The Internet of Things (IoT) is an expanding domain that can revolutionize different industries. Nevertheless, security is among the multiple challenges that it encounters. A major threat in the IoT environment is spoofing attacks, a type of cyber threat in which malicious actors masquerade as legitimate entities. This research aims to develop an effective technique for detecting spoofing attacks for IoT security by utilizing feature-importance methods. The suggested methodology involves three stages: preprocessing, selection of important features, and classification. The feature importance determines the most significant characteristics that play a role in detecting spoofing attacks. This is achieved via two techniques: decision tree (DT) and mutual information (MI). For classification, adaptive boosting (AdaBoost), XGBoost and categorical boosting (CatBoosting) are used to categorize incoming data as normal or spoofing. The experimental results indicate the efficiency of the suggested approach for correctly identifying spoofing attacks with high accuracy, fewer false positives, and reduced time needed. By utilizing feature importance and robust classification algorithms, the system can accurately differentiate between legitimate and malicious IoT traffic, thereby improving the overall security of IoT networks. The CatBoost classifier outperformed the AdaBoost and XGBoost classifiers in terms of accuracy.
The consequences of ionizing radiation-induced oxidative stress on radiographers in X-ray and CT-scan departments utilizing several biochemical were analyzed. The study found highly considerable discrepancies in the interplay between radiation levels and gender in terms of mean Malondialdehyde (MAD), Vitamin D3 (Vit.D3), Triiodothyronine (T3), Thyroxine (T4), and High-Density Lipoprotein (HDL), but not Thyroid Stimulating Hormone (TSH), cholesterol, triglyceride (TG) and Low-Density Lipoprotein (LDL). The findings indicated that malondialdehyde is a useful biomarker for assessing oxidative stress in radiographers with exposure to ionizing radiation.
Intrusion detection systems detect attacks inside computers and networks, where the detection of the attacks must be in fast time and high rate. Various methods proposed achieved high detection rate, this was done either by improving the algorithm or hybridizing with another algorithm. However, they are suffering from the time, especially after the improvement of the algorithm and dealing with large traffic data. On the other hand, past researches have been successfully applied to the DNA sequences detection approaches for intrusion detection system; the achieved detection rate results were very low, on other hand, the processing time was fast. Also, feature selection used to reduce the computation and complexity lead to speed up the system
... Show MoreValues are penetrating or interfering in the lives of individuals and groups and are connected to them in the sense of life itself, because they are closely linked to the motives of behavior, hopes and goals, and can be said that values are everything. The concept of values is one of the concepts that have received the attention of researchers from different disciplines. This has resulted in a kind of confusion and variation in use from one specialization to the other, and uses multiple uses within one specialization. Therefore, there is no uniform definition of values because they relate to individuals. Individuals differ in many things, such as perception,
... Show MoreThe diversity of cultures is still the title of an Iraqi specificity that gave the society a diversity and this is reflected in the journalistic reality with the changing of the political system generate a new political and ideological life that differs from what is prevailed during the decades. However, its exacerbation of the degree of division is an additional duty for the press as a cultural platform and a knowledge bridge that contributes to the process of dialogue, addressing the differences, establishing a politically homogeneous structure through the state and socially by uniting all components of society and working to raise public awareness of the importance of national belonging to build a modern state. Cultural diversity is a
... Show MoreThis study aims to determine the impact of organization values as an independent variable across its dimensions (organization management values, organization mission values, relations management values, and environment management values) on achieve the strategic success which is the dependent variable and include its dimensions (environmental analysis, creative thinking, strategic decision, effective implementation, and leadership capacities). The study is conducted in the Iraq Oil Ministry. It deployed the analytical descriptive approach. It focuses on the study problem enquiries throughout addressing several principal and sub-hypothesizes in regards to cause and effect relationship. To achieve this result
... Show MoreIntrusion detection system is an imperative role in increasing security and decreasing the harm of the computer security system and information system when using of network. It observes different events in a network or system to decide occurring an intrusion or not and it is used to make strategic decision, security purposes and analyzing directions. This paper describes host based intrusion detection system architecture for DDoS attack, which intelligently detects the intrusion periodically and dynamically by evaluating the intruder group respective to the present node with its neighbors. We analyze a dependable dataset named CICIDS 2017 that contains benign and DDoS attack network flows, which meets certifiable criteria and is ope
... Show MoreThe internationalization of the Libyan crisis and its accompanying militarization of the conflict have played a vital role in hindering to reach a comprehensive political settlement solution in Libya. The increasing international greediness in the Libyan energy resources and the geopolitical importance of the Libyan State led to the involvement of many international and regional powers in this crisis and transformed the Libyan crisis into “proxy war”. Moreover, the Turkish direct military intervention in the Libyan crisis is considered as one of the main constraints facing the international and regional efforts to settle the Libyan crisis as a result of the Turkish insistence on its military existence in Libya to preserve i
... Show MoreThe aim of the current research is to recognizing the impact of mind and informational strategy on the achievement with the second intermediate students in the grammar of arabic language, the researcher used a partial-set experimental design and intentionally selected a sample out of the second intermediate class from (AL- Markazya Intermediate school) in the district of Hilla, affiliated which belongs to General Directorate of Babylon Education in the year (2020-2021) for applying the experiment. The sample was composed of (50) students, (25) ones for each group, the experimental group and normal one. The researcher balanced between the two groups in various changes including: (the chronological age counted by months, the academic achie
... Show More