As s widely use of exchanging private information in various communication applications, the issue to secure it became top urgent. In this research, a new approach to encrypt text message based on genetic algorithm operators has been proposed. The proposed approach follows a new algorithm of generating 8 bit chromosome to encrypt plain text after selecting randomly crossover point. The resulted child code is flipped by one bit using mutation operation. Two simulations are conducted to evaluate the performance of the proposed approach including execution time of encryption/decryption and throughput computations. Simulations results prove the robustness of the proposed approach to produce better performance for all evaluation metrics with respect to the conventional encryption techniques like RSA, DES, etc.
Recently, all over the world mechanism of cloud computing is widely acceptable and used by most of the enterprise businesses in order increase their productivity. However there are still some concerns about the security provided by the cloud environment are raises. Thus in this our research project, we are discussing over the cloud computing paradigm evolvement for the large business applications like CRM as well as introducing the new framework for the secure cloud computing using the method of IT auditing. In this case our approach is basically directed towards the establishment of the cloud computing framework for the CRM applications with the use of checklists by following the data flow of the CRM application and its lifecycle. Those ch
... Show MoreSliding Mode Controller (SMC) is a simple method and powerful technique to design a robust controller for nonlinear systems. It is an effective tool with acceptable performance. The major drawback is a classical Sliding Mode controller suffers from the chattering phenomenon which causes undesirable zigzag motion along the sliding surface. To overcome the snag of this classical approach, many methods were proposed and implemented. In this work, a Fuzzy controller was added to classical Sliding Mode controller in order to reduce the impact chattering problem. The new structure is called Sliding Mode Fuzzy controller (SMFC) which will also improve the properties and performance of the classical Sliding Mode control
... Show MoreObiovisly that the holy thresholds are directly related to Islam and Muslims and related to the general culture of the Islamic peoples. In terms of architecture, it is considered a distinctive architectural scene that reviews the history of this origin and its architectural styles. Recently, with the increase in the number of pilgrims and visitors to the holy shrines, there is a need to develop and expand the buildings and provide them with services and introduce modern technology. The building of the holy thresholds consists of a number of functional design indicators: The general problem of research is that there is no clear theoretical framework for the design indicators for the development of the holy shrines according to the functio
... Show MoreThis paper presents on the design of L-Band Multiwavelength laser for Hybrid Time Division Multiplexing/ Wavelength Division Multiplexing (TDM/WDM) Passive Optical Network (PON) application. In this design, an L-band Mulltiwavelength Laser is designed as the downstream signals for TDM/WDM PON. The downstream signals ranging from 1569.865 nm to 1581.973 nm with 100GHz spacing. The multiwavelength laser is designed using OptiSystem software and it is integrated into a TDM/WDM PON that is also designed using OptiSystem simulation software. By adapting multiwavelength fiber laser into a TDM/WDM network, a simple and low-cost downstream signal is proposed. From the simulation design, it is found that the proposed design is suitable to be used
... Show MoreWith the rapid development of smart devices, people's lives have become easier, especially for visually disabled or special-needs people. The new achievements in the fields of machine learning and deep learning let people identify and recognise the surrounding environment. In this study, the efficiency and high performance of deep learning architecture are used to build an image classification system in both indoor and outdoor environments. The proposed methodology starts with collecting two datasets (indoor and outdoor) from different separate datasets. In the second step, the collected dataset is split into training, validation, and test sets. The pre-trained GoogleNet and MobileNet-V2 models are trained using the indoor and outdoor se
... Show MoreThe research aimed to identify the causal relationship between forgiveness and psychological hardness for university students, by answering the following questions: Does forgiveness cause psychological hardiness? Does psychological hardiness cause forgiveness? Is the relationship between the two variables a reciprocal relationship? The research sample consisted of (300) male and female students from the universities of Baghdad and Al-Mustansiriya University. To extract the psychometric properties of the two scales: forgiveness and psychological hardiness, a sample of (50) male and female students employed to repeat the test, making the six connections between the two research variables. To determine the causal relationship, The Pearson c
... Show MoreIn this research, the use of natural materials like wool and cannabis as intermediate reinforcement for prosthetic limbs due to their comfort, affordability, and local availability was discussed. As part of this study on below-the-knee (BK) prosthetic sockets, two sets of samples were made using a vacuum method. These sets were made of natural fiber-reinforced polymer composites with lamination 80:20: group (Y) had 4 perlon, 1 wool 4 perlon, and group (G) had 4 perlon, 1 cannabis 4 perlon. The two groups were compared with a socket made of polypropylene. Tensile testing was used to determine the mechanical characteristics of the socket materials. The Y group has a yield stress of 17 MPs, an ultimate strength of 18.75 MPa, and an elastic
... Show MoreEichhornia, or water hyacinth represents a serious threat to potable water basins. This problem is materialized majorly in consuming large amounts of water and dissolved Oxygen that is necessary for aquatic life, and minorly in hindering water streams. Even there are limited trials to overcome such pests, none of them presents an acceptable solution economically and logically. Chlorine is a well-known biocide and broadly used in water industry. It could give a possible method to fight such weed. To investigate that, concentration-time plot should be introduced similar to any other microorganisms; especially, bacteria in water. In this work, various doses of Chlorine along various time
The deployment of UAVs is one of the key challenges in UAV-based communications while using UAVs for IoT applications. In this article, a new scheme for energy efficient data collection with a deadline time for the Internet of things (IoT) using the Unmanned Aerial Vehicles (UAV) is presented. We provided a new data collection method, which was set to collect IoT node data by providing an efficient deployment and mobility of multiple UAV, used to collect data from ground internet of things devices in a given deadline time. In the proposed method, data collection was done with minimum energy consumption of IoTs as well as UAVs. In order to find an optimal solution to this problem, we will first provide a mixed integer linear programming m
... Show More