Tor (The Onion Routing) network was designed to enable users to browse the Internet anonymously. It is known for its anonymity and privacy security feature against many agents who desire to observe the area of users or chase users’ browsing conventions. This anonymity stems from the encryption and decryption of Tor traffic. That is, the client’s traffic should be subject to encryption and decryption before the sending and receiving process, which leads to delay and even interruption in data flow. The exchange of cryptographic keys between network devices plays a pivotal and critical role in facilitating secure communication and ensuring the integrity of cryptographic procedures. This essential process is time-consuming, which causes delay and discontinuity of data flow. To overcome delay or interruption problems, we utilized the Software-Defined Network (SDN), Machine Learning (ML), and Blockchain (BC) techniques, which support the Tor network to intelligently speed up exchanging the public key via the proactive processing of the Tor network security management information. Consequently, the combination network (ITor-SDN) keeps data flow continuity to a Tor client. We simulated and emulated the proposed network by using Mininet and Shadow simulations. The findings of the performed analysis illustrate that the proposed network architecture enhances the overall performance metrics, showcasing a remarkable advancement of around 55%. This substantial enhancement is achieved through the seamless execution of the innovative ITor-SDN network combination approach.
In this modern Internet era and the transition to IPv6, routing protocols must adjust to assist this transformation. RIPng, EIGRPv6 and OSPFv3 are the dominant IPv6 IGRP (Interior Gateway Routing Protocols). Selecting the best routing protocol among the available is a critical task, which depends upon the network requirement and performance parameters of different real time applications. The primary motivation of this paper is to estimate the performance of these protocols in real time applications. The evaluation is based on a number of criteria including: network convergence duration, Http Page Response Time, DB Query Response Time, IPv6 traffic dropped, video packet delay variation and video packet end to end de
... Show MoreThe study aimed at the following:
Identify the differences in average scores core thinking skills kindergarten children by variable sex (male - female), and by variable age (5.6 - 5.11).
To achieve this researcher adopted a standardized test of core thinking skills for the kindergarten children, which was built and standardization by the researcher Meyada Asaad Mussa 2012 . applied test on a sample of (814) ) boys and girls who were randomly chosen form, from directorates of Baghdad Education Adoption of the proportional distribution.
... Show More
The constructed building in the urban area is subject to wind characteristics due to the influence of surrounding buildings. The residential complexes currently being built in Iraq represent a case study for the subject of this research. Therefore, the objective of this study is to identify the interference effect because of adjacent buildings effects on the mid-rise building. The speed and pressure of the wind have been numerically simulated as well as wind load has been simulated by using a virtual wind tunnel which is available in Autodesk Robot Structural Analysis, RSA, software. Two identical adjacent buildings have been simulated and many coefficients were included in this study such as the spacing, directionality,
... Show MoreThe Zubair reservoir in the Abu-Amood field is considered a shaly sand reservoir in the south of Iraq. The geological model is created for identifying the facies, distributing the petrophysical properties and estimating the volume of hydrocarbon in place. When the data processing by Interactive Petrophysics (IP) software is completed and estimated the permeability reservoir by using the hydraulic unit method then, three main steps are applied to build the geological model, begins with creating a structural, facies and property models. five zones the reservoirs were divided (three reservoir units and two cap rocks) depending on the variation of petrophysical properties (porosity and permeability) that results from IP software interpr
... Show MoreThe main objective of present work is to describe the feasibility of friction stir welding (FSW) for
joining of low carbon steel with dimensions (3 mm X 80 mm X 150 mm). A matrix (3×3) of welding
parameters (welding speed and tool rotational speed) was used to see influence of each parameter on
properties of welded joint .Series of (FSW) experiments were conducted using CNC milling machine
utilizing the wide range of rotational speed and transverse speed of the machine. Effect of welding
parameters on mechanical properties of weld joints were investigated using different mechanical tests
including (tensile and microhardness tests ). Micro structural change during (FSW) process was
studied and different welding zones
MCM-48 zeolites have unique properties from the surfaces and structure point of view as it’s shown in the results ,and unique and very sensitive to be prepared, have been experimentally prepared and utilized as a second-generation/ acid - catalyst for esterification reactions of oleic acid as a model oil for a free fatty acid source with Ethanol. The characterization of the catalyst used in the reaction has been identified by various methods indicating the prepared MCM-48 is highly matching the profile of common commercial MCM-48 zeolite. The XRF results show domination of SiO2 on the chemical structure with 99.1% and agreeable with the expected from MCM-48 for it's of silica-based, and the SEM results show the cubic c
... Show MoreDBN Rashid, Asian Quarterly: An International Journal of Contemporary Issue, 2018
The researcher highlighted in his research on an important subject that people need, which is the excuse of ignorance in Islamic law. , As the flag of light and ignorance of darkness. Then the researcher lameness of the reasons for research in this subject as it is one of the assets that should be practiced by the ruler and the judge and the mufti and the diligent and jurisprudent, but the public should identify the issues that ignore ignorance and issues that are not excused even if claimed ignorance.
Then the researcher concluded the most important results, and recommendations that he wanted to set scientific rules for students of science and Muslims in general, to follow the issues of legitimacy and learn its provisions and i