Tor (The Onion Routing) network was designed to enable users to browse the Internet anonymously. It is known for its anonymity and privacy security feature against many agents who desire to observe the area of users or chase users’ browsing conventions. This anonymity stems from the encryption and decryption of Tor traffic. That is, the client’s traffic should be subject to encryption and decryption before the sending and receiving process, which leads to delay and even interruption in data flow. The exchange of cryptographic keys between network devices plays a pivotal and critical role in facilitating secure communication and ensuring the integrity of cryptographic procedures. This essential process is time-consuming, which causes delay and discontinuity of data flow. To overcome delay or interruption problems, we utilized the Software-Defined Network (SDN), Machine Learning (ML), and Blockchain (BC) techniques, which support the Tor network to intelligently speed up exchanging the public key via the proactive processing of the Tor network security management information. Consequently, the combination network (ITor-SDN) keeps data flow continuity to a Tor client. We simulated and emulated the proposed network by using Mininet and Shadow simulations. The findings of the performed analysis illustrate that the proposed network architecture enhances the overall performance metrics, showcasing a remarkable advancement of around 55%. This substantial enhancement is achieved through the seamless execution of the innovative ITor-SDN network combination approach.
Non-additive measures and corresponding integrals originally have been introduced by Choquet in 1953 (1) and independently defined by Sugeno in 1974 (2) in order to extend the classical measure by replacing the additivity property to non-additive property. An important feature of non –additive measures and fuzzy integrals is that they can represent the importance of individual information sources and interactions among them. There are many applications of non-additive measures and fuzzy integrals such as image processing, multi-criteria decision making, information fusion, classification, and pattern recognition. This paper presents a mathematical model for discussing an application of non-additive measures and corresp
... Show MoreBackground: Plants used in folk medicine for
the treatment of peptic ulcer diseases is a very
promising approach to overcome the limitations of
classical medicines.
Aim: To explore the efficacy of medicinal
plants, namely turmeric, garlic and marshmallow,
in eradication of H. pylori.
Methods: This prospective study was carried out
on 225 of well-known dyspeptic patients who were
divided into four groups; a control group (received
classical medical therapy) and three other groups
that received one of the three medicinal plants,
plus the same therapy used in the control group.
The follow up was done by using a questionnaire
form, endoscopic examination, and determination
of serum levels of anti
Topic management is the awareness of how speakers deal with initiating, developing, changing, and ending a topic and how they fix the relationship when a misunderstanding occurs. It is such an important unit of conversation as it includes the transition from one strategy to the other to be accomplished in a systematic and orderly manner. These strategies are impaired in dementia patients thus lead to communication breakdown. This study aims at detecting the dementia patients' topic management strategies in selected speeches and answering the questions of which of these strategies are fully or partially detected in these speeches. The researchers use a qualitative method to examine the speeches of those patients and they adopt an eclectic
... Show MoreThe unpredictable and huge data generation nowadays by smart computing devices like (Sensors, Actuators, Wi-Fi routers), to handle and maintain their computational processing power in real time environment by centralized cloud platform is difficult because of its limitations, issues and challenges, to overcome these, Cisco introduced the Fog computing paradigm as an alternative for cloud-based computing. This recent IT trend is taking the computing experience to the next level. It is an extended and advantageous extension of the centralized cloud computing technology. In this article, we tried to highlight the various issues that currently cloud computing is facing. Here
... Show MoreThe research aims to identify the role determined by the dimensions of marketing in the relationship represented by (trust in the relationship, commitment to the relationship, communication during the relationship) in how to contribute to the success of the industrial project management in Iraq as a case study in the General Directorate of Industrial Development. Their number is (50) workers, where the research problem centered on knowing the impact and importance of relationship marketing on the success of industrial project management. The descriptive analytical approach. Using SPSS and Amos, the researcher tested and analysed hypotheses about the relationship and the influence between the research variables through a questionnaire . Test
... Show MoreThe world is witnessing a remarkable development in the use of technology, which has made it an essential means of investment, especially in the field of management, which provided many of the facilities experienced by the institutions, including improving revenues, shortening time and saving labor. Islamic investment technology as a successful means of management and we touched on the Zakat Foundation as an application model.
This study evaluates 22 patients with retained foreign bodies in the maxillofacial region that were all caused by penetrating missile injuries. Surgical intervention for the retrieval of the foreign bodies was carried out in 20 patients through the existing wounds and through separate incisions; all patients were followed up for a minimum of 2 months during which all the complications were registered and managed. Preoperative imaging is a prerequisite for the accurate localization of the foreign body and the subsequent successful removal of it. All patients developed complications that were categorized in this study into those that result from the injury itself and those that occur because of the retrieval procedure, the latter category bei
... Show MoreBackground: Trauma to the anterior teeth is a common injury in young children. Themaxillary incisors being the most affected. Although root fractures are rare, theydo occur and were previously and often considered hopeless and were extracted.The time between the injury and the initiation of treatment, level of the fractureline, and stage of root development are some criteria to be considered whenchoosing a treatment approach for a complicated tooth fracture. This case reportdescribes the management of a traumatized immature maxillary central incisorwith Elise class IV fracture with vertical oblique subgingival fracture of the root.Materials and method: Apexification was carried out using biodentine followed byremoval of the fracture
... Show More