In this review paper, several research studies were surveyed to assist future researchers to identify available techniques in the field of infectious disease modeling across complex networks. Infectious disease modelling is becoming increasingly important because of the microbes and viruses that threaten people’s lives and societies in all respects. It has long been a focus of research in many domains, including mathematical biology, physics, computer science, engineering, economics, and the social sciences, to properly represent and analyze spreading processes. This survey first presents a brief overview of previous literature and some graphs and equations to clarify the modeling in complex networks, the detection of societies and their medical information, the identification of nodes, the method of communication with individuals and their spread, the analysis of their transmission through complex networks, and the detection of mathematical methods over the past century. Secondly, the types of epidemiological models and complex networks and the extent of their impact on humans are presented.
The efforts in designing and developing lightweight cryptography (LWC) started a decade ago. Many scholarly studies in literature report the enhancement of conventional cryptographic algorithms and the development of new algorithms. This significant number of studies resulted in the rise of many review studies on LWC in IoT. Due to the vast number of review studies on LWC in IoT, it is not known what the studies cover and how extensive the review studies are. Therefore, this article aimed to bridge the gap in the review studies by conducting a systematic scoping study. It analyzed the existing review articles on LWC in IoT to discover the extensiveness of the reviews and the topics covered. The results of the study suggested that many re
... Show MoreThe sensitive and important data are increased in the last decades rapidly, since the tremendous updating of networking infrastructure and communications. to secure this data becomes necessary with increasing volume of it, to satisfy securing for data, using different cipher techniques and methods to ensure goals of security that are integrity, confidentiality, and availability. This paper presented a proposed hybrid text cryptography method to encrypt a sensitive data by using different encryption algorithms such as: Caesar, Vigenère, Affine, and multiplicative. Using this hybrid text cryptography method aims to make the encryption process more secure and effective. The hybrid text cryptography method depends on circular queue. Using circ
... Show MoreAniera desert/cola was found new to science and to the Iraqi fauna. The description was
mainly based on external features and male genit
Media has become a common platform for communication as a tool of offense. English language has many insult words which are commonly used in the world of media. This study investigates the socio-pragmatic aspect of insulting in English news. It aims at identifying and analysing insult words and expressions used by news presenters. To specify the problem of the study, language has a harmful power that hurts the addressees and seriously harm their psychological well-being. The insulting words that are an element of all human languages are the source of this abusive power. The study questions sought to find out are if news presenters use insult words, which insult words, and in what social contexts. In this study, the descriptive method is use
... Show MoreAW Ali T, Journal of the Faculty of Medicine, 2016 - Cited by 1
Nowadays, it is quite usual to transmit data through the internet, making safe online communication essential and transmitting data over internet channels requires maintaining its confidentiality and ensuring the integrity of the transmitted data from unauthorized individuals. The two most common techniques for supplying security are cryptography and steganography. Data is converted from a readable format into an unreadable one using cryptography. Steganography is the technique of hiding sensitive information in digital media including image, audio, and video. In our proposed system, both encryption and hiding techniques will be utilized. This study presents encryption using the S-DES algorithm, which generates a new key in each cyc
... Show MoreTrimethoprim derivative Schiff bases are versatile ligands synthesized with carbonyl groups from the condensation of primary amines (amino acids). Because of their broad range of biological activity, these compounds are very important in the medical and pharmaceutical fields. Biological activities such as antibacterial, antifungal and antitumor activity are often seen. Transition metal complexes derived from biological activity Schiff base ligands have been commonly used.
Purpose: The concept of complete street is one of the modern trends concerned with diversifying means of transportation and reducing the disadvantages of mechanical transportation modes. This paper discusses the role of complete streets can play in developing the urban environment in the Alyarmok District of Baghdad. Method/design/approach: The linear regression method used to analyze the opinions of 100 respondents surveyed in the study area in order to find the relationship between the urban environment and the complete street elements. Theoretical framework: The Modern trends in urban planning aim to find alternatives to the policies of traditional transportation planning that focus on vehicular mobi
... Show MoreImplementation of TSFS (Transposition, Substitution, Folding, and Shifting) algorithm as an encryption algorithm in database security had limitations in character set and the number of keys used. The proposed cryptosystem is based on making some enhancements on the phases of TSFS encryption algorithm by computing the determinant of the keys matrices which affects the implementation of the algorithm phases. These changes showed high security to the database against different types of security attacks by achieving both goals of confusion and diffusion.