In the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources. Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cry
... Show MoreInternet of Things (IoT) is one of the newest matters in both industry and academia of the communication engineering world. On the other hand, wireless mesh networks, a network topology that has been debate for decades that haven’t been put into use in great scale, can make a transformation when it arises to the network in the IoT world nowadays. A Mesh IoT network is a local network architecture in which linked devices cooperate and route data using a specified protocol. Typically, IoT devices exchange sensor data by connecting to an IoT gateway. However, there are certain limitations if it involves to large number of sensors and the data that should be received is difficult to analyze. The aim of the work here is to implement a self-
... Show MorePolyaniline organic Semiconductor polymer was prepared by oxidation polymerization by adding hydrochloric acid concentration of 0.1M and potassium per sulfate concentration of 0.2M to 0.1M of aniline at room temperature, the polymer was deposited at glass substrate, the structural and optical properties were studies through UV-VIS, IR, XRD measurements, films have been operated as a sensor of vapor H2SO4 and HCl acids.
Sensibly highlighting the hidden structures of many real-world networks has attracted growing interest and triggered a vast array of techniques on what is called nowadays community detection (CD) problem. Non-deterministic metaheuristics are proved to competitively transcending the limits of the counterpart deterministic heuristics in solving community detection problem. Despite the increasing interest, most of the existing metaheuristic based community detection (MCD) algorithms reflect one traditional language. Generally, they tend to explicitly project some features of real communities into different definitions of single or multi-objective optimization functions. The design of other operators, however, remains canonical lacking any inte
... Show MoreFunctionalized Multi-Walled Carbon Nanotubes (MWCNTs-OH) network with thickness 4μm was made by the vacuum filtration from suspension (FFS) method. The morphology, structure and optical properties of the MWCNTs film were characterized by SEM and UV-Vis. spectra techniques. The SEM images reflected highly ordered network in the form of ropes or bundles with close-packing which looks like spaghetti. The absorbance spectrum revealed that the network has a good absorbance in the UV-Vis. region. The gas sensor system was used to test the MWCNT-OH network to detect NH3gas at room temperature. The resistance of the sensor was increased when exposed to the NH3gas. The sensitivities of the network w
... Show MoreThe peculiarity of worship spaces in the Islamic architecture is evident by its symbolic connotations with doctrinal connections, thus the niche has a major status in that symbolic connotation, which transformed due to the cultural interaction from a rock on the wall directed towards Mecca into an element of integrated structural entity with performative and aesthetic characteristics. The spread of the Islamic religion contributed to subjecting it to a design acculturation process, thus the problem of the research was raised by the following question: has the evolutionary tendency of acculturation been able to effect a major transformation in the niche design? The research aims at identifying the design acculturation and its translation
... Show MoreCassava, a significant crop in Africa, Asia, and South America, is a staple food for millions. However, classifying cassava species using conventional color, texture, and shape features is inefficient, as cassava leaves exhibit similarities across different types, including toxic and non-toxic varieties. This research aims to overcome the limitations of traditional classification methods by employing deep learning techniques with pre-trained AlexNet as the feature extractor to accurately classify four types of cassava: Gajah, Manggu, Kapok, and Beracun. The dataset was collected from local farms in Lamongan Indonesia. To collect images with agricultural research experts, the dataset consists of 1,400 images, and each type of cassava has
... Show More