Blogging is about more than just putting thoughts on a web; it's about connecting with and hearing from anyone who read the work. Many web sites now days help to get a free account to quick post thoughts and photos interact with people, and more. The fastest way to understand blogging is to try it out, but in that case securing the blog is important, by including authentication schemes. In this paper we suggest implications of our research for improving the design and usefulness of blogging systems, and also we divided the blogs depending on the subject and need, which are either to be used in public or only used by small group, so we can suggest different steps for securing the blogs.
The objective of this work is to design and implement a cryptography system that enables the sender to send message through any channel (even if this channel is insecure) and the receiver to decrypt the received message without allowing any intruder to break the system and extracting the secret information. This work modernize the feedforward neural network, so the secret message will be encrypted by unsupervised neural network method to get the cipher text that can be decrypted using the same network to get the original text. The security of any cipher system depends on the security of the related keys (that are used by the encryption and the decryption processes) and their corresponding lengths. In this work, the key is the final weights
... Show More
There is no doubt that the achievement of the manuscripts of There is no doubt various of situations for performing a duty , The diversity of stimuli in humans with sensory, unconscious and instinct sensitive systems. Which leads to a diversity of feelings, sensations, emotions and feelings, This therefore requires different types of function linguistic structures indication , Of that linguistic potential that God willing to be unique, In the function of discharging and venting those feelings and emotions that are raised by its various stimuli, which are only needs and psychological and biological purposes require verification and access and gain it. S
... Show MoreThe preparation of the phenanthridine derivative compound was achieved by adopting an efficient one-pot synthetic approach. The condensation of an ethanolic mixture of benzaldehyde, cyclohexanone and ammonium acetate in a 2:1:1 mole ratio resulted in the formation of the title compound. Analytical and spectroscopic techniques were used to confirm the nature of the new compound. A mechanism for the formation of the phenanthridine moiety that is based on three steps has been suggested
The purpose of this paper is to model and forecast the white oil during the period (2012-2019) using volatility GARCH-class. After showing that squared returns of white oil have a significant long memory in the volatility, the return series based on fractional GARCH models are estimated and forecasted for the mean and volatility by quasi maximum likelihood QML as a traditional method. While the competition includes machine learning approaches using Support Vector Regression (SVR). Results showed that the best appropriate model among many other models to forecast the volatility, depending on the lowest value of Akaike information criterion and Schwartz information criterion, also the parameters must be significant. In addition, the residuals
... Show MoreSnS has been widely used in photoelectric devices due to its special band gap of 1.2-1.5 eV. Here, we reported on the fabrication of SnS nanosheets and the effect of synthesis condition together with heat treatment on its physical properties. The obtained band gap of the SnS nanosheets is in the rage of 1.37-1.41 eV. It was found that the photo-current density of a thin film comprised of SnS nanosheets could be enhanced significantly by annealing treatment. The maximum photo-current density of the stack structure of FTO/SnS/CdS/Pt was high as 389.5 mu A cm(-2), rendering its potential application in high efficiency solar hydrogen production.
Introduction: Carrier-based gutta-percha is an effective method of root canal obturation creating a 3-dimensional filling; however, retrieval of the plastic carrier is relatively difficult, particularly with smaller sizes. The purpose of this study was to develop composite carriers consisting of polyethylene (PE), hydroxyapatite (HA), and strontium oxide (SrO) for carrier-based root canal obturation. Methods: Composite fibers of HA, PE, and SrO were fabricated in the shape of a carrier for delivering gutta-percha (GP) using a melt-extrusion process. The fibers were characterized using infrared spectroscopy and the thermal properties determined using differential scanning calorimetry. The elastic modulus and tensile strength tests were dete
... Show MoreThe rapid change in economic is a serious challenge facing all countries around the world, even developed ones. This challenge is increasing as the world enters the age of knowledge in which different knowledge and technologies have emerged and the distance between the emergence of scientific knowledge and its actual application on the ground has been reduced as well as the growing role of science and technology in community development. One of the most important technology amongst these technologies is nanotechnology, where this technology plays a major role in the development of products and modern devices and reduces cost with quality improvement. This technology is cross-cultural, requires a comprehensive knowledge structure and depe
... Show MoreABSTRICT:
This study is concerned with the estimation of constant and time-varying parameters in non-linear ordinary differential equations, which do not have analytical solutions. The estimation is done in a multi-stage method where constant and time-varying parameters are estimated in a straight sequential way from several stages. In the first stage, the model of the differential equations is converted to a regression model that includes the state variables with their derivatives and then the estimation of the state variables and their derivatives in a penalized splines method and compensating the estimations in the regression model. In the second stage, the pseudo- least squares method was used to es
... Show More