This paper proposed a new method for network self-fault management (NSFM) based on two technologies: intelligent agent to automate fault management tasks, and Windows Management Instrumentations (WMI) to identify the fault faster when resources are independent (different type of devices). The proposed network self-fault management reduced the load of network traffic by reducing the request and response between the server and client, which achieves less downtime for each node in state of fault occurring in the client. The performance of the proposed system is measured by three measures: efficiency, availability, and reliability. A high efficiency average is obtained depending on the faults occurred in the system which reaches to 92.19%, availability 92.375%, and reliability 100%. The proposed system managed five devices. The NSFM implemented using Java and C# languages.
The objective of this work is to design and implement a cryptography system that enables the sender to send message through any channel (even if this channel is insecure) and the receiver to decrypt the received message without allowing any intruder to break the system and extracting the secret information. This work modernize the feedforward neural network, so the secret message will be encrypted by unsupervised neural network method to get the cipher text that can be decrypted using the same network to get the original text. The security of any cipher system depends on the security of the related keys (that are used by the encryption and the decryption processes) and their corresponding lengths. In this work, the key is the final weights
... Show MoreThe process of self-assessment plays a key role in achieving quality educational institutions (college, department or program academic particular), because the assessment process provides reviews of the effectiveness of the criteria used in the enterprise, especially in the field of teaching and learning, and is result self-assessment providing self-assessment report. The self- assessment can be performed at different levels (college, academic department, Master, Ph.D. program, or courses). The importance of the research focused on to provide a measure of self-assessment helps profile officials in the implementation of the assessment process are clear and precise and fast, and to provide them to measure the availability requireme
... Show MoreThis Study Aimed to Recognize the Self-Efficacy Level Among Musically Talented Students the sample of this study consisted of (85) Musically smart students male and female students in Irbid governorate, of the analytical descriptive method ، and the Self-Efficacy scale were used, and the results indicated the following:
-The Self-Efficacy level among Musically smart students was high.
-There are no statistically significant differences (α ≥ 0.05)due to the impact of gender in a the total degree .
-There are no statistically significant differences (α=0.05) due to the impact of stage in a the total degree.
The aims of the research is to know the role of strategic to manage the human resources in enhancement the process of knowledge management in the Ministry of Transportation , In addition to the effects occurred on outcomes for both the managers and practitioners .
For the purpose of achieving the objectives of the research , the researchers designed a questionnaire that included (40 Points for collecting the primary data from the sample of the research which contained (51) indiviluals. In light of that, the data was to collect and analyzed and hypotheses were tested by using the (SPSS) Program, and a number of statistical techniques was used to attain the goal of the research such as the means , Sta
... Show MoreThe primary objective of root canal therapy is adequate biomechanical preparation of root canal system followed by 3D obturation.in clinics we are encountered with several anatomical variations, which we need to manage efficiently. One of the major factors responsible for failure of root canal therapy is missed canals. Recent technological advances have given the clinician opportunity to identify anatomical variations and treat them to satisfaction.
This study includes synthesis of some nitrogenous heterocyclic compounds linked to amino acid esters or heterocyclic amines that may have a potential activity as antimicrobial and/or cytotoxic. Quinolines are an important group of organic compounds that possess useful biological activity as antibacterial, antifungal and antitumor .8-Hydroxyquinoline (8-HQ) and numerous of its derivatives exhibit potent activities against fungi and bacteria which make them good candidates for the treatment of many parasitic and microbial infection diseases.
These pharmacological properties of quinolones aroused our interest in synthesizing several new compounds featuring heterocyclic rings of the quinoline derivatives linke
... Show MoreBiometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses.
... Show MoreChaotic systems have been proved to be useful and effective for cryptography. Through this work, a new Feistel cipher depend upon chaos systems and Feistel network structure with dynamic secret key size according to the message size have been proposed. Compared with the classical traditional ciphers like Feistel-based structure ciphers, Data Encryption Standards (DES), is the common example of Feistel-based ciphers, the process of confusion and diffusion, will contains the dynamical permutation choice boxes, dynamical substitution choice boxes, which will be generated once and hence, considered static,
While using chaotic maps, in the suggested system, called
This paper presents the design of a longitudinal controller for an autonomous unmanned aerial vehicle (UAV). This paper proposed the dual loop (inner-outer loop) control based on the intelligent algorithm. The inner feedback loop controller is a Linear Quadratic Regulator (LQR) to provide robust (adaptive) stability. In contrast, the outer loop controller is based on Fuzzy-PID (Proportional, Integral, and Derivative) algorithm to provide reference signal tracking. The proposed dual controller is to control the position (altitude) and velocity (airspeed) of an aircraft. An adaptive Unscented Kalman Filter (AUKF) is employed to track the reference signal and is decreased the Gaussian noise. The mathematical model of aircraft
... Show MoreTo achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DN
... Show More