The mobile phone is widespread all over the world. This technology is one of the most widespread with more than five billion subscriptions making people describe this interaction system as Wireless Intelligence. Mobile phone networks become the focus of attention of researchers, organizations and governments due to its penetration in all life fields. Analyzing mobile phone traces allows describing human mobility with accuracy as never done before. The main objective in this contribution is to represent the people density in specific regions at specific duration of time according to raw data (mobile phone traces). This type of spatio-temporal data named CDR (Call Data Records), which have properties of the time and spatial indications for the elaborated environment. City life understandings help urban planners, decision makers, and scientists of different fields to resolve their questions about human mobility. Such studies are using a very cheap, most spread tool that is the mobile phone. Mobile phone traces analysis gives conceptual views about human density, connections and mobility patterns. In this study, the mobile phone traces concern an ephemeral event called Armada, where important densities of people are observed during 12 days in the French city of Rouen. To better understand how people attracted by this event, city area during these days of this ephemeral event, is used. Armada mobile phone database is analyzed using a computing platform integrating various applications for huge database management, visualization and analysis, in order to explore the urban pulse generated by this event. As result, city pulsation and life patterns are explored and visualized for specified regions.
LED is an ultra-lightweight block cipher that is mainly used in devices with limited resources. Currently, the software and hardware structure of this cipher utilize a complex logic operation to generate a sequence of random numbers called round constant and this causes the algorithm to slow down and record low throughput. To improve the speed and throughput of the original algorithm, the Fast Lightweight Encryption Device (FLED) has been proposed in this paper. The key size of the currently existing LED algorithm is in 64-bit & 128-bit but this article focused mainly on the 64-bit key (block size=64-bit). In the proposed FLED design, complex operations have been replaced by LFSR left feedback technology to make the algorithm perform more e
... Show MoreFeedback on students’ assignments can be done in many different ways. Nowadays, the growing number of students at universities has increased the burden on the instructors to give feedback on students’ writings quickly and efficiently. As such, new methods of modern online automated feedback tools, such as Hemingway app and ecree,are used to assist and help instructors. Hence, this research is an explanatory study to examine the effect of using the online automated feedback on some Iraqi EFL learners’ writings at the university level. The study comprised 60 students enrolled in an English language course at the University of Anbar. They were divided randomly into two groups, experi
... Show MoreThis paper investigates the effect of magnetohydrodynamic (MHD) of an incompressible generalized burgers’ fluid including a gradient constant pressure and an exponentially accelerate plate where no slip hypothesis between the burgers’ fluid and an exponential plate is no longer valid. The constitutive relationship can establish of the fluid model process by fractional calculus, by using Laplace and Finite Fourier sine transforms. We obtain a solution for shear stress and velocity distribution. Furthermore, 3D figures are drawn to exhibit the effect of magneto hydrodynamic and different parameters for the velocity distribution.
<span>Distributed denial-of-service (DDoS) attack is bluster to network security that purpose at exhausted the networks with malicious traffic. Although several techniques have been designed for DDoS attack detection, intrusion detection system (IDS) It has a great role in protecting the network system and has the ability to collect and analyze data from various network sources to discover any unauthorized access. The goal of IDS is to detect malicious traffic and defend the system against any fraudulent activity or illegal traffic. Therefore, IDS monitors outgoing and incoming network traffic. This paper contains a based intrusion detection system for DDoS attack, and has the ability to detect the attack intelligently, dynami
... Show MoreThe aim of the research is to design a test with cognitive achievement through the use of the inverted class strategy for some basic soccer skills for gyms for first-average students, within the curriculum of the Ministry of Education, where the researcher used the experimental approach. For the same division (B) and the number of each group (10) students, i.e. the total total of the research sample (20) students, and the pre-test for the research sample was applied through the design of the test prepared by the research after which the educational program with the strategy was applied to the research sample and continued (8) weeks after Completion of the tutorial has been post-tested for the research sample, In it, he reached significant r
... Show MoreA computational investigation is carried out in the field of charged –particle optics with the aid of numerical analysis method using the personal computer. The work is concerned with the design of electron gun with space-charge effect. The Finite element method (FEM) used in the solution of Poison's equation for determine the axial potential distribution of the two-electrode immersion lens operated under zero magnification condition , and from the solution of the paraxial ray equation the optical properties such as the focal length , spherical and chromatic aberration coefficients are determined, also a calculation of the brightness and perveance for the lens. The electrodes geometry was determined in two and three dimensi
... Show MoreAn approximate solution of the liner system of ntegral cquations fot both fredholm(SFIEs)and Volterra(SIES)types has been derived using taylor series expansion.The solusion is essentailly