As smartphones incorporate location data, there is a growing concern about location privacy as smartphone technologies advance. Using a remote server, the mobile applications are able to capture the current location coordinates at any time and store them. The client awards authorization to an outsider. The outsider can gain admittance to area information on the worker by JSON Web Token (JWT). Protection is giving cover to clients, access control, and secure information stockpiling. Encryption guarantees the security of the location area on the remote server using the Rivest Shamir Adleman (RSA) algorithm. This paper introduced two utilizations of cell phones (tokens, and location). The principal application can give area information by means of the geographic position method of these gadgets. Every cell phone can create a token. The token holds secret keys got from versatile fixed identifiers for the most part of the Social Security Number (SSN) for each SIM (Endorser Personality Module) Chronic Number) and IMEI (Global Portable Hardware Character) by RSA calculation. The token is going through the short and informative administration of Short Message Service (SMS) from the client to the outsider. Information is scrambled before being stored on a faraway worker. The actual worker can't comprehend the area’s information. The third-party cannot follow the area if the client utilizes distinctive mystery keys. The client’s data and area information are saved by the various workers. The proposed application offers a mysterious sharing instrument that uses token verification to grant clients access to scrambled area data and provides encryption data in a remote server with an authentication token, achieving mutual authentication on each mobile device and user concealment.
The implementation of technology in the provision of public services and communication to citizens, which is commonly referred to as e-government, has brought multitude of benefits, including enhanced efficiency, accessibility, and transparency. Nevertheless, this approach also presents particular security concerns, such as cyber threats, data breaches, and access control. One technology that can aid in mitigating the effects of security vulnerabilities within e-government is permissioned blockchain. This work examines the performance of the hyperledger fabric private blockchain under high transaction loads by analyzing two scenarios that involve six organizations as case studies. Several parameters, such as transaction send ra
... Show MoreCloud computing (CC) is a fast-growing technology that offers computers, networking, and storage services that can be accessed and used over the internet. Cloud services save users money because they are pay-per-use, and they save time because they are on-demand and elastic, a unique aspect of cloud computing. However, several security issues must be addressed before users store data in the cloud. Because the user will have no direct control over the data that has been outsourced to the cloud, particularly personal and sensitive data (health, finance, military, etc.), and will not know where the data is stored, the user must ensure that the cloud stores and maintains the outsourced data appropriately. The study's primary goals are to mak
... Show MoreEach Arab Islamic city is distinguished by its distinctive characteristics dictated by the nature of its location and its characteristics, as we see it mountainous in the mountains, deserts in the deserts, and coastal in the coasts, and this is reflected in the models of its buildings and designs and even in its structure. However, this uniqueness did not stand in the way of the emergence of characteristics and common characteristics of these cities over time, the factors derived from the core of the life of the community habits and traditions and beliefs and living requirements and environmental conditions that all piled in the process of building and construction of the Arab Islamic city to draw The features and lines of life of the co
... Show MoreGeneral companies are one of the methods that help managing general economic services. Countries have taken a step into this type of management because of the criticism-related to the different styles of managements. Criticism have been directed specifically at the direct type of management to such general economic services. Most of the Iraqi economic general services are being ran by this type of style; general type.
What has been agreed upon, whether in France, Egypt or Iraq has been that such establishments of general companies have to take place either by legislating a special order that states constructing a general company by the legislator or according to the law by authorizing law by the legislator to one of the local per
... Show MoreThe importance of this research came through the question: Are there a privacy in the design in the ceramic arts, what are they? What are the basis of design for the ceramic art sculptures?The study refers to the design privacy in the contemporary ceramic arts, not as a serviceable art, but the art of being a dialectic collecting the arts across the craft and compositionThis research is the first study to look at the privacy of design and the connection with the formation of the large sizes ceramic art sculptures, and what they have as privacy of design and the way of formations.To highlight on the most prominent technical problems facing the ceramist in the production of so sculptural worksThe need for the study comes to help the worker
... Show MoreIn this work (paper), we investigate about the robustness of the modified divergence Information Criterion (MDIC), which proposed by Mantalos, Mattheou and Karagrigoriou (2008), to determine the probability of the Criterion picking up the true lag for Autoregressive process, when the error term of this process is normally and Non normally distributed. We obtained the results for different sample sizes by using simulation.
Recently, the increasing demand to transfer data through the Internet has pushed the Internet infrastructure to the nal edge of the ability of these networks. This high demand causes a deciency of rapid response to emergencies and disasters to control or reduce the devastating effects of these disasters. As one of the main cornerstones to address the data trafc forwarding issue, the Internet networks need to impose the highest priority on the special networks: Security, Health, and Emergency (SHE) data trafc. These networks work in closed and private domains to serve a group of users for specic tasks. Our novel proposed network ow priority management based on ML and SDN fullls high control to give the required ow priority to SHE dat
... Show MoreIn this paper we describe several different training algorithms for feed forward neural networks(FFNN). In all of these algorithms we use the gradient of the performance function, energy function, to determine how to adjust the weights such that the performance function is minimized, where the back propagation algorithm has been used to increase the speed of training. The above algorithms have a variety of different computation and thus different type of form of search direction and storage requirements, however non of the above algorithms has a global properties which suited to all problems.
In this paper, we introduce three robust fuzzy estimators of a location parameter based on Buckley’s approach, in the presence of outliers. These estimates were compared using the variance of fuzzy numbers criterion, all these estimates were best of Buckley’s estimate. of these, the fuzzy median was the best in the case of small and medium sample size, and in large sample size, the fuzzy trimmed mean was the best.