Preferred Language
Articles
/
uRcw8I0BVTCNdQwCSylL
ITor-SDN: Intelligent Tor Networks-Based SDN for Data Forwarding Management
...Show More Authors

Tor (The Onion Routing) network was designed to enable users to browse the Internet anonymously. It is known for its anonymity and privacy security feature against many agents who desire to observe the area of users or chase users’ browsing conventions. This anonymity stems from the encryption and decryption of Tor traffic. That is, the client’s traffic should be subject to encryption and decryption before the sending and receiving process, which leads to delay and even interruption in data flow. The exchange of cryptographic keys between network devices plays a pivotal and critical role in facilitating secure communication and ensuring the integrity of cryptographic procedures. This essential process is time-consuming, which causes delay and discontinuity of data flow. To overcome delay or interruption problems, we utilized the Software-Defined Network (SDN), Machine Learning (ML), and Blockchain (BC) techniques, which support the Tor network to intelligently speed up exchanging the public key via the proactive processing of the Tor network security management information. Consequently, the combination network (ITor-SDN) keeps data flow continuity to a Tor client. We simulated and emulated the proposed network by using Mininet and Shadow simulations. The findings of the performed analysis illustrate that the proposed network architecture enhances the overall performance metrics, showcasing a remarkable advancement of around 55%. This substantial enhancement is achieved through the seamless execution of the innovative ITor-SDN network combination approach.

Scopus Clarivate Crossref
View Publication
Publication Date
Sun Apr 30 2023
Journal Name
Iraqi Journal Of Science
Two Spectrophotometric Methods Based on Diazotization Coupling Reaction for Determination of Genistein in Pure and Supplement
...Show More Authors

      Genistein (GEN) is one of the predominant dietary isoflavones found in legumes such as soybeans. Genistein has been recommended as an osteoporosis treatment for postmenopausal women and elderly men, with the intention of reducing cardiovascular disease and hormone-dependent malignancies. Therefore, two sensitive and simple methods for quantifying it in the supplements preparation were developed.The first method (A) comprised employing the surfactant Triton X-114 to extract the result of the diazotization reaction with 4-Aminoacetophenone(4AMA) utilizing a cloud point extraction technique. The product was extracted using micelles of a non-ionic surfactant (TritonX-114) and then spectrophotometrically detected at a specified wa

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (1)
Scopus Crossref
Publication Date
Fri Aug 30 2024
Journal Name
Iraqi Journal Of Science
The Dissipation of the Kinetic Energy for 2D Bounded Flow by Using Moment-Based Boundary Conditions with Burnett Order Stress for LBM
...Show More Authors

     In this article, the lattice Boltzmann method with two relaxation time  (TRT)  for the  D2Q9 model is used to investigate numerical results for 2D flow. The problem is performed to show the dissipation of the kinetic energy rate and its relationship with the enstrophy growth for 2D dipole wall collision. The investigation is carried out for normal collision and oblique incidents at an angle of . We prove the accuracy of moment -based boundary conditions with slip and Navier-Maxwell slip conditions to simulate this flow. These conditions are under the effect of Burnett-order stress conditions that are consistent with the discrete Boltzmann equation. Stable results are found by using this kind of boundary condition where d

... Show More
Scopus Crossref
Publication Date
Fri Apr 01 2016
Journal Name
Journal Of Economics And Administrative Sciences
The Success Of The Project Management In light of the Learning Organization Characteristics field reserche for the opinion of simple of worker at the State Commission For Road and Bridge
...Show More Authors

Abstract                                                                                                                       &nbsp

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Oct 17 2018
Journal Name
International Journal Of Civil Engineering And Technology (ijciet)
ESTIMATION OF MUNICIPAL SOLID WASTE GENERATION AND LANDFILL VOLUME GENERATION AND LANDFILL VOLUME USING ARTIFICIAL NEURAL NETWORKS
...Show More Authors

Publication Date
Sun Oct 01 2017
Journal Name
Al–bahith Al–a'alami
Social Media Networks and Freedom of Expression of Individual Rights and Social Diversity: Facebook is a Sample
...Show More Authors

We are, today, facing a torrent of information, ideas, images and videos due to advances of communication technology and electronic publishing. In addition to the proliferation of social networking sites that allow individuals to use them and participate in their channels without any restrictions limiting their freedom in publishing. Due to these sites many terms have emerged like alternative media which use internet and its various techniques to serve its objectives notably the freedom of expression without restrictions. This research studies the phenomenon of interactive media i.e. alternative media through Facebook along with the freedom that makes it spreading in the society and the relation of individual freedom with social diversit

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Mon Dec 28 2020
Journal Name
Journal Of The College Of Education For Women
Evaluating the Indicators and Quality of Potable Water Networks in Al-Shatrah City: سميع جلاب منسي السهلاني
...Show More Authors

The present paper aims at evaluating the vailability quality and future horizons of potable water in the city of Shatra as a model. This is done in accordance with certain subjective and objective factors alongside the classification map of Shatra as a residential area. This system follows geographical studies specialized in urban construction. The problem of the present paper as well as the data approaching that problem have been chosen from the records of 2018. The researcher offered (919) questionnaire forms to be answered by a sample of dwellers in that area. Besides, the researcher also followed lab analysis of water samples collected from districts in the city of Shatra. GIS technology was also used to arrive at the real water shar

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Nov 30 2022
Journal Name
Iraqi Journal Of Science
Detection and Classification of The Osteoarthritis in Knee Joint Using Transfer Learning with Convolutional Neural Networks (CNNs)
...Show More Authors

    Osteoarthritis (OA) is a disease of human joints, especially the knee joint, due to significant weight of the body. This disease leads to rupture and degeneration of parts of the cartilage in the knee joint, which causes severe pain. Diagnosis of this disease can be obtained through X-ray. Deep learning has become a popular solution to medical issues due to its fast progress in recent years. This research aims to design and build a classification system to minimize the burden on doctors and help radiologists to assess the severity of the pain, enable them to make an optimal diagnosis and describe the correct treatment. Deep learning-based approaches, such as Convolution Neural Networks (CNNs), have been used to detect knee OA usin

... Show More
View Publication Preview PDF
Scopus (13)
Crossref (3)
Scopus Crossref
Publication Date
Sun Apr 01 2018
Journal Name
Ibn Al-haitham Journal For Pure And Applied Science
Hiding Data in Color Image Using Least Significant Bits of Blue Sector
...Show More Authors

Publication Date
Tue Nov 10 2020
Journal Name
International Journal Of Psychosocial Rehabilitation
Hybridization Methodology of ARMA-FIGARCH Model to Examine Gasoline Data in Iraq
...Show More Authors

Preview PDF
Publication Date
Sun Jun 01 2014
Journal Name
International Journal Of Inventive Engineering And Science,
Increase the Capacity Amount of Data Hiding to Least Significant BIT Method
...Show More Authors