This work presents an approach for the applying Triple DES (TRIPLE DES) based on using genetic algorithm by adding intelligent feature for TRIPLE DES with N round for genetic algorithm. Encapsulated cipher file with special program which send an acknowledgment to a sender to know who decipher or broken to crash it , Thus it is considered as the initial step to improve privacy. The outcome for proposed system gives a good indication that it is a promising system compared with other type of cipher system.
It highlights the importance of construction projects because of its significant role in the development of society, including the buildings FEDE projects to their importance to raise the level of education through the conclusion of the special to implementation and the establishment of schools of contracts at the country level, which requires the completion of the project at less time and within the cost specified and the best quality and may highlight the importance of time on all the elements of what has an important role in setting up the project for various reasons may be the need for the use of schools as soon as possible, but the reality showed exceeded the completion of those schools could be up to 6 years and there are some cont
... Show Morecapable of the measuring with a high degree of precision in a single instrument. Total stations device are used for station setting up, setting-outmany points from one station. Their major purpose of this work is to take advantage of total station for setting up building and to establish 3D representation using AutoCAD program. The area of the study was Civil Engineering Department at Baghdad University campus AL Jadiriyah. The completion of the work is done in two stages; 1. The field work: In this stage, the Total Station Nikon Nivo-5C was selected for the current study. This device was measured horizontal and vertical distance, elevations, and coordinates from a single set up. This data directly stored on memory. 2. The office work: In t
... Show MoreThe analysis of time series considers one of the mathematical and statistical methods in explanation of the nature phenomena and its manner in a specific time period.
Because the studying of time series can get by building, analysis the models and then forecasting gives the priority for the practicing in different fields, therefore the identification and selection of the model is of great importance in spite of its difficulties.
The selection of a standard methods has the ability for estimation the errors in the estimated the parameters for the model, and there will be a balance between the suitability and the simplicity of the model.
In the analysis of d
... Show MoreThe sequence in the upper part of the Balambo Formation is composed mainly of limestone alternating with marly limestones and dark grey shale in the Bosheen section (eastern Sulaymaniyah, northeastern Iraq) and has been studied in terms of its rare earth element (REE) content. The REEs are very low compared to modern marine sediments. They are depletion in LREEs, and enrichment in HREEs and (La/Yb)N in the studied rocks, indicating that these sediments retained the REEs pattern of marine waters. The negative Ce anomaly reflects direct sedimentation from marine waters under anoxic conditions with the contribution of terrigenous clays. The positive correlation of ∑REEs with Al, Ti, and Y, and the negative correlation of ∑REE
... Show MoreAn intelligent software defined network (ISDN) based on an intelligent controller can manage and control the network in a remarkable way. In this article, a methodology is proposed to estimate the packet flow at the sensing plane in the software defined network-Internet of Things based on a partial recurrent spike neural network (PRSNN) congestion controller, to predict the next step ahead of packet flow and thus, reduce the congestion that may occur. That is, the proposed model (spike ISDN-IoT) is enhanced with a congestion controller. This controller works as a proactive controller in the proposed model. In addition, we propose another intelligent clustering controller based on an artificial neural network, which operates as a reactive co
... Show MoreSteganography is a technique of concealing secret data within other quotidian files of the same or different types. Hiding data has been essential to digital information security. This work aims to design a stego method that can effectively hide a message inside the images of the video file. In this work, a video steganography model has been proposed through training a model to hiding video (or images) within another video using convolutional neural networks (CNN). By using a CNN in this approach, two main goals can be achieved for any steganographic methods which are, increasing security (hardness to observed and broken by used steganalysis program), this was achieved in this work as the weights and architecture are randomized. Thus,
... Show MoreTor (The Onion Routing) network was designed to enable users to browse the Internet anonymously. It is known for its anonymity and privacy security feature against many agents who desire to observe the area of users or chase users’ browsing conventions. This anonymity stems from the encryption and decryption of Tor traffic. That is, the client’s traffic should be subject to encryption and decryption before the sending and receiving process, which leads to delay and even interruption in data flow. The exchange of cryptographic keys between network devices plays a pivotal and critical role in facilitating secure communication and ensuring the integrity of cryptographic procedures. This essential process is time-consuming, which causes del
... Show More