BGD) have been obtained, such as MLE, UMVUE, and MINMSE, in addition to estimating Bayesian estimators under Scale invariant squared error loss function assuming informative prior represented by Gamma distribution and non-informative prior by using Jefferys prior. Using Monte Carlo simulation method, these estimators of the shape parameter and R(t), have been compared based on mean squared errors and integrated mean squared, respectively
Shabak is one of minority related to Kurdish nation , speaking Bajalan variety especially Goran Dialect.
This study is a historic and diactological study about Kurdish Bajalan variety.The study is composed an introduction and tw0 chapters. The first chapter talks about Bajalan variety , and it has two axes . In the first axe , I talk about the geography of Bajalan variety and in the second axes the map of goran dialect . The second chapter is about Shabak variety and it is constituted of three axes : The first section is about Shabak variety , in the second section is allocated to the domicile of Shabak variety and in the third section , talks about the saint of shabak and in the end the
... Show More