Tor (The Onion Routing) network was designed to enable users to browse the Internet anonymously. It is known for its anonymity and privacy security feature against many agents who desire to observe the area of users or chase users’ browsing conventions. This anonymity stems from the encryption and decryption of Tor traffic. That is, the client’s traffic should be subject to encryption and decryption before the sending and receiving process, which leads to delay and even interruption in data flow. The exchange of cryptographic keys between network devices plays a pivotal and critical role in facilitating secure communication and ensuring the integrity of cryptographic procedures. This essential process is time-consuming, which causes delay and discontinuity of data flow. To overcome delay or interruption problems, we utilized the Software-Defined Network (SDN), Machine Learning (ML), and Blockchain (BC) techniques, which support the Tor network to intelligently speed up exchanging the public key via the proactive processing of the Tor network security management information. Consequently, the combination network (ITor-SDN) keeps data flow continuity to a Tor client. We simulated and emulated the proposed network by using Mininet and Shadow simulations. The findings of the performed analysis illustrate that the proposed network architecture enhances the overall performance metrics, showcasing a remarkable advancement of around 55%. This substantial enhancement is achieved through the seamless execution of the innovative ITor-SDN network combination approach.
The necessities of steganography methods for hiding secret message into images have been ascend. Thereby, this study is to generate a practical steganography procedure to hide text into image. This operation allows the user to provide the system with both text and cover image, and to find a resulting image that comprises the hidden text inside. The suggested technique is to hide a text inside the header formats of a digital image. Least Significant Bit (LSB) method to hide the message or text, in order to keep the features and characteristics of the original image are used. A new method is applied via using the whole image (header formats) to hide the image. From the experimental results, suggested technique that gives a higher embe
... Show MoreThe aim of this paper is to introduce the concepts of asymptotically p-contractive and asymptotically severe accretive mappings. Also, we give an iterative methods (two step-three step) for finite family of asymptotically p-contractive and asymptotically severe accretive mappings to solve types of equations.
This article reviews a decade of research in transforming smartphones into smart measurement tools for science and engineering laboratories. High-precision sensors have been effectively utilized with specific mobile applications to measure physical parameters. Linear, rotational, and vibrational motions can be tracked and studied using built-in accelerometers, magnetometers, gyroscopes, proximity sensors, or ambient light sensors, depending on each experiment design. Water and sound waves were respectively captured for analysis by smartphone cameras and microphones. Various optics experiments were successfully demonstrated by replacing traditional lux meters with built-in ambient light sensors. These smartphone-based measurement
... Show MoreLacing reinforcement plays a critical role in the design and performance of reinforced concrete (RC) slabs by distributing the applied loads more evenly across the slab, ensuring that no specific area of the slab is overloaded. In this study, nine slabs, divided into three groups according to the investigated parameters, were meticulously designed and evaluated to study the interplay between the lacing reinforcement and other key parameters. Each slab was crafted for simple support and was subjected to both static and repeated two-point load tests. The lacing reinforcement had an angle of 45° with various tension and lacing steel. The repeated-tested specimens with lacing reinforcement experienced smaller ductility than those of s
... Show MoreShatt Al-Hilla was considered one of the important branches of Euphrates River that supplies irrigation water to millions of dunams of planted areas. It is important to control the velocity and water level along the river to maintain the required level for easily diverting water to the branches located along the river. So, in this research, a numerical model was developed to simulate the gradually varied unsteady flow in Shatt AL-Hilla. The present study aims to solve the continuity and momentum (Saint-Venant) equations numerically to predict the hydraulic characteristics in the river using Galerkin finite element method. A computer program was designed and built using the programming language FORTRAN-77. Fifty kilometers was consid
... Show MoreThe spectrum of clinical efficacy of Methotrexate (MTX) is broad in that MTX is used in the treatment of certain cancers, severe psoriasis and rheumatoid arthritis.Various mechanisms by which cancer cells grown in tissue culture become resistant to anticancer drugs. The use of multiple drugs with different mechanisms of entry into cells and different cellular targets allows for effective chemotherapy and high cure rates. In an efforts to develop effective strategies that increase the therapeutic potential of anticancer drugs with less systemic toxicity ,are being directed towards the investigation of dietary supplements and other phytotherapeutic agents for their synergistic efficacy in combination with anticancer drugs. A promi
... Show More