The objective of this work is to design and implement a cryptography system that enables the sender to send message through any channel (even if this channel is insecure) and the receiver to decrypt the received message without allowing any intruder to break the system and extracting the secret information. This work modernize the feedforward neural network, so the secret message will be encrypted by unsupervised neural network method to get the cipher text that can be decrypted using the same network to get the original text. The security of any cipher system depends on the security of the related keys (that are used by the encryption and the decryption processes) and their corresponding lengths. In this work, the key is the final weights that are obtained from the learning process within the neural network stage, So the work can be represented as an update or development for using the neural network to enhance the security of text. As a result for a powerful design, the resulted cipher system provides a high degree of security which satisfies the data confidentially which is the main goal of the most cryptography systems.
Data security is an important component of data communication and transmission systems. Its main role is to keep sensitive information safe and integrated from the sender to the receiver. The proposed system aims to secure text messages through two security principles encryption and steganography. The system produced a novel method for encryption using graph theory properties; it formed a graph from a password to generate an encryption key as a weight matrix of that graph and invested the Least Significant Bit (LSB) method for hiding the encrypted message in a colored image within a green component. Practical experiments of (perceptibility, capacity, and robustness) were calculated using similarity measures like PSNR, MSE, and
... Show MoreIn this paper we investigate the automatic recognition of emotion in text. We propose a new method for emotion recognition based on the PPM (PPM is short for Prediction by Partial Matching) character-based text compression scheme in order to recognize Ekman’s six basic emotions (Anger, Disgust, Fear, Happiness, Sadness, Surprise). Experimental results with three datasets show that the new method is very effective when compared with traditional word-based text classification methods. We have also found that our method works best if the sizes of text in all classes used for training are similar, and that performance significantly improves with increased data.
The paper proposes a methodology for predicting packet flow at the data plane in smart SDN based on the intelligent controller of spike neural networks(SNN). This methodology is applied to predict the subsequent step of the packet flow, consequently reducing the overcrowding that might happen. The centralized controller acts as a reactive controller for managing the clustering head process in the Software Defined Network data layer in the proposed model. The simulation results show the capability of Spike Neural Network controller in SDN control layer to improve the (QoS) in the whole network in terms of minimizing the packet loss ratio and increased the buffer utilization ratio.
Buzurgan oil field suffers from the phenomenon of asphaltene precipitation. The serious negatives of this phenomenon are the decrease in production caused by clogging of the pores and decrease in permeability and wettability of the reservoir rocks, in addition to the blockages that occur in the pipeline transporting crude oil. The presence of laboratories in the Iraqi oil companies helped to conduct the necessary experiments, such as gas chromatography (GC) test to identify the components of crude oil and the percentages of each component, These laboratory results consider the main elements in deriving a new equation called modified colloidal instability index (MCII) equation based on a well-known global equation called colloidal in
... Show MoreBuzurgan oil field suffers from the phenomenon of asphaltene precipitation. The serious negatives of this phenomenon are the decrease in production caused by clogging of the pores and decrease in permeability and wettability of the reservoir rocks, in addition to the blockages that occur in the pipeline transporting crude oil. The presence of laboratories in the Iraqi oil companies helped to conduct the necessary experiments, such as gas chromatography (GC) test to identify the components of crude oil and the percentages of each component, These laboratory results consider the main elements in deriving a new equation called modified colloidal instability index (MCII) equation based on a well-known global equation called colloidal instabi
... Show MoreMultiplesclerosis(MS)isachronic,inflammatory,immune-mediateddiseaseof the central nervous system (CNS). More than 2 million people worldwidehave MS. The goal of the present study was to compare Iraqi patients' treat-ment satisfaction with three different disease-modifying therapies (DMTs),administeredorally,subcutaneously,andbyslowinfusion;namely,fin-golimod, interferon beta-1b (IFNβ-1b), and natalizumab, respectively. Aswell as to assess the individual differences among these therapies about theireffectiveness, convenience and global satisfaction also to assess the role ofcertain predictors on treatment satisfaction. Patient satisfaction with medi-cation assessed by the Treatment Satisfaction Questi
... Show MoreWith the continuous progress of image retrieval technology, the speed of searching for the required image from a large amount of image data has become an important issue. Convolutional neural networks (CNNs) have been used in image retrieval. However, many image retrieval systems based on CNNs have poor ability to express image features. Content-based Image Retrieval (CBIR) is a method of finding desired images from image databases. However, CBIR suffers from lower accuracy in retrieving images from large-scale image databases. In this paper, the proposed system is an improvement of the convolutional neural network for greater accuracy and a machine learning tool that can be used for automatic image retrieval. It includes two phases
... Show More