Tor (The Onion Routing) network was designed to enable users to browse the Internet anonymously. It is known for its anonymity and privacy security feature against many agents who desire to observe the area of users or chase users’ browsing conventions. This anonymity stems from the encryption and decryption of Tor traffic. That is, the client’s traffic should be subject to encryption and decryption before the sending and receiving process, which leads to delay and even interruption in data flow. The exchange of cryptographic keys between network devices plays a pivotal and critical role in facilitating secure communication and ensuring the integrity of cryptographic procedures. This essential process is time-consuming, which causes delay and discontinuity of data flow. To overcome delay or interruption problems, we utilized the Software-Defined Network (SDN), Machine Learning (ML), and Blockchain (BC) techniques, which support the Tor network to intelligently speed up exchanging the public key via the proactive processing of the Tor network security management information. Consequently, the combination network (ITor-SDN) keeps data flow continuity to a Tor client. We simulated and emulated the proposed network by using Mininet and Shadow simulations. The findings of the performed analysis illustrate that the proposed network architecture enhances the overall performance metrics, showcasing a remarkable advancement of around 55%. This substantial enhancement is achieved through the seamless execution of the innovative ITor-SDN network combination approach.
In this work, the precursor [2-(1,5-dimethyl-3-oxo-2-phenyl-2,3-dihydro-1H-pyrazol-4-ylimino)acetic acid] was synthesised from 4-aminoantipyrine and glyoxylic acid, this precursor has been used in the synthesis of new multidentate ligand [2-((E)-3-(2-hydroxyphenylimino)-1,5-dimethyl-2-phenyl-2,3-dihydro-1H-pyrazol-4-ylimino)acetic acid][H2L] type (N2O2). The ligand was refluxed in ethanol with metal ions [VO(II), Mn(II), Co(II) and Ni(II)] salts to give complexes of general molecular formula:[M(H2L)2(X)(Y)].B, where: M=VO(II), X=0, Y=OSO3-2, B=2H2O; M=Mn(II),Co(II) ,X=Cl, Y=Cl, B=0; M=Ni(II), X=H2O, Y=Cl, B=Cl. These complexes were characterised by atomic absorpition(A.A), F.T-I.R., (U.V-Vis)spectroscopies (1H,13C NMR for ligand only), alon
... Show MoreThe research seeks to identify the contemporary events that face the use of electronic payment methods to localize the salaries of state employees and its impact in enhancing the mental image of customers, and to achieve this purpose from the fact that a questionnaire was designed and distributed to an optional sample of (31) individual customers (employees) dealing With the researched private banks, it has been analyzed and reached a number of conclusions and recommendations, the most prominent of which is the lack of modernity of electronic payment methods by customers, which is reflected in the mental image of customers and the achievement of their satisfaction, in the Emiratization project for salaries needs an advanced leade
... Show MoreThis research is concerned with documenting and chronicling the art of NFTs art in the Saudi artistic cultural scene, the importance of which stems from the lack of scientific sources that document this field until the preparation of this research and aims to trace historically the emergence of the field of NFTs art in the Kingdom of Saudi Arabia in the arts sector through the experiences of Saudi artists. The most prominent events for the culture, arts and technology sector, and other Saudi sectors. The research dealt with the history of the emergence of the field of NFTs art, which extends from the history of digital arts, and reviewed the most famous works of NFTs art.
As a result of the technical revolution and the artistic move
Moderately, advanced national election technologies have improved political systems. As electronic voting (e-voting) systems advance, security threats like impersonation, ballot tampering, and result manipulation increase. These challenges are addressed through a review covering biometric authentication, watermarking, and blockchain technologies, each of which plays a crucial role in improving the security of e-voting systems. More precisely, the biometric authentication is being examined due to its ability in identify the voters and reducing the risks of impersonation. The study also explores the blockchain technology to decentralize the elections, enhance the transparency and ensure the prevention of any unauthorized alteration or
... Show MoreThe present study discusses the significant role of the historical memory in all the Spanish society aspects of life. When a novelist takes the role and puts on the mask of one of the novel’s protagonists or hidden characters, his memory of the events becomes the keywords of accessing the close-knit fabric of society and sheds lights on deteriorating social conceptions in a backwards social reality that rejects all new progressive ideas and modernity. Through concentrating on the society flawing aspects and employing everything of his stored memory, the author uses sarcasm to criticize and change such old deteriorating reality conceptions.
&nbs
... Show MoreRecently, the theory of Complex Networks gives a modern insight into a variety of applications in our life. Complex Networks are used to form complex phenomena into graph-based models that include nodes and edges connecting them. This representation can be analyzed by using network metrics such as node degree, clustering coefficient, path length, closeness, betweenness, density, and diameter, to mention a few. The topology of the complex interconnections of power grids is considered one of the challenges that can be faced in terms of understanding and analyzing them. Therefore, some countries use Complex Networks concepts to model their power grid networks. In this work, the Iraqi Power Grid network (IPG) has been modeled, visua
... Show MoreThe growth of developments in machine learning, the image processing methods along with availability of the medical imaging data are taking a big increase in the utilization of machine learning strategies in the medical area. The utilization of neural networks, mainly, in recent days, the convolutional neural networks (CNN), have powerful descriptors for computer added diagnosis systems. Even so, there are several issues when work with medical images in which many of medical images possess a low-quality noise-to-signal (NSR) ratio compared to scenes obtained with a digital camera, that generally qualified a confusingly low spatial resolution and tends to make the contrast between different tissues of body are very low and it difficult to co
... Show MoreObjective: To know the impact of social networks on the mental health of adolescents in the city of Diwaniyah.
Methodology: A descriptive cross-sectional study was conducted on adolescents in preparatory schools in ALDiwaniyah
City Center, for the period from Jun 26, 2015 through to October 20, 2015. The schools were
selected from using Probability sampling (240 random samples) six schools were selected from 32 schools (20 %
from total number) the schools were chosen by writing the names of all schools on a pieces of paper and put in
bags. Then, selected six schools random, three boys schools (2 preparatory and 1 secondary) three girls schools
(2 preparatory and 1 secondary), then I chose the sample the students in grad