Free Space Optical (FSO) technology offers highly directional, high bandwidth communication channels. This technology can provide fiber-like data rate over short distances. In order to improve security associated with data transmission in FSO networks, a secure communication method based on chaotic technique is presented. In this paper, we have turned our focus on a specific class of piece wise linear one-dimensional chaotic maps. Simulation results indicate that this approach has the advantage of possessing excellent correlation property. In this paper we examine the security vulnerabilities of single FSO links and propose a solution to this problem by implementing the chaotic signal generator “reconfigurable tent map”. As synchronization between transmitter and receiver is essential for the correct operation of such schemes, we have also attempted to determine parameters such as auto- and cross …
The increasing complexity of assaults necessitates the use of innovative intrusion detection systems (IDS) to safeguard critical assets and data. There is a higher risk of cyberattacks like data breaches and unauthorised access since cloud services have been used more frequently. The project's goal is to find out how Artificial Intelligence (AI) could enhance the IDS's ability to identify and classify network traffic and identify anomalous activities. Online dangers could be identified with IDS. An intrusion detection system, or IDS, is required to keep networks secure. We must create efficient IDS for the cloud platform as well, since it is constantly growing and permeating more aspects of our daily life. However, using standard intrusion
... Show MoreThis work aimed PVA nanofibers in a range of concentrations were successfully manufactured via electrospinning. PVA NFs/Si was effectively prepared using the electrospinning process. The structural, morphological, optical and electrical properties of the prepared PVA were studied using XRD, FE-SEM, UV-Vis spectrophotometer and I-V characteristics, respectively. The amorphous structure of PVA nanofibers was observed. The optical energy gap from ultraviolet to visible was between (2.75 and 2.41) eV, making this compound highly sensitive to visible orange light at 610 nm, with a photosensitivity of 66%. The optical energy gap of PVA/Si heterojunction was utilized to modify this film from the UV to the visible spectrum. As show in the results,
... Show MoreEbastine (EBS) is a non-sedating antihistamine with a long duration of action. This drug has predominantly hydrophobic property causing a low solubility and low bioavailability. Surface solid dispersions (SSD) is an effective technique for improving the solubility and dissolution rate of poorly soluble drugs by using hydrophilic water insoluble carriers.
The present study aims to enhance the solubility and dissolution rate of EBS by using surface solid dispersion technique. Avicel® PH101, Avicel® PH 102, croscarmellose sodium(CCS) and sodium starch glycolate(SSG) were used as water insoluble hydrophilic carriers.
The SSD formulations of EBS were prepared by the solvent evaporation method in different drug: carrier
... Show MorePraise be to God, and may blessings and peace be upon the Messenger of God, his family and companions, and from his family and after ...
It is the right of every nation to be proud of its heritage, science and civilization among the nations, taking pride in the efforts of its construction and the keenness of its scholars and dedication to serve their nation and their history, and from the great sciences that boast and honor our great nation and distinguish it over others the science of attribution and the preservation of the novel over generations and ages. The novel is preserved from the plagiarism of the nullified, the excess of the deceitful and the liars, and the science of isnad from religion as the scholars said, and without the
Recently, the increasing demand to transfer data through the Internet has pushed the Internet infrastructure to the nal edge of the ability of these networks. This high demand causes a deciency of rapid response to emergencies and disasters to control or reduce the devastating effects of these disasters. As one of the main cornerstones to address the data trafc forwarding issue, the Internet networks need to impose the highest priority on the special networks: Security, Health, and Emergency (SHE) data trafc. These networks work in closed and private domains to serve a group of users for specic tasks. Our novel proposed network ow priority management based on ML and SDN fullls high control to give the required ow priority to SHE dat
... Show MoreWith the development of computer architecture and its technologies in recent years, applications like e-commerce, e-government, e-governance and e-finance are widely used, and they act as active research areas. In addition, in order to increase the quality and quantity of the ordinary everyday transactions, it is desired to migrate from the paper-based environment to a digital-based computerized environment. Such migration increases efficiency, saves time, eliminates paperwork, increases safety and reduces the cost in an organization. Digital signatures are playing an essential role in many electronic and automatic based systems and facilitate this migration. The digital signatures are used to provide many services and s
... Show MoreIn this paper mildly-regular topological space was introduced via the concept of mildly g-open sets. Many properties of mildly - regular space are investigated and the interactions between mildly-regular space and certain types of topological spaces are considered. Also the concept of strong mildly-regular space was introduced and a main theorem on this space was proved.
The aim of this paper is to introduces and study the concept of CSO-compact space via the notation of simply-open sets as well as to investigate their relationship to some well known classes of topological spaces and give some of his properties.
The efficiency of the Honeywords approach has been proven to be a significant tool for boosting password security. The suggested system utilizes the Meerkat Clan Algorithm (MCA) in conjunction with WordNet to produce honeywords, thereby enhancing the level of password security. The technique of generating honeywords involves data sources from WordNet, which contributes to the improvement of authenticity and diversity in the honeywords. The method encompasses a series of consecutive stages, which include the tokenization of passwords, the formation of alphabet tokens using the Meerkat Clan Algorithm (MCA), the handling of digit tokens, the creation of unique character tokens, and the consolidation of honeywords. The optimization of t
... Show More