Recent growth in transport and wireless communication technologies has aided the evolution of Intelligent Transportation Systems (ITS). The ITS is based on different types of transportation modes like road, rail, ocean and aviation. Vehicular ad hoc network (VANET) is a technology that considers moving vehicles as nodes in a network to create a wireless communication network. VANET has emerged as a resourceful approach to enhance the road safety. Road safety has become a critical issue in recent years. Emergency incidents such as accidents, heavy traffic and road damages are the main causes of the inefficiency of the traffic flow. These occurrences do not only create the congestion on the road but also increase the fuel consumption and p
... Show MoreAcademic Entitlement (AE) is the expectation by students to receive high grades or preferential treatment without significant effort. Exploring AE from faculty perspective has not been investigated in Arab colleges of pharmacy. The aim of this study was to explore experiences and perceptions towards student AE among pharmacy faculty in the Arab World. A cross-sectional, self-administered, anonymous, electronic survey was sent to pharmacy faculty across pharmacy colleges in Arab countries. The survey collected demographic data, an AE measure including 17 items reflecting seven AE components, and faculty perceptions and perceived reasons for AE. A total of 345 responses were collected. The AE level wa
This paper proposes a new encryption method. It combines two cipher algorithms, i.e., DES and AES, to generate hybrid keys. This combination strengthens the proposed W-method by generating high randomized keys. Two points can represent the reliability of any encryption technique. Firstly, is the key generation; therefore, our approach merges 64 bits of DES with 64 bits of AES to produce 128 bits as a root key for all remaining keys that are 15. This complexity increases the level of the ciphering process. Moreover, it shifts the operation one bit only to the right. Secondly is the nature of the encryption process. It includes two keys and mixes one round of DES with one round of AES to reduce the performance time. The W-method deals with
... Show MoreAdministrative procedures in various organizations produce numerous crucial records and data. These
records and data are also used in other processes like customer relationship management and accounting
operations.It is incredibly challenging to use and extract valuable and meaningful information from these data
and records because they are frequently enormous and continuously growing in size and complexity.Data
mining is the act of sorting through large data sets to find patterns and relationships that might aid in the data
analysis process of resolving business issues. Using data mining techniques, enterprises can forecast future
trends and make better business decisions.The Apriori algorithm has bee
The effect of electrolysis operating parameters on the removal efficiency of cadmium from a simulated wastewater was studied by adopting response surface methodology combined with Box–Behnken Design. As a new electrode design, spiral-wound woven wire mesh rotating cylinder electrode was used for cadmium removal. Current (240–400 mA), rotation speed (200–1000 rpm), initial cadmium concentration (200–600ppm), and cathode mesh number (30–60) were chosen as independent variables while the removal efficiency of cadmium was considered as a response function. The results revealed that the rotation speed has the major effect on the removal efficiency of cadmium. Regression analysis showed good fit of the experimental data to the second-or
... Show MoreThe rapid development of telemedicine services and the requirements for exchanging medical information between physicians, consultants, and health institutions have made the protection of patients’ information an important priority for any future e-health system. The protection of medical information, including the cover (i.e. medical image), has a specificity that slightly differs from the requirements for protecting other information. It is necessary to preserve the cover greatly due to its importance on the reception side as medical staff use this information to provide a diagnosis to save a patient's life. If the cover is tampered with, this leads to failure in achieving the goal of telemedicine. Therefore, this work provides an in
... Show MoreCrime is a threat to any nation’s security administration and jurisdiction. Therefore, crime analysis becomes increasingly important because it assigns the time and place based on the collected spatial and temporal data. However, old techniques, such as paperwork, investigative judges, and statistical analysis, are not efficient enough to predict the accurate time and location where the crime had taken place. But when machine learning and data mining methods were deployed in crime analysis, crime analysis and predication accuracy increased dramatically. In this study, various types of criminal analysis and prediction using several machine learning and data mining techniques, based o
The building of the Babylonian theater is considered as one of the distinctive buildings where its foundations have remained steadfast in the face of geographical changes, social's erosion and groundwater that threatened almost all traces of Babylon despite the destruction of the outer structure of the building. The general directorate of antiques performed prospection for those foundations (the ground map), and then the building was completed by new bricks over the original scheme. It became clear when examining the building; its components and foundations, that the building is unique in comparison with the old buildings of the world throughout Iraq. There are similar buildings in other places like Jordan and North Africa such as