The objective of this work is to design and implement a cryptography system that enables the sender to send message through any channel (even if this channel is insecure) and the receiver to decrypt the received message without allowing any intruder to break the system and extracting the secret information. This work modernize the feedforward neural network, so the secret message will be encrypted by unsupervised neural network method to get the cipher text that can be decrypted using the same network to get the original text. The security of any cipher system depends on the security of the related keys (that are used by the encryption and the decryption processes) and their corresponding lengths. In this work, the key is the final weights that are obtained from the learning process within the neural network stage, So the work can be represented as an update or development for using the neural network to enhance the security of text. As a result for a powerful design, the resulted cipher system provides a high degree of security which satisfies the data confidentially which is the main goal of the most cryptography systems.
The theme of love has been and still is the interest of authors and writers for it is closely related to people’s lives. That great passion has helped them express genuine thoughts pertinent to that theme that has given rise to many debates, some are vague and others controversial. In his (strait is the gate), (La Porte étroite), André Gide has sought to shed light on his characters perspective of love and its relationship with sacredness and divine happiness. Indeed these characters have found often themselves restrained, chained and exhausted, by tough religious commands that have imposed on them spiritual commitments and duties too hard to break.
André Gide has revealed a protestant deviation from the perfection theme tha
... Show MoreAbstract
The aim of the research to define the concept of moral intelligence and its dimensions and its relationship to some personal characteristics with the internal auditors and identify the importance of the employment of moral intelligence dimensions of (empathy, conscience, self- control, respect, kindness, tolerance, fairness) in the internal audit and the extent of support for the performance of the internal audit process in light of these dimensions. And that by answering the following question : Is there a role for moral intelligence of internal auditors in support the performance of internal audit process ? How are employ these dimensions i
... Show MorePurpose: The diagnosis and determine the level of balance between the time available for life and work with the doctors in the hospitals of t the six hospitals in the City of Medicine.
Design / methodology / Approach: It has been relying on ready-scale, to make sure the diagnosis and determine the level of balance between the time available for life and work, where they were distributed on Form 42 doctors in the six hospitals in the City of Medicine, were analyzed by software (Nvivo and SPSS v.22).
Results: The results showed that there is a good level of balance between the time available for life and work with the doctors.
Research limitations: The diffi
... Show MoreKnowledge represents the foundation stone for the work of all organizations, are working who leads the thinking of individuals is the ability that leads to behavior based on rationality, it is the work that creates value to the organization and thus gain access to performance winning where that knowledge is a new type of capital based on the thought and experience and is the so-called intellectual capital, which is renewable and is constantly evolving. The study sought to explain the role of the climax knowledge in achieving the highest levels of performance Organizational and then access to the performance winning in educational organizations the study sample, was found to be a co
... Show MoreThe study aims to examine the reality of preparing the Arabic language teacher for non-native speakers by presenting the experience of the Arabic Language Institute at the International University of Africa. Thus, it addresses the following questions: How is it possible to invest the long scientific experiences in proposal and experiment preperations to qualify Arabic language teachers for non-native speakers? What is the reality of preparing an Arabic language teacher at the Institute? How did the Arabic Language Institute process teacher preparation? What are the problems facing the preparation of the Arabic language teachers and the most important training mechanisms used in that Institute?What problems faced the implementation of the
... Show MoreThe preparation of composite metal oxide to attain high efficiency in removing phenol from wastewater has a great concern. In the present study, the focus would be on adopting antimony-tin oxide coating onto graphite substrates instead of titanium; besides the effect of SbCl3 concentration on the SnO2-Sb2O3 composite would be examined. The performance of this composite electrode as the working electrode in the removal of phenol by sonoelectrochemical oxidation will be studied. The antimony-tin dioxide composite electrode was prepared by cathodic deposition with SnCl2 . 2H2O solution in a mixture of HNO3 and NaNO3, with different concentrations of SbCl3. The SnO2-Sb2O3 deposit layer’s structure and morphology were examined and the 4 g/l Sb
... Show MoreThis study aims to study some morphological and reproductional characteristics in eleven species of two genera belonging to the family of Asparagaceae, which are Bellevalia Lapeyrouse, 1808 and Ornithogalum Linnaeus, 1753 and the species are: Bellevalia chrisii Yildirim and Sahin, 2014; Bellevalia flexuosa Boissier, 1854; Bellevalia kurdistanica Feinbrun, 1940; Bellevalia longipes Post, 1895; Bellevalia macrobotrys Boissier, 1853; Bellevalia paradoxa Boissier, 1882; Bellevalia parva Wendelbo, 1973; Bellevalia saviczii Woronow, 1927; Ornithogalum brachystachys C. Koch, 1849; Ornithogalum neurostegium Boissier, 1882 and Ornithogalum pyrenaicum Linnaeus, 1753. These species were identified and compared with each other; the results showed th
... Show MoreIn this paper, we discuss physical layer security techniques in downlink networks, including eavesdroppers. The main objective of using physical layer security is delivering a perfectly secure message from a transmitter to an intended receiver in the presence of passive or active eavesdroppers who are trying to wiretap the information or disturb the network stability. In downlink networks, based on the random feature of channels to terminals, opportunistic user scheduling can be exploited as an additional tool for enhancing physical layer security. We introduce user scheduling strategies and discuss the corresponding performances according to different levels of channel state information (CSI) at the base station (BS). We show that the avai
... Show More