Key generation for data cryptography is vital in wireless communications security. This key must be generated in a random way so that can not be regenerated by a third party other than the intended receiver. The random nature of the wireless channel is utilized to generate the encryption key. However, the randomness of wireless channels deteriorated over time due to channel aging which casing security threats, particularly for spatially correlated channels. In this paper, the effect of channel aging on the ciphering key generations is addressed. A proposed method to randomize the encryption key each coherence time is developed which decreases the correlation between keys generated at consecutive coherence times. When compared to the
... Show MoreThe present study discusses the problem based learning in Iraqi classroom. This method aims to involve all learners in collaborative activities and it is learner-centered method. To fulfill the aims and verify the hypothesis which reads as follow” It is hypothesized that there is no statistically significant differences between the achievements of Experimental group and control group”. Thirty learners are selected to be the sample of present study.Mann-Whitney Test for two independent samples is used to analysis the results. The analysis shows that experimental group’s members who are taught according to problem based learning gets higher scores than the control group’s members who are taught according to traditional method. This
... Show MoreThe present study discusses the problem based learning in Iraqi classroom. This method aims to involve all learners in collaborative activities and it is learner-centered method. To fulfill the aims and verify the hypothesis which reads as follow” It is hypothesized that there is no statistically significant differences between the achievements of Experimental group and control group”. Thirty learners are selected to be the sample of present study.Mann-Whitney Test for two independent samples is used to analysis the results. The analysis shows that experimental group’s members who are taught according to problem based learning gets higher scores than the control group’s members who are taught according to traditional method. This
... Show MoreAnchusa strigosa - prickly alkanet from Boraginaceae grows in roadsides, and fields of a broad range of habitats from mediterranean woodlands, to steppe vegetation, to true desert. It is commonly known as" him him" or "lisan al thawr". Anchusa can withstand hard weather conditions and hence is widely cultivated. The color of its flowers can range from pure white to deep cobalt blue. Various parts of A. strigosa are used in traditional medicine for treating several diseases or symptoms, such as abdominal pain, bronchitis, cough, and diarrhea. The goal of this study was to examine the cytotoxic effect of the crude extract of A. strigosa roots and leaves and their fractions against various tumor cell lines: adenoc
... Show MoreThe removal of yellow(W6GS) dye has been studied, by using Nano chitosan . Adsorption isotherms were studied under different Temperatures , the effect of salt ions and Equilibrium time were investigated . Adsorption isotherms were found to be comparable to the Langmuir equation .the adsorption results were evidently increased with the high temperature (Endothermic process ). The functions were calculated (ΔH, ΔG, ΔS) were calculated. The Kinetics of the adsorption was studied. The results were treated according to (Lagergren equation). The Kinetic experimental data properly correlated with the pseudo First order kinetic model
Image is an important digital information that used in many internet of things (IoT) applications such as transport, healthcare, agriculture, military, vehicles and wildlife. etc. Also, any image has very important characteristic such as large size, strong correlation and huge redundancy, therefore, encrypting it by using single key Advanced Encryption Standard (AES) through IoT communication technologies makes it vulnerable to many threats, thus, the pixels that have the same values will be encrypted to another pixels that have same values when they use the same key. The contribution of this work is to increase the security of transferred image. This paper proposed multiple key AES algorithm (MECCAES) to improve the security of the tran
... Show MoreImproved Merging Multi Convolutional Neural Networks Framework of Image Indexing and Retrieval
Highly plastic soils exhibit unfavorited properties upon saturation, which produce different defects in engineering structures. Attempts were made by researchers to proffer solutions to these defects by experimenting in practical ways. This included various materials that could possibly improve the soil engineering properties and reduce environmental hazards. This paper investigates the strength behavior of highly plastic clay stabilized with brick dust. The brick dust contents were 10%, 20%, and 30% by dry weight of soil. A series of linear shrinkage and unconfined compression tests were carried out to study the effect of brick dust on the quantitative amount of shrinkage experienced by highly plastic clay and the undra
... Show MoreDetection of early clinical keratoconus (KCN) is a challenging task, even for expert clinicians. In this study, we propose a deep learning (DL) model to address this challenge. We first used Xception and InceptionResNetV2 DL architectures to extract features from three different corneal maps collected from 1371 eyes examined in an eye clinic in Egypt. We then fused features using Xception and InceptionResNetV2 to detect subclinical forms of KCN more accurately and robustly. We obtained an area under the receiver operating characteristic curves (AUC) of 0.99 and an accuracy range of 97–100% to distinguish normal eyes from eyes with subclinical and established KCN. We further validated the model based on an independent dataset with
... Show MoreBackground/Objectives: The purpose of current research aims to a modified image representation framework for Content-Based Image Retrieval (CBIR) through gray scale input image, Zernike Moments (ZMs) properties, Local Binary Pattern (LBP), Y Color Space, Slantlet Transform (SLT), and Discrete Wavelet Transform (DWT). Methods/Statistical analysis: This study surveyed and analysed three standard datasets WANG V1.0, WANG V2.0, and Caltech 101. The features an image of objects in this sets that belong to 101 classes-with approximately 40-800 images for every category. The suggested infrastructure within the study seeks to present a description and operationalization of the CBIR system through automated attribute extraction system premised on CN
... Show More