Wireless networks and communications have witnessed tremendous development and growth in recent periods and up until now, as there is a group of diverse networks such as the well-known wireless communication networks and others that are not linked to an infrastructure such as telephone networks, sensors and wireless networks, especially in important applications that work to send and receive important data and information in relatively unsafe environments, cybersecurity technologies pose an important challenge in protecting unsafe networks in terms of their impact on reducing crime. Detecting hacking in electronic networks and penetration testing. Therefore, these environments must be monitored and protected from hacking and malicious attacks. In this manuscript, a correspondence model is designed to discuss the algorithm in the environment of wireless communication systems and distributed computing by adopting the protocol data enhancement to the network using structured construction and diversity algorithm to improve the effectiveness of the intrusion detection system. Next, a multi-label convolutional neural network model is used to detect business transactions. An CNN was trained on the WSN-DS dataset using 5-Fold in CV technique with three hidden layers. The highest Precision values 0.951 of Grayhole attack for multi-classification.
The issue of communication and communication is receiving increasing attention in both contemporary studies and educational literature, and these studies emphasize the importance of studying communication within the classroom, which inevitably applies to the importance of relationships and tensions in the field of teaching art in particular because it is an emotional field that provides an opportunity for communication competencies and skills to be prominent and take Its wide scope, both among the students themselves and between teachers and students. The means of communication are the vessel in which the cultural relations and the commonalities between people revolve. The process of building relationships between students depends in man
... Show MoreThe paper proposes a methodology for predicting packet flow at the data plane in smart SDN based on the intelligent controller of spike neural networks(SNN). This methodology is applied to predict the subsequent step of the packet flow, consequently reducing the overcrowding that might happen. The centralized controller acts as a reactive controller for managing the clustering head process in the Software Defined Network data layer in the proposed model. The simulation results show the capability of Spike Neural Network controller in SDN control layer to improve the (QoS) in the whole network in terms of minimizing the packet loss ratio and increased the buffer utilization ratio.
Represent a topic occupational safety and health management is one of the priorities of the loading organization in the business environment ,and one of the requirement for the success and its impact on the productivity of workers and their performance in an appropriate working environment .The international responses to the problems that accompany the technological and industrial development of the business environment are the issuance of ISO 45001:2018 aimed at providing an appropriate framework for controlling risks , reducing injuries and work accidents and improving work performance ,after realizing the environmental relationship between safe and sound work with competition .The search’s issue is represented with the exist
... Show MoreBackground: Educational environment is one of the most important determinants of an effective curriculum. Students' perceptions of their educational environment have a significant impact on their behavior and academic progress. Objective: 1. To identify students’ perception to the educational environment.2. To identify any gender or class level differences in the students’ perception.Type of the study: This is a descriptive cross-sectional studyMethodology: The study was carried out on convenient sample of 150 students of 2nd and 5th grade. This study was done in Al Kindy Medical College, Baghdad, Iraq and conducted during the period from the 1st of October 2013 till the end of March 2014, by using DREEM questionnaire a validated uni
... Show MoreHuman skin detection, which usually performed before image processing, is the method of discovering skin-colored pixels and regions that may be of human faces or limbs in videos or photos. Many computer vision approaches have been developed for skin detection. A skin detector usually transforms a given pixel into a suitable color space and then uses a skin classifier to mark the pixel as a skin or a non-skin pixel. A skin classifier explains the decision boundary of the class of a skin color in the color space based on skin-colored pixels. The purpose of this research is to build a skin detection system that will distinguish between skin and non-skin pixels in colored still pictures. This performed by introducing a metric that measu
... Show MoreWireless Multimedia Sensor Networks (WMSNs) are a type of sensor network that contains sensor nodes equipped with cameras, microphones; therefore the WMSNS are able to produce multimedia data such as video and audio streams, still images, and scalar data from the surrounding environment. Most multimedia applications typically produce huge volumes of data, this leads to congestion. To address this challenge, This paper proposes Modify Spike Neural Network control for Traffic Load Parameter with Exponential Weight of Priority Based Rate Control algorithm (MSNTLP with EWBPRC). The Modify Spike Neural Network controller (MSNC) can calculate the appropriate traffi
... Show MoreThis study aims to preparation a standards code for sustainability requirements to contribute in a better understanding to the concept of sustainability assessment systems in the dimensions of Iraqi projects in general and in the high-rise building. Iraq is one of the developing countries that faced significant challenges in sustainability aspects environmental, economic and social, it became necessary to develop an effective sustainability building assessment system in respect of the local context in Iraq. This study presented a proposal for a system of assessing the sustainability requirements of Iraqi high rise buildings (ISHTAR), which has been developed through several integrated
In this paper, a description of a design for new DES block cipher, namely DES64X and DES128X. The goals of this design, a part of its security level, are large implementation flexibility on various operating systems as well as high performances. The high level structure is based on the principle of DES and Feistel schema, and proposes the design of an efficient key-schedule algorithm which will output pseudorandomsequences of subkeys. The main goal is to reach the highest possible flexibility, in terms of round numbers, key size, and block size. A comparison of the proposed systems on 32-bit, 64-bit operating system, using 32-bit and 64-bit Java Virtual Machine (JVM), showed that the latter has much better performance than the former.
... Show MoreResumen:
La traducción de los dos verbos ser y estar no es una tarea tan simple como piensan muchas personas, sino es una de las complicadas y difíciles tareas, ya que el traductor tiene que saber y perfeccionar los correctos casos gramaticales relacionados con esos dos verbos auxiliares tanto el verbo ser como el verbo estar, especialmente en la frase nominal para que pueda dar una clara y correcta traducción. Usados con el mismo adjetivo, "ser" comunicará una cualidad que es parte de la identidad o naturaleza del sujeto, mientras que "estar" comunicará un estado o circunstancia del mismo. Este e
... Show More