Cryptography is a method used to mask text based on any encryption method, and the authorized user only can decrypt and read this message. An intruder tried to attack in many manners to access the communication channel, like impersonating, non-repudiation, denial of services, modification of data, threatening confidentiality and breaking availability of services. The high electronic communications between people need to ensure that transactions remain confidential. Cryptography methods give the best solution to this problem. This paper proposed a new cryptography method based on Arabic words; this method is done based on two steps. Where the first step is binary encoding generation used t
... Show MoreThe quality of Global Navigation Satellite Systems (GNSS) networks are considerably influenced by the configuration of the observed baselines. Where, this study aims to find an optimal configuration for GNSS baselines in terms of the number and distribution of baselines to improve the quality criteria of the GNSS networks. First order design problem (FOD) was applied in this research to optimize GNSS network baselines configuration, and based on sequential adjustment method to solve its objective functions.
FOD for optimum precision (FOD-p) was the proposed model which based on the design criteria of A-optimality and E-optimality. These design criteria were selected as objective functions of precision, whic
... Show MoreToday with increase using social media, a lot of researchers have interested in topic extraction from Twitter. Twitter is an unstructured short text and messy that it is critical to find topics from tweets. While topic modeling algorithms such as Latent Semantic Analysis (LSA) and Latent Dirichlet Allocation (LDA) are originally designed to derive topics from large documents such as articles, and books. They are often less efficient when applied to short text content like Twitter. Luckily, Twitter has many features that represent the interaction between users. Tweets have rich user-generated hashtags as keywords. In this paper, we exploit the hashtags feature to improve topics learned
CdO films were deposited on substrates from glass, Silicon and Porous silicon by thermal chemical spray pyrolysis technique with different thicknesses (130 and 438.46) nm. Measurements of X-ray diffraction of CdO thin film proved that the structure of the Polycrystalline is cubic lattice, and its crystallite size is located within nano scale range where the perfect orientation is (200). The results show that the surface’s roughness and the root mean square increased with increasing the thickness of prepared films. The UV-Visible measurements show that the CdO films with different thicknesses possess an allowed direct transition with band gap (4) eV. AFM measurement revealed that the silicon porosity located in nano range. Cadmium oxide f
... Show MoreThe Internet of Things (IoT) is an expanding domain that can revolutionize different industries. Nevertheless, security is among the multiple challenges that it encounters. A major threat in the IoT environment is spoofing attacks, a type of cyber threat in which malicious actors masquerade as legitimate entities. This research aims to develop an effective technique for detecting spoofing attacks for IoT security by utilizing feature-importance methods. The suggested methodology involves three stages: preprocessing, selection of important features, and classification. The feature importance determines the most significant characteristics that play a role in detecting spoofing attacks. This is achieved via two techniques: decision tr
... Show MoreSilver selenide telluride Semiconducting (Ag2Se0.8Te0.2) thin films were by thermal evaporation at RT with thickness350 nm at annealing temperatures (300, 348, 398, and 448) °K for 1 hour on glass substrates .using X-ray diffraction, the structural characteristics were calculated as a function of annealing temperatures with no preferential orientation along any plane. Atomic force microscopy (AFM) and X-ray techniques are used to analyze the Ag2SeTe thin films' physical makeup and properties. AFM techniques were used to analyze the surface morphology of the Ag2SeTe films, and the results showed that the values for average diameter, surface roughness, and grain size mutation increased with annealing temperature (116.36-171.02) nm The transm
... Show MoreSilver selenide telluride Semiconducting (Ag2Se0.8Te0.2) thin films were by thermal evaporation at RT with thickness350 nm at annealing temperatures (300, 348, 398, and 448) °K for 1 hour on glass substrates .using X-ray diffraction, the structural characteristics were calculated as a function of annealing temperatures with no preferential orientation along any plane. Atomic force microscopy (AFM) and X-ray techniques are used to analyze the Ag2SeTe thin films' physical makeup and properties. AFM techniques were used to analyze the surface morphology of the Ag2SeTe films, and the results showed that the values for average diameter, surface roughness, and grain size mutation increased with annealing temperature (116.36-171.02) nm The transm
... Show MoreBackground: This study was conducted to assess the effects of various beverages on the shear bond strength of light-cured orthodontic composite used to bond stainless steel orthodontic brackets on human teeth and to determine the site of bonding failure of this material. Materials and Methods: Fifty extracted human premolars were selected and randomly divided into five equal groups each with 10 teeth according to the beverage type (Control, One Tiger, Milk, Green tea and Coffee). After bonding, the teeth were immersed in specific beverages for 5 minutes twice daily with equal intervening intervals then washed and stored in distilled water at 37º C for the reminder of the day. The process was carried out for 30 days. The samples were then
... Show More 
        