Nowadays, a very widespread of smartphones, especially Android smartphones, is observed. This is due to presence of many companies that produce Android based phones and provide them to consumers at reasonable prices with good specifications. The actual benefit of smartphones lies in creating communication between people through the exchange of messages, photos, videos, or other types of files. Usually, this communication is through the existence of an access point through which smartphones can connect to the Internet. However, the availability of the Internet is not guaranteed in all places and at all times, such as in crowded places, remote areas, natural disasters, or interruption of the Internet connection for any reason. To create a communication between devices, it is resorted to creating an ad hoc network using Device-to-Device technology. Wi-Fi Direct technology offers a suitable platform for creating an ad hoc network, as it supports the speed and range of standard Wi-Fi. In this paper, a mechanism is proposed to build an infrastructure-less ad hoc network, through developing the Wi-Fi direct protocol for Android smartphones. This network provides users ability to have a reliable communication, using the reliable Transmission Control Protocol only, and can continuously expand. Therefore it would be very beneficial in the absence of other infrastructure communication media such as cellular or Wi-Fi internet access.
In this paper, a new modification was proposed to enhance the security level in the Blowfish algorithm by increasing the difficulty of cracking the original message which will lead to be safe against unauthorized attack. This algorithm is a symmetric variable-length key, 64-bit block cipher and it is implemented using gray scale images of different sizes. Instead of using a single key in cipher operation, another key (KEY2) of one byte length was used in the proposed algorithm which has taken place in the Feistel function in the first round both in encryption and decryption processes. In addition, the proposed modified Blowfish algorithm uses five Sboxes instead of four; the additional key (KEY2) is selected randomly from additional Sbox
... Show MoreCurrently, the prominence of automatic multi document summarization task belongs to the information rapid increasing on the Internet. Automatic document summarization technology is progressing and may offer a solution to the problem of information overload.
Automatic text summarization system has the challenge of producing a high quality summary. In this study, the design of generic text summarization model based on sentence extraction has been redirected into a more semantic measure reflecting individually the two significant objectives: content coverage and diversity when generating summaries from multiple documents as an explicit optimization model. The proposed two models have been then coupled and def
... Show MoreMost recent studies have focused on using modern intelligent techniques spatially, such as those
developed in the Intruder Detection Module (IDS). Such techniques have been built based on modern
artificial intelligence-based modules. Those modules act like a human brain. Thus, they should have had the
ability to learn and recognize what they had learned. The importance of developing such systems came after
the requests of customers and establishments to preserve their properties and avoid intruders’ damage. This
would be provided by an intelligent module that ensures the correct alarm. Thus, an interior visual intruder
detection module depending on Multi-Connect Architecture Associative Memory (MCA)
Fluoroscopic images are a field of medical images that depends on the quality of image for correct diagnosis; the main trouble is the de-nosing and how to keep the poise between degradation of noisy image, from one side, and edge and fine details preservation, from the other side, especially when fluoroscopic images contain black and white type noise with high density. The previous filters could usually handle low/medium black and white type noise densities, that expense edge, =fine details preservation and fail with high density of noise that corrupts the images. Therefore, this paper proposed a new Multi-Line algorithm that deals with high-corrupted image with high density of black and white type noise. The experiments achieved i
... Show MoreIn this work, we introduce a new generalization of both Rationally extending and Goldie extending which is Goldie Rationally extending module which is known as follows: if for any submodule K of an R-module M there is a direct summand U of M (denoted by U⊆_⊕ M) such that K β_r U. A β_r is a relation of K⊆M and U⊆M, which defined as K β_r U if and only if K ⋂U⊆_r K and K⋂U⊆_r U.
The -s-extending modules will be purpose of this paper, a module M is -s-extending if each submodule in M is essential in submodule has a supplement that is direct summand. Initially, we give relation between this concept with weakly supplement extending modules and -supplemented modules. In fact, we gives the following implications:
Lifting modules -supplemented modules -s-extending modules weakly supplement extending modules.
It is also we give examples show that, the converse of this result is not true. Moreover, we study when the converse of this result is true.
Since 1980s, the study of the extending module in the module theory has been a major area of research interest in the ring theory and it has been studied recently by several authors, among them N.V. Dung, D.V. Huyn, P.F. Smith and R. Wisbauer. Because the act theory signifies a generalization of the module theory, the author studied in 2017 the class of extending acts which are referred to as a generalization of quasi-injective acts. The importance of the extending acts motivated us to study a dual of this concept, named the coextending act. An S-act MS is referred to as coextending act if every coclosed subact of Ms is a retract of MS where a subact AS of MS is said to be coclosed in MS if whenever the Rees factor â„ is small in th
... Show MoreAn -module is extending if every submodule of is essential in a direct summand of . Following Clark, an -module is purely extending if every submodule of is essential in a pure submodule of . It is clear purely extending is generalization of extending modules. Following Birkenmeier and Tercan, an -module is Goldie extending if, for each submodule of , there is a direct summand D of such that . In this paper, we introduce and study class of modules which are proper generalization of both the purely extending modules and -extending modules. We call an -module is purely Goldie extending if, for each , there is a pure submodule P of such that . Many c
... Show MoreIn this work, We introduce the concepts of an FP-Extending, FP-Continuous and FP-Quasi-Continuous which are stronger than P-Extending, P-Continuous and P-Quasi-Continuous. characterizations and properties of FP-Extending, FP-Continuous and FP-Quasi-Continuous are obtained . A module M is called FP-Extending ( FP-Continuous, FP-Quasi-Continuous) if every submodule is P-Extending (P-Continuous, P-Quasi-Continuous) .