The last two decades have seen a marked increase in the illegal activities on the Dark Web. Prompt evolvement and use of sophisticated protocols make it difficult for security agencies to identify and investigate these activities by conventional methods. Moreover, tracing criminals and terrorists poses a great challenge keeping in mind that cybercrimes are no less serious than real life crimes. At the same time, computer security societies and law enforcement pay a great deal of attention on detecting and monitoring illegal sites on the Dark Web. Retrieval of relevant information is not an easy task because of vastness and ever-changing nature of the Dark Web; as a result, web crawlers play a vital role in achieving this task. Thereafter, data mining techniques are applied to extract useful patterns that would help security agencies to limit and get rid of cybercrimes. The aim of this paper is to present a survey for those researchers who are interested in this topic. We started by discussing the internet layers and the properties of the Deep Web, followed by explaining the technical characters of The Onion Routing (TOR) network, and finally describing the approaches of accessing, extracting and processing Dark Web data. Understanding the Dark Web, its properties and its threats is vital for internet servers; we do hope this paper be of help in that goal.
In the process of translating Qur’anic texts, there is an urgent need for interpretations of the Qur’anic text due to the presence of many incomprehensible Qur’anic verses or words because of our distance from the standard Arabic, language in which the Holy Qur’an was revealed, and the introduction of the foreign words into our language, in addition to the fact that many Qur’anic words are no longer used. All this prompted the need for the interpretation of the Qur'anic text, Therefore, it is necessary for the translator to resort to the books of interpretation if he intends to translate the Qur’an
The rate of electron transfer from N3 sensitized by dye to TiO2 semiconductor in variety solvent have been calculated as a function of reorientation energy effective free energy , volume of semiconductor , attenuation and lattice constant of semiconductor . A very strong dependence of the electron transfer rate constant on the reorientation and effective free energy .Results of calculation indicate that TiO2 is available to use with N3 dye .Our calculation results show that a good agreement with experimental result
A theoretical model is developed to determine time evolution of temperature at the surface of an opaque target placed in air for cases characterized by the formation of laser supported absorption waves (LSAW) plasmas. The model takes into account the power temporal variation throughout an incident laser pulse, (i.e. pulse shape, or simply: pulse profile).
Three proposed profiles are employed and results are compared with the square pulse approximation of a constant power.
In this paper three techniques for image compression are implemented. The proposed techniques consist of three dimension (3-D) two level discrete wavelet transform (DWT), 3-D two level discrete multi-wavelet transform (DMWT) and 3-D two level hybrid (wavelet-multiwavelet transform) technique. Daubechies and Haar are used in discrete wavelet transform and Critically Sampled preprocessing is used in discrete multi-wavelet transform. The aim is to maintain to increase the compression ratio (CR) with respect to increase the level of the transformation in case of 3-D transformation, so, the compression ratio is measured for each level. To get a good compression, the image data properties, were measured, such as, image entropy (He), percent r
... Show MoreIn this paper three techniques for image compression are implemented. The proposed techniques consist of three dimension (3-D) two level discrete wavelet transform (DWT), 3-D two level discrete multi-wavelet transform (DMWT) and 3-D two level hybrid (wavelet-multiwavelet transform) technique. Daubechies and Haar are used in discrete wavelet transform and Critically Sampled preprocessing is used in discrete multi-wavelet transform. The aim is to maintain to increase the compression ratio (CR) with respect to increase the level of the transformation in case of 3-D transformation, so, the compression ratio is measured for each level. To get a good compression, the image data properties, were measured, such as, image entropy (He), percent root-
... Show MoreIn the mist of developments in the course of scientific research in general and humanities in particular and the accompanying changes in the visions and policies inspired by the need for these sciences to follow the qualitative methods in dealing with many of the topics or problems that require for their solution to obtain qualitative information which can be provided by resorting to quantitative research. Therefore, a new trend has emerged in many public relations› researchers who believe that qualitative research methods should be used by establishing scientific foundations and methodological classification based on the use of these methods and determining the nature of the subjects applied in them to reach results that are character
... Show MoreThe study sheds lights on the simple verbal formulas with its particular time suffixes as found in the Turgut Özakman’s play These Crazy Turks.
The introduction of the study sheds light on the life of the author and playwright, as well as traces the different types of the verbal formulas in Turkish language.
Oh Those Young is one of the most significant products of the Turkish literature of the young and Children where the literary messages of the playwright are addressed in a simple comic sarcastic style. Hence, the play, that has been studied and acted by many students and academics, drives its importance from this particular course of action.
... Show MoreIn this paper, we introduce and study the notion of the maximal ideal graph of a commutative ring with identity. Let R be a commutative ring with identity. The maximal ideal graph of R, denoted by MG(R), is the undirected graph with vertex set, the set of non-trivial ideals of R, where two vertices I1 and I2 are adjacent if I1 I2 and I1+I2 is a maximal ideal of R. We explore some of the properties and characterizations of the graph.
Is a day or series of days celebrated by Jews for religious or worldly important event in Jewish history as an occasion in Hebrew is called Eid יום טוב good day or good or חג תענית celebrate the festival or celebration. Most of the Jewish holidays are of a religious nature, and there is a worldly character with festivals such as the Festival of Lights חג החנוכה the holiday of Purim and the holidays, although a religious appearance, but she celebration in mundane aspects of the history and traditions of the Jewish occasions. Mass over the holidays when Jews are those mentioned in the Bible in my Leviticus and Deuteronomy. And some holidays established by rabbis in the vicinity of the anc
... Show MoreThe use of economic resources enjoyed Iraq by especially oil resources, which constitute the main source of financial revenue, would the economic surplus outside the oil sector increases by mobilizing and rallying the labor power and turn it into an access capitalism, , was the cause of "the inaction of the productive sectors of the economy, made the investment planning process and even investment in human capital was not rationality with the increasing number of unemployed, particularly certificates and specializations high campaign, direction of the government towards market liberalism after 2003 through the, was focused not follow a clear economic policies, and the absence of planning, and the absence
... Show More