Tor (The Onion Routing) network was designed to enable users to browse the Internet anonymously. It is known for its anonymity and privacy security feature against many agents who desire to observe the area of users or chase users’ browsing conventions. This anonymity stems from the encryption and decryption of Tor traffic. That is, the client’s traffic should be subject to encryption and decryption before the sending and receiving process, which leads to delay and even interruption in data flow. The exchange of cryptographic keys between network devices plays a pivotal and critical role in facilitating secure communication and ensuring the integrity of cryptographic procedures. This essential process is time-consuming, which causes del
... Show MoreObjective This research investigates Breast Cancer real data for Iraqi women, these data are acquired manually from several Iraqi Hospitals of early detection for Breast Cancer. Data mining techniques are used to discover the hidden knowledge, unexpected patterns, and new rules from the dataset, which implies a large number of attributes. Methods Data mining techniques manipulate the redundant or simply irrelevant attributes to discover interesting patterns. However, the dataset is processed via Weka (The Waikato Environment for Knowledge Analysis) platform. The OneR technique is used as a machine learning classifier to evaluate the attribute worthy according to the class value. Results The evaluation is performed using
... Show MoreInformation systems and data exchange between government institutions are growing rapidly around the world, and with it, the threats to information within government departments are growing. In recent years, research into the development and construction of secure information systems in government institutions seems to be very effective. Based on information system principles, this study proposes a model for providing and evaluating security for all of the departments of government institutions. The requirements of any information system begin with the organization's surroundings and objectives. Most prior techniques did not take into account the organizational component on which the information system runs, despite the relevance of
... Show MoreCloud computing provides huge amount of area for storage of the data, but with an increase of number of users and size of their data, cloud storage environment faces earnest problem such as saving storage space, managing this large data, security and privacy of data. To save space in cloud storage one of the important methods is data deduplication, it is one of the compression technique that allows only one copy of the data to be saved and eliminate the extra copies. To offer security and privacy of the sensitive data while supporting the deduplication, In this work attacks that exploit the hybrid cloud deduplication have been identified, allowing an attacker to gain access to the files of other users based on very small hash signatures of
... Show MoreThe transmitting and receiving of data consume the most resources in Wireless Sensor Networks (WSNs). The energy supplied by the battery is the most important resource impacting WSN's lifespan in the sensor node. Therefore, because sensor nodes run from their limited battery, energy-saving is necessary. Data aggregation can be defined as a procedure applied for the elimination of redundant transmissions, and it provides fused information to the base stations, which in turn improves the energy effectiveness and increases the lifespan of energy-constrained WSNs. In this paper, a Perceptually Important Points Based Data Aggregation (PIP-DA) method for Wireless Sensor Networks is suggested to reduce redundant data before sending them to the
... Show MoreIn this study, two types of mixes were adopted by using two grading of coarse aggregate. The practical side of this study was to produce no-fine aggregate concrete by using crushed clay brick aggregates. The durability of the produced concrete and internal sulfate attack was studied. For durability assessment, it is found that the no-fine concrete made with crushed brick aggregate lost about (15-25) % of its compressive strength after being subjected to 60 cycles of wetting and drying with age 120 days. The curing condition showed that the water curing improved the compressive strength with a rate higher than that when sealed or air dry curing were used. The crushed brick no-fine concrete de
... Show MoreAccurate and simple techniques for measurement of fluid rheological properties are important for field operations in the oil industry. Marsh Funnels are popular qualitycontrol tools used in the field for drilling fluids and they offer a simple, practical alternative to viscosity measurement. In the normal measurements, a single point (drainage time) is used to determine an average viscosity; little additional information is extracted regarding the non-Newtonian behavior of the fluid. Here, a new model is developed and used to determine the rheological properties of drilling muds and other non-Newtonian fluids using data of fluid density and drainage time collected from a Marsh Funnel as a function of viscosity. The funnel results for viscos
... Show MoreAccurate and simple techniques for measurement of fluid rheological properties are important for field operations in the oil industry. Marsh Funnels are popular quality-control tools used in the field for drilling fluids and they offer a simple, practical alternative to viscosity measurement. In the normal measurements, a single point (drainage time) is used to determine an average viscosity; little additional information is extracted regarding the non-Newtonian behavior of the fluid.
Here, a new model is developed and used to determine the rheological properties of drilling muds and other non-Newtonian fluids using data of fluid density and drainage time collected from a Marsh Funnel as a function of viscosity. The funnel results for
The research aims to indicate the relationship between lean production tools included seven {constant improvement , and Just in time (JIT), and the production smoothing , and quality at the source, and standardized work, Visual management, and activities 5S } and Mass Customization strategy for the model (Pine & Gilomer, 1997) {collaborative, adaptive, cosmetic, transparent}, as well as providing a conceptual framework and applied for variables search to clarify how they will choose a Mass Customization strategy through the lean production tools, , and recognize the reality of the practices of Iraqi industries in such a field. Moreover, aims to highlight the positive aspects that accrue to companies a
... Show More