To perform a secure evaluation of Indoor Design data, the research introduces a Cyber-Neutrosophic Model, which utilizes AES-256 encryption, Role-Based Access Control, and real-time anomaly detection. It measures the percentage of unpredictability, insecurity, and variance present within model features. Also, it provides reliable data security. Similar features have been identified between the final results of the study, corresponding to the Cyber-Neutrosophic Model analysis, and the cybersecurity layer helped mitigate attacks. It is worth noting that Anomaly Detection successfully achieved response times of less than 2.5 seconds, demonstrating that the model can maintain its integrity while providing privacy. Using neutrosophic similarity scores that ranged from 0.85 to 0.98, the Cyber-Neutrosophic Model proved to have higher analysis accuracy. Additionally, it provided robust data security by utilizing Advance Encryption Standards (AES)-256 with Role-Based Access Control.
The current research aimed to explore the practicing of cyber bullying among college students as well as the differences of practicing cyber bullying among university students based on gender variable. The finding revealed that there was a high prevalence rate for cyber bullying among research sample who was students from Baghdad University. It assured clearly that this group participated in cyber bullying effectively, due to the biological and psychological factors which make them super sensitive toward the social and economic problems. Moreover, the results showed that there were significant differences between male and female in practicing cyber bullying. The study proved that women use cyber bulling more than men.
... Show MoreThe development of wireless sensor networks (WSNs) in the underwater environment leads to underwater WSN (UWSN). It has severe impact over the research field due to its extensive and real-time applications. However effective execution of underwater WSNs undergoes several problems. The main concern in the UWSN is sensor nodes’ energy depletion issue. Energy saving and maintaining quality of service (QoS) becomes highly essential for UWASN because of necessity of QoS application and confined sensor nodes (SNs). To overcome this problem, numerous prevailing methods like adaptive data forwarding techniques, QoS-based congestion control approaches, and various methods have been devised with maximum throughput and minimum network lifesp
... Show MoreThe development of wireless sensor networks (WSNs) in the underwater environment leads to underwater WSN (UWSN). It has severe impact over the research field due to its extensive and real-time applications. However effective execution of underwater WSNs undergoes several problems. The main concern in the UWSN is sensor nodes’ energy depletion issue. Energy saving and maintaining quality of service (QoS) becomes highly essential for UWASN because of necessity of QoS application and confined sensor nodes (SNs). To overcome this problem, numerous prevailing methods like adaptive data forwarding techniques, QoS-based congestion control approaches, and various methods have been devised with maximum throughput and minimum network lifesp
... Show MoreLacing reinforcement plays a critical role in the design and performance of reinforced concrete (RC) slabs by distributing the applied loads more evenly across the slab, ensuring that no specific area of the slab is overloaded. In this study, nine slabs, divided into three groups according to the investigated parameters, were meticulously designed and evaluated to study the interplay between the lacing reinforcement and other key parameters. Each slab was crafted for simple support and was subjected to both static and repeated two-point load tests. The lacing reinforcement had an angle of 45° with various tension and lacing steel. The repeated-tested specimens with lacing reinforcement experienced smaller ductility than those of s
... Show MoreLacing reinforcement plays a critical role in the design and performance of reinforced concrete (RC) slabs by distributing the applied loads more evenly across the slab, ensuring that no specific area of the slab is overloaded. In this study, nine slabs, divided into three groups according to the investigated parameters, were meticulously designed and evaluated to study the interplay between the lacing reinforcement and other key parameters. Each slab was crafted for simple support and was subjected to both static and repeated two-point load tests. The lacing reinforcement had an angle of 45° with various tension and lacing steel. The repeated-tested specimens with lacing reinforcement experienced smaller ductility than those of s
... Show MoreIn networking communication systems like vehicular ad hoc networks, the high vehicular mobility leads to rapid shifts in vehicle densities, incoherence in inter-vehicle communications, and challenges for routing algorithms. It is necessary that the routing algorithm avoids transmitting the pockets via segments where the network density is low and the scale of network disconnections is high as this could lead to packet loss, interruptions and increased communication overhead in route recovery. Hence, attention needs to be paid to both segment status and traffic. The aim of this paper is to present an intersection-based segment aware algorithm for geographic routing in vehicular ad hoc networks. This algorithm makes available the best route f
... Show MoreThe aim of this paper is to introduce the concept of N and Nβ -closed sets in terms of neutrosophic topological spaces. Some of its properties are also discussed.
Mobile ad hoc network security is a new area for research that it has been faced many difficulties to implement. These difficulties are due to the absence of central authentication server, the dynamically movement of the nodes (mobility), limited capacity of the wireless medium and the various types of vulnerability attacks. All these factor combine to make mobile ad hoc a great challenge to the researcher. Mobile ad hoc has been used in different applications networks range from military operations and emergency disaster relief to community networking and interaction among meeting attendees or students during a lecture. In these and other ad hoc networking applications, security in the routing protocol is necessary to protect against malic
... Show MoreIn this paper, the botnet detection problem is defined as a feature selection problem and the genetic algorithm (GA) is used to search for the best significant combination of features from the entire search space of set of features. Furthermore, the Decision Tree (DT) classifier is used as an objective function to direct the ability of the proposed GA to locate the combination of features that can correctly classify the activities into normal traffics and botnet attacks. Two datasets namely the UNSW-NB15 and the Canadian Institute for Cybersecurity Intrusion Detection System 2017 (CICIDS2017), are used as evaluation datasets. The results reveal that the proposed DT-aware GA can effectively find the relevant features from
... Show More