The last two decades have seen a marked increase in the illegal activities on the Dark Web. Prompt evolvement and use of sophisticated protocols make it difficult for security agencies to identify and investigate these activities by conventional methods. Moreover, tracing criminals and terrorists poses a great challenge keeping in mind that cybercrimes are no less serious than real life crimes. At the same time, computer security societies and law enforcement pay a great deal of attention on detecting and monitoring illegal sites on the Dark Web. Retrieval of relevant information is not an easy task because of vastness and ever-changing nature of the Dark Web; as a result, web crawlers play a vital role in achieving this task. Thereafter, data mining techniques are applied to extract useful patterns that would help security agencies to limit and get rid of cybercrimes. The aim of this paper is to present a survey for those researchers who are interested in this topic. We started by discussing the internet layers and the properties of the Deep Web, followed by explaining the technical characters of The Onion Routing (TOR) network, and finally describing the approaches of accessing, extracting and processing Dark Web data. Understanding the Dark Web, its properties and its threats is vital for internet servers; we do hope this paper be of help in that goal.
The deployment of UAVs is one of the key challenges in UAV-based communications while using UAVs for IoT applications. In this article, a new scheme for energy efficient data collection with a deadline time for the Internet of things (IoT) using the Unmanned Aerial Vehicles (UAV) is presented. We provided a new data collection method, which was set to collect IoT node data by providing an efficient deployment and mobility of multiple UAV, used to collect data from ground internet of things devices in a given deadline time. In the proposed method, data collection was done with minimum energy consumption of IoTs as well as UAVs. In order to find an optimal solution to this problem, we will first provide a mixed integer linear programming m
... Show MoreSteganography involves concealing information by embedding data within cover media and it can be categorized into two main domains: spatial and frequency. This paper presents two distinct methods. The first is operating in the spatial domain which utilizes the least significant bits (LSBs) to conceal a secret message. The second method is the functioning in the frequency domain which hides the secret message within the LSBs of the middle-frequency band of the discrete cosine transform (DCT) coefficients. These methods enhance obfuscation by utilizing two layers of randomness: random pixel embedding and random bit embedding within each pixel. Unlike other available methods that embed data in sequential order with a fixed amount.
... Show MoreFranck-Condon factors (FCF), which are proportional to peak intensities, were calculated as the square of the overlap between the initial and final state wavefunctions in order to calculate of molecule Be9Cl35 their overlap using numerical Integration for the vibrational band (′v =0 - 4) to (v″=0 –4) of the electronic transition A 2Π - Χ 2 Σ and by using an appropriate Potential for each of them .for vibrational ground and first excited states.this new vibrational level must be instantaneously compatible with the nuclear positions and momenta of the vibrational level of the molecule in the originating electronic state. In the semiclassical picture of vibrations (oscillations) of a simple harmonic oscillator, the necessary condit
... Show MoreThis paper proposes a new methodology for improving network security by introducing an optimised hybrid intrusion detection system (IDS) framework solution as a middle layer between the end devices. It considers the difficulty of updating databases to uncover new threats that plague firewalls and detection systems, in addition to big data challenges. The proposed framework introduces a supervised network IDS based on a deep learning technique of convolutional neural networks (CNN) using the UNSW-NB15 dataset. It implements recursive feature elimination (RFE) with extreme gradient boosting (XGB) to reduce resource and time consumption. Additionally, it reduces bias toward
... Show MoreDie vorliegende Forschung handelt es um die Satzfelder, besonders das Mittelfeld des Satzes im deutschen und Arabischen. Diese Forschung wurde mit der Satzdefinition, Satzglieder begonnen, damit wir diese klar werden und dann werden die Felder des Satzes gut gekannt. Der erste Abschnitt schlieβt auch den Mittelfeld des Satzes und, wie man das Feld erkennen und bestimmen kann. Die Forschung untersucht auch. Ob es in der arabischen Sprache den selben Struktur wie im Deutschen gibt, z.B Bildung des Satzes sowie Satzfelder bezügllich das Mittelfeld.
Der zweite Abschnitt handelt sich um den arabischen Teil und behandelt die Wortarten im Arabischen sowie den Satz als auch Satzarten (Nominal- Verbal- Halbsatz).
Danach befinden
... Show MoreThis research highlights one of the most important issues that have been controversial between Islamic schools, which is the duality of Intellect and Revelation and the nature of their relationship, in two core points:
The first point: Could there be a real conflict between Intellect and revelation? While the school of hadith view that this assumption is a rational assumption that does not real as long as the revelation is correct and the Intellect is clear, and that what is claimed are due to other Intellect s, we find that the Ash’ari school adopts the saying that the real conflict may occur, but rather confirms its occurrence.
The second point: For whom is the priority, for the Intellect or th
... Show MoreIn this work, we present the notion of a multiplier on AT-algebra and investigate several properties. Also, some theorems and examples are discussed. The notions of the kernel and the image of multipliers are defined. After that, some propositions related to isotone and regular multipliers are proved. Finally, the Left and the Right derivations of the multiplier are obtained