Directional Compact Geographic Forwarding (DCGF) routing protocol promises a minimal overhead generation by utilizing a smart antenna and Quality of Service (QoS) aware aggregation. However, DCGF was tested only in the attack-free scenario without involving the security elements. Therefore, an investigation was conducted to examine the routing protocol algorithm whether it is secure against attack-based networks in the presence of Denial-of-Service (DoS) attack. This analysis on DoS attack was carried out using a single optimal attacker, A1, to investigate the impact of DoS attack on DCGF in a communication link. The study showed that DCGF does not perform efficiently in terms of packet delivery ratio and energy consumption even on a single attacker.
Powder extracts hot water from local ground beef and studied inhibitory effectiveness of powder and extracts to the concentration of the aqueous extract hot Gulf students
I dealt with this study of one of the hadiths of the Prophet and judged him after studying his deed, especially one of his narrations for the similarity in his name and the name of his father (Abdul Rahman bin Ishaq) Is he a civil "Sadok" or Wasti "weak" and they are in one layer which is called in the science of Hadith (agreed And after a review of Kutkut translations and wound and amendment and other evidence and evidence that it was "weak" and not as he went to him and asserted by the updated Muhammad Nasser al-Din al-Albani may God have mercy on him that in Sindh is a civil rule for the hadeeth "Hassan" and not as said The hadeeth is “weak” because he showed that it is the weak Wasti.
I ask God to be successful in this work an
This article investigates how an appropriate chaotic map (Logistic, Tent, Henon, Sine...) should be selected taking into consideration its advantages and disadvantages in regard to a picture encipherment. Does the selection of an appropriate map depend on the image properties? The proposed system shows relevant properties of the image influence in the evaluation process of the selected chaotic map. The first chapter discusses the main principles of chaos theory, its applicability to image encryption including various sorts of chaotic maps and their math. Also this research explores the factors that determine security and efficiency of such a map. Hence the approach presents practical standpoint to the extent that certain chaos maps will bec
... Show MoreIn the last decade, the web has rapidly become an attractive platform, and an indispensable part of our lives. Unfortunately, as our dependency on the web increases so programmers focus more on functionality and appearance than security, has resulted in the interest of attackers in exploiting serious security problems that target web applications and web-based information systems e.g. through an SQL injection attack. SQL injection in simple terms, is the process of passing SQL code into interactive web applications that employ database services such applications accept user input such as form and then include this input in database requests, typically SQL statements in a way that was not intende
... Show MoreThe recent emergence of sophisticated Large Language Models (LLMs) such as GPT-4, Bard, and Bing has revolutionized the domain of scientific inquiry, particularly in the realm of large pre-trained vision-language models. This pivotal transformation is driving new frontiers in various fields, including image processing and digital media verification. In the heart of this evolution, our research focuses on the rapidly growing area of image authenticity verification, a field gaining immense relevance in the digital era. The study is specifically geared towards addressing the emerging challenge of distinguishing between authentic images and deep fakes – a task that has become critically important in a world increasingly reliant on digital med
... Show MoreElectronic Health Record (EHR) systems are used as an efficient and effective method of exchanging patients’ health information with doctors and other key stakeholders in the health sector to obtain improved patient treatment decisions and diagnoses. As a result, questions regarding the security of sensitive user data are highlighted. To encourage people to move their sensitive health records to cloud networks, a secure authentication and access control mechanism that protects users’ data should be established. Furthermore, authentication and access control schemes are essential in the protection of health data, as numerous responsibilities exist to ensure security and privacy in a network. So, the main goal of our s
... Show MoreThe Elliptic Curve Cryptography (ECC) algorithm meets the requirements for multimedia encryption since the encipher operation of the ECC algorithm is applied at points only and that offer significant computational advantages. The encoding/decoding operations for converting the text message into points on the curve and vice versa are not always considered a simple process. In this paper, a new mapping method has been investigated for converting the text message into a point on the curve or point to a text message in an efficient and secure manner; it depends on the repeated values in coordinate to establish a lookup table for encoding/ decoding operations. The proposed method for mapping process is&
... Show More... Show MoreThe present paper deals with medical terms translation and its relationship with the medical text of Arabic and Spanish. Medical translation is the process of transferring texts related to the field of health and medicine to achieve an accurate effective translation from the source language text to the equivalent target language text. The most prominent medical translations are from English to Arabic as most of the syllabuses in Arab countries are taught in English.
Translation is an innovative work intended to render the original text in the source language into the target language with the highest level of linguistic and intellec
Background: Obesity typically results from a variety of causes and factors which contribute, genetics included, and style of living choices, and described as excessive body fat accumulation of body fat lead to excessive body, is a chronic disorder that combines pathogenic environmental and genetic factors. So, the current study objective was to investigate the of the FTO gene rs9939609 polymorphism and the obesity risk. Explaining the relationship between fat mass and obesity-associated gene (FTO) rs9939609 polymorphism and obesity in adults. Methods: Identify research exploring the association between the obesity risk and the variation polymorphisms of FTO gene rs9939609. We combined the modified odds ratios (OR) as total groups and subgro
... Show MoreThe aim of this work is the synthesis of new Schiff base derived from PVA and Erythro-ascorbic acid derivative (pentulosono-ɣ-lactone-2,3-enedianisoate) and its metal complexes of biological significance. All synthesized compounds were characterized by Thin layer chromatography (TLC) and FTIR spectra and aldehyde was also characterized by (U.V-Vis), 1HNMR, 13CNMR and mass spectra. The synthesized Schiff base & its metal complexes were screened for their in vitro antimicrobial activity against five pathogenic bacteria (Escherichia coli, Shigella dysentery,Klebsiellapneumonae,Staphylococcusaureus, Staphylococcus Albus) and two fungal (Aspergillus Niger,Yeast).The biological activity ofall complexes is higher than free Schiff base ligand andf
... Show More