User confidentiality protection is concerning a topic in control and monitoring spaces. In image, user's faces security in concerning with compound information, abused situations, participation on global transmission media and real-world experiences are extremely significant. For minifying the counting needs for vast size of image info and for minifying the size of time needful for the image to be address computationally. consequently, partial encryption user-face is picked. This study focuses on a large technique that is designed to encrypt the user's face slightly. Primarily, dlib is utilizing for user-face detection. Susan is one of the top edge detectors with valuable localization characteristics marked edges, is used to extract features vectors from user faces. Moreover, the relevance of the suggested generating key is led to a crucial role in security improvement by producing them as difficult to intruders. According to PSNR values, the recommended encryption algorithms provided an adequate outcome in the encryption, they had a lower encrypting duration and a larger encrypting impact.
This paper presents the design and analysis of composite right left hand (CRLH) electromagnetic bandgap (EBG) structure. The proposed unit cell is consistent of a dielectric substrate with dimensions of 5×5×1 mm 3 made of FR4-Epoxy with εr = 4.4 underneath of a conductive patch with dimensions of 4.4×4.4mm 2 . The unit cell is structured to perform a negative permittivity (ε) and negative permeability (µ) in different bands. The proposed unit cell is developed to 5G systems in the sub-6GHz bands. In this work, a complete analysis of the unit cell in terms of Sparameters, constitutive parameters and refraction index are evaluated using HFSS simulation package based on Finite Element Method (FEM).
The unpredictable and huge data generation nowadays by smart computing devices like (Sensors, Actuators, Wi-Fi routers), to handle and maintain their computational processing power in real time environment by centralized cloud platform is difficult because of its limitations, issues and challenges, to overcome these, Cisco introduced the Fog computing paradigm as an alternative for cloud-based computing. This recent IT trend is taking the computing experience to the next level. It is an extended and advantageous extension of the centralized cloud computing technology. In this article, we tried to highlight the various issues that currently cloud computing is facing. Here
... Show MoreLet R be a commutative ring with non-zero identity element. For two fixed positive integers m and n. A right R-module M is called fully (m,n) -stable relative to ideal A of , if for each n-generated submodule of Mm and R-homomorphism . In this paper we give some characterization theorems and properties of fully (m,n) -stable modules relative to an ideal A of . which generalize the results of fully stable modules relative to an ideal A of R.
Coronavirus: (COVID-19) is a recently discovered viral disease caused by a new strain of coronavirus.
The majority of patients with corona-virus infections will have a mild-moderate respiratory disease that recovers without special care. Most often, the elderly, and others with chronic medical conditions such as asthma, coronary disease, respiratory illness, and malignancy are seriously ill.
COVID-19 is spread mostly by salivary droplets or nasal secretions when an infected person coughs or sneezes.
COVID-19 causes severe acute respiratory illness (SARS-COV-2). The first incidence was recorded in Wuhan, China, in 2019. Since then it spreads leading to a pandemic.
... Show MoreExpansive soils are recognized by their swelling potential upon wetting due to the existence of some clay minerals such as montmorillonite. An effective solution was found to avoid the danger of such soils by using piles. A single pile embedded in an elasto-plastic expansive soil has been analyzed by using one of the available software which is ABAQUS to investigate the effect of applied loads on pile’s top and investigate the effect of swelling soils on load carrying capacity of the pile. The result shows that as the pile is axially loaded at its top, the axial force along the pile gradually changes from (tension) to (compression) and the pile tends to move downward. The applied load needed to initiate pile’s settlement depend
... Show MoreIn this paper, the effect of wear in the fluid film journal bearings on the dynamic behavior of rotor bearing system has been studied depending on the analytical driven of dynamic stiffness and damping coefficients of worn journal bearing. The finite element method was used to modeling rotor bearing system. The unbalance response, critical speed and natural frequency of rotor bearing system have been studied to determine the changes in these parameters due to wear. MATLAB software was used to find the analytical values of dynamic coefficients of journal bearing. The results of rotor mounted on fluid film journal bearings showed that the wear in journal bearing increases the amplitude of unbalance response and decrease critical speed, sta
... Show MoreThe aim of this study is to shed light on the importance of biofuels as an alternative to conventional energy, in addition to the importance of preserving agricultural crops, which are the main source of this fuel, to maintain food security, especially in developing countries. The increase in global oil prices, in addition to the fear of global warming, are among the main factors that draw the world’s attention to searching for alternative sources of traditional energy, which are sustainable on the one hand, and on the other hand reduce carbon emissions. Therefore, the volume of global investment in renewable energy in general, and in liquid biofuels and biomass in particular, has increased. Global fears emerged that the excessive convers
... Show MoreText categorization refers to the process of grouping text or documents into classes or categories according to their content. Text categorization process consists of three phases which are: preprocessing, feature extraction and classification. In comparison to the English language, just few studies have been done to categorize and classify the Arabic language. For a variety of applications, such as text classification and clustering, Arabic text representation is a difficult task because Arabic language is noted for its richness, diversity, and complicated morphology. This paper presents a comprehensive analysis and a comparison for researchers in the last five years based on the dataset, year, algorithms and the accuracy th
... Show MoreInterest in belowground plant growth is increasing, especially in relation to arguments that shallow‐rooted cultivars are efficient at exploiting soil phosphorus while deep‐rooted ones will access water at depth. However, methods for assessing roots in large numbers of plants are diverse and direct comparisons of methods are rare. Three methods for measuring root growth traits were evaluated for utility in discriminating rice cultivars: soil‐filled rhizotrons, hydroponics and soil‐filled pots whose bottom was sealed with a non‐woven fabric (a potential method for assessing root penetration ability). A set of 38 rice genotypes including the Oryza