The design and implementation of an active router architecture that enables flexible network programmability based on so-called "user components" will be presents. This active router is designed to provide maximum flexibility for the development of future network functionality and services. The designed router concentrated mainly on the use of Windows Operating System, enhancing the Active Network Encapsulating Protocol (ANEP). Enhancing ANEP gains a service composition scheme which enables flexible programmability through integration of user components into the router's data path. Also an extended program that creates and then injects data packets into the network stack of the testing machine will be proposed, we will call this program the packet generator/injector (PGI). Finally, the success of the node architecture and its prototype implementation is evaluated by means of a few practical applications.
A simple all optical fiber sensor based on multimode interference (MMI) for chemical liquids sensing was designed and fabricated. A segment of coreless fiber (CF) was spliced between two single mode fibers to buildup single mode-coreless-single mode (SCS) structure. Broadband source and optical signal analyzer were connected to the ends of SCS structure. De-ionized water, acetone, and n-hexane were used to test the performance of the sensor. Two influence factors on the sensitivity namely the length and the diameter of the CF were investigated. The obtained maximum sensitivity was at n-hexane at 340.89 nm/RIU (at a wavelength resolution of the optical spectrum analyzer of 0.02 nm) when the diameter of the CF reduced from 125 μm to 60 μ
... Show MoreCipher security is becoming an important step when transmitting important information through networks. The algorithms of cryptography play major roles in providing security and avoiding hacker attacks. In this work two hybrid cryptosystems have been proposed, that combine a modification of the symmetric cryptosystem Playfair cipher called the modified Playfair cipher and two modifications of the asymmetric cryptosystem RSA called the square of RSA technique and the square RSA with Chinese remainder theorem technique. The proposed hybrid cryptosystems have two layers of encryption and decryption. In the first layer the plaintext is encrypted using modified Playfair to get the cipher text, this cipher text will be encrypted using squared
... Show MoreAbstract
This study aims to identify the most prominent factors that lead to bullying of students with intellectual disabilities in primary and middle schools from the perspectives of special education teachers. A quantitative descriptive approach was utilized. A questionnaire was used as a tool for data collection. The sample consisted of (72) male and female teachers from the Asir region in the Kingdom of Saudi Arabia. The results revealed the most prominent factors that lead to bullying as follows: factors associated with the school and its policies, factors associated with peers, factors associated with students with intellectual disabilities, and factors associated with general education teachers. The findin
... Show MoreThe research problem lies in: The use of positive and negative flexibility exercises to develop the special strength of the 400m hurdles player, that some young people face weakness and a problem in performance, which requires the need to prepare special exercises for physical and skill numbers using the types of exercises that have resilient strength, flexibility and have the effect on developing and determining the level of physical and skill performance. To develop 400m hurdles, special strength, explosive power and the characteristic velocity of arms and legs. Research aims: 1. Preparing positive and negative flexibility exercises to develop the special force and the effectiveness of 400m youth barriers. 2. Identify the effect of exerci
... Show MoreThis paper proposes a new encryption method. It combines two cipher algorithms, i.e., DES and AES, to generate hybrid keys. This combination strengthens the proposed W-method by generating high randomized keys. Two points can represent the reliability of any encryption technique. Firstly, is the key generation; therefore, our approach merges 64 bits of DES with 64 bits of AES to produce 128 bits as a root key for all remaining keys that are 15. This complexity increases the level of the ciphering process. Moreover, it shifts the operation one bit only to the right. Secondly is the nature of the encryption process. It includes two keys and mixes one round of DES with one round of AES to reduce the performance time. The W-method deals with
... Show MoreHeart disease is a significant and impactful health condition that ranks as the leading cause of death in many countries. In order to aid physicians in diagnosing cardiovascular diseases, clinical datasets are available for reference. However, with the rise of big data and medical datasets, it has become increasingly challenging for medical practitioners to accurately predict heart disease due to the abundance of unrelated and redundant features that hinder computational complexity and accuracy. As such, this study aims to identify the most discriminative features within high-dimensional datasets while minimizing complexity and improving accuracy through an Extra Tree feature selection based technique. The work study assesses the efficac
... Show MoreAbstract
Most of the industrial organization in the world became suffering from the problem of the pollution of the poisonous chemicals things, this urged to depend on the principle of the responsible production, because it has the positive role by dealing with these chemical things and to safe the health of the society, due to the main goal of this study is to restrict the role responsible production in accomplishing the system of the environmental management through an actual study in the northern gas company in Kirkuk province, the topic has acquired a big importance bacause there were a limited number of studies and res
... Show MoreThe current research included (the evaluation of Information Security Management System on according to international standard (ISO / IEC 27001: 2013) in Iraqi Commission for Computers and Informatics), for the development of an administrative system for information security is considered a priority in the present day, and in the light of the organizations dependence on computers and information technology in work and communication with others. The international legitimacy (represented by the International Organization for standardization (ISO)) remains the basis for matching and commitment and the importance of the application of information Security Management System accordi
... Show Moreتعتبر لعبة كرة اليد من الالعاب الفرقية، وان هذه اللعبة تستند الى قاعدة اساسية وهي الاداء الصحيح للمهارات، وللتقدم في هذه اللعبة يجب تعلم وأتقان اداء المهارات للوصول الى مستوى افضل للتعلم، من خلال الدور الذي يؤديه اسلوب نموذج كولب لأنماط التعلم (التكيفي) الذي يعمل على تحديد اسلوب التفكير والمفضل لكل فرد وتاثيره في تعلم مهارة الطبطبة للطالبات، اذ يعمل على ايصال المعلومات والافكار الخاصة باداء المهارة وحس
... Show More