Neural cryptography deals with the problem of “key exchange” between two neural networks by using the mutual learning concept. The two networks exchange their outputs (in bits) and the key between two communicating parties ar eventually represented in the final learned weights, when the two networks are said to be synchronized. Security of neural synchronization is put at risk if an attacker is capable of synchronizing with any of the two parties during the training process.
Solar cells thin films were prepared using polyvinyl alcohol (PVA) as a thin film, with extract of natural pigment from local flower. A concentration of 0.1g/ml of polyvinyl alcohol solution in water was prepared for four samples, with various concentrations of plant pigment (0, 15, 25 and 50) % added to each of the four solutions separately for preparing (PVA with low concentrated dye , PVA with medium concentrated dye and PVA with high concentrated dye ) thin films respectively . Ultraviolet absorption regions were obtained by computerized UV-Visible (CECIL 2700). Optical properties including (absorbance, reflectance, absorption coefficient, energy gap and dielectric constant) via UV- Vis were tested, too. Fourier transform infra
... Show MoreIn current study, the dye from flowers petals of Strelitzia reginae used for the first time to prepare natural photosensitizer for DSSC fabrication. Among five different solvents used to extract the natural dye from S. reginae flowers, the ethanol extract of anthocyanin dye revealed higher absorption spectrum of 0.757a.u. at wavelength of 454nm. A major effect of temperature was studied to increase the extraction yield. The results show that the optimal temperature was 70 °C and there was a sharp decrease of dye concentration from 0.827 at temperature of 70 °C to 0.521 at temperature of 90°C. The extract solution of flowers of S. reginae showed higher concentration in acidic media, especially at pH 4 (0.902). The
... Show MoreThis study aims to enhance the RC5 algorithm to improve encryption and decryption speeds in devices with limited power and memory resources. These resource-constrained applications, which range in size from wearables and smart cards to microscopic sensors, frequently function in settings where traditional cryptographic techniques because of their high computational overhead and memory requirements are impracticable. The Enhanced RC5 (ERC5) algorithm integrates the PKCS#7 padding method to effectively adapt to various data sizes. Empirical investigation reveals significant improvements in encryption speed with ERC5, ranging from 50.90% to 64.18% for audio files and 46.97% to 56.84% for image files, depending on file size. A substanti
... Show MoreDust is a frequent contributor to health risks and changes in the climate, one of the most dangerous issues facing people today. Desertification, drought, agricultural practices, and sand and dust storms from neighboring regions bring on this issue. Deep learning (DL) long short-term memory (LSTM) based regression was a proposed solution to increase the forecasting accuracy of dust and monitoring. The proposed system has two parts to detect and monitor the dust; at the first step, the LSTM and dense layers are used to build a system using to detect the dust, while at the second step, the proposed Wireless Sensor Networks (WSN) and Internet of Things (IoT) model is used as a forecasting and monitoring model. The experiment DL system
... Show MoreDetermining the face of wearing a mask from not wearing a mask from visual data such as video and still, images have been a fascinating research topic in recent decades due to the spread of the Corona pandemic, which has changed the features of the entire world and forced people to wear a mask as a way to prevent the pandemic that has calmed the entire world, and it has played an important role. Intelligent development based on artificial intelligence and computers has a very important role in the issue of safety from the pandemic, as the Topic of face recognition and identifying people who wear the mask or not in the introduction and deep education was the most prominent in this topic. Using deep learning techniques and the YOLO (”You on
... Show More