The objective of this work is to design and implement a cryptography system that enables the sender to send message through any channel (even if this channel is insecure) and the receiver to decrypt the received message without allowing any intruder to break the system and extracting the secret information. This work modernize the feedforward neural network, so the secret message will be encrypted by unsupervised neural network method to get the cipher text that can be decrypted using the same network to get the original text. The security of any cipher system depends on the security of the related keys (that are used by the encryption and the decryption processes) and their corresponding lengths. In this work, the key is the final weights that are obtained from the learning process within the neural network stage, So the work can be represented as an update or development for using the neural network to enhance the security of text. As a result for a powerful design, the resulted cipher system provides a high degree of security which satisfies the data confidentially which is the main goal of the most cryptography systems.
In this article, a new efficient approach is presented to solve a type of partial differential equations, such (2+1)-dimensional differential equations non-linear, and nonhomogeneous. The procedure of the new approach is suggested to solve important types of differential equations and get accurate analytic solutions i.e., exact solutions. The effectiveness of the suggested approach based on its properties compared with other approaches has been used to solve this type of differential equations such as the Adomain decomposition method, homotopy perturbation method, homotopy analysis method, and variation iteration method. The advantage of the present method has been illustrated by some examples.
The research problem arose from the researchers’ sense of the importance of Digital Intelligence (DI), as it is a basic requirement to help students engage in the digital world and be disciplined in using technology and digital techniques, as students’ ideas are sufficiently susceptible to influence at this stage in light of modern technology. The research aims to determine the level of DI among university students using Artificial Intelligence (AI) techniques. To verify this, the researchers built a measure of DI. The measure in its final form consisted of (24) items distributed among (8) main skills, and the validity and reliability of the tool were confirmed. It was applied to a sample of 139 male and female students who were chosen
... Show MoreThis research studies the effect of particle packing density on sintering TiO2 microstructure. Sintering experiment was conducted on compacts involving of monodisperse spherical TiO2 particles. The experimental results are modeled using L2-Regression technique in studing the effect of two theoretical values of 55% and 69% of initial packing densities. The mathematical simulation shows that the lower values of density compacts sintered fast to theoretical density and this reflects that particle packing density improved densification rate because of the competing influence of grain growth at higher values of densities.
Anise and thyme crude extract were used to prepare a lotion for topical application due to their antimicrobial, germicidal and antifungal effects. Two formulas were prepared using the mentioned natural plants, formula 2 (selected lotion) was the most acceptable one which contained veegum and xanthan gum as suspending agents in addition to other exceipients providing it good properties with high physical stability because of its flocculating, pouring, resuspending easily with sedimentation volume (F) 0.96. In addition to unchangeable odor and color with expiration date of one year. While the Preliminary clinical study was done using this lotion on 10 patients with infecious viral skin diseases, it was found that this lotion was successful
... Show MoreAbstract:
Objectives: This study aims to (1) find out the association between patients' age, years of getting the disease, and their spiritual coping ability, and (2) investigate the differences in illness perception and spiritual coping ability between gender groups, level of education groups, monthly income groups, residence groups and satisfaction with health services groups.
Methodology
A descriptive correlational design is used in this study. The study sample includes a convenience sample of (158) patients with chronic kidney failure.
The study instrument consists of two parts; the first one focuses on participants’ sociodemographic characteristics, and the second part deals with participants’ spiritual coping by us
Remote surveying of unknown bound geometries, such as the mapping of underground water supplies and tunnels, remains a challenging task. The obstacles and absorption in media make the long-distance telecommunication and localization process inefficient due to mobile sensors’ power limitations. This work develops a new short-range sequential localization approach to reduce the required amount of signal transmission power. The developed algorithm is based on a sequential localization process that can utilize a multitude of randomly distributed wireless sensors while only employing several anchors in the process. Time delay elliptic and frequency range techniques are employed in developing the proposed algebraic closed-form solution.
... Show MoreThe method of operational matrices is based on the Bernoulli and Shifted Legendre polynomials which is used to solve the Falkner-Skan equation. The nonlinear differential equation converting to a system of nonlinear equations is solved using Mathematica®12, and the approximate solutions are obtained. The efficiency of these methods was studied by calculating the maximum error remainder ( ), and it was found that their efficiency increases as increases. Moreover, the obtained approximate solutions are compared with the numerical solution obtained by the fourth-order Runge-Kutta method (RK4), which gives a good agreement.
This paper designed a fault tolerance for soft real time distributed system (FTRTDS). This system is designed to be independently on specific mechanisms and facilities of the underlying real time distributed system. It is designed to be distributed on all the computers in the distributed system and controlled by a central unit.
Besides gathering information about a target program spontaneously, it provides information about the target operating system and the target hardware in order to diagnose the fault before occurring, so it can handle the situation before it comes on. And it provides a distributed system with the reactive capability of reconfiguring and reinitializing after the occurrence of a failure.