Cryptography is a major concern in communication systems. IoE technology is a new trend of smart systems based on various constrained devices. Lightweight cryptographic algorithms are mainly solved the most security concern of constrained devices and IoE systems. On the other hand, most lightweight algorithms are suffering from the trade-off between complexity and performance. Moreover, the strength of the cryptosystems, including the speed of the algorithm and the complexity of the system against the cryptanalysis. A chaotic system is based on nonlinear dynamic equations that are sensitive to initial conditions and produce high randomness which is a good choice for cryptosystems. In this work, we proposed a new five-dimensional of a chaoti
... Show MoreDuring the last few decades, many academic and professional groups gave attention to adopting the multi-criteria decision-making methods in a variety of contexts for decision-making that are given to the diversity and sophistication of their selections. Five different classification methods are tested and assessed in this paper. Each has its own set of five attribute selection approaches. By using the multi-criteria decision-making procedures, these data can be used to rate options. Technique for order of preference by similarity to ideal solution (TOPSIS) is designed utilizing a modified fuzzy analytic hierarchy process (MFAHP) to compute the weight alternatives for TOPSIS in order to obtain the confidence value of each class
... Show MoreThis study focused on the expression and regulation of BRCA1 in breast cancer cell lines compared to normal breast. BRCA1 transcript levels were assessed by real time quantitative polymerase chain reaction (RT-qPCR) in the cancer cell lines. Our data show overexpression of BRCA1 mRNA level in all the studied breast cancer cell lines: MCF-7, T47D, MDA-MB-231 and MDA-MB-468 along with Jurkat, leukemia T-lymphocyte, the positive control, relative to normal breast tissue. To investigate whether a positive or negative correlation exists between BRCA1 and the transcription factor E2F6, three different si-RNA specific for E2F6 were used to transfect the normal and cancerous breast cell lines. Interestingly, strong negative relationship was found b
... Show MoreThe focus of this article, reviewed a generalized of contraction mapping and nonexpansive maps and recall some theorems about the existence and uniqueness of common fixed point and coincidence fixed-point for such maps under some conditions. Moreover, some schemes of different types as one-step schemes ,two-step schemes and three step schemes (Mann scheme algorithm, Ishukawa scheme algorithm, noor scheme algorithm, .scheme algorithm, scheme algorithm Modified scheme algorithm arahan scheme algorithm and others. The convergence of these schemes has been studied .On the other hands, We also reviewed the convergence, valence and stability theories of different types of near-plots in convex metric space.
Polymer concrete were prepared by mixing epoxy resin with sand particles in three different grain size (150-300) , (300-600 ) and (600- 1200) μm respectively. The percentage of epoxy was 15%, 20 %, 25% and 30% wt of the total weight. Compression strength and flexural strength tests were carried out for the prepared samples.
The percentages of epoxy resin at 20% wt and 25% wt showed best mechanical properties for all grain sizes. These percentages were adopted to fill the voids between particles sand have two different size ranges (150-600) μm and {(150-300) & (600-1200)} μm respectively to obtain more dense material. The results showed that the strength of polymer composite at 20% resin is higher than 25% resin.
Plagiarism is described as using someone else's ideas or work without their permission. Using lexical and semantic text similarity notions, this paper presents a plagiarism detection system for examining suspicious texts against available sources on the Web. The user can upload suspicious files in pdf or docx formats. The system will search three popular search engines for the source text (Google, Bing, and Yahoo) and try to identify the top five results for each search engine on the first retrieved page. The corpus is made up of the downloaded files and scraped web page text of the search engines' results. The corpus text and suspicious documents will then be encoded as vectors. For lexical plagiarism detection, the system will
... Show MoreIn this paper, the error distribution function is estimated for the single index model by the empirical distribution function and the kernel distribution function. Refined minimum average variance estimation (RMAVE) method is used for estimating single index model. We use simulation experiments to compare the two estimation methods for error distribution function with different sample sizes, the results show that the kernel distribution function is better than the empirical distribution function.