Neural cryptography deals with the problem of “key exchange” between two neural networks by using the mutual learning concept. The two networks exchange their outputs (in bits) and the key between two communicating parties ar eventually represented in the final learned weights, when the two networks are said to be synchronized. Security of neural synchronization is put at risk if an attacker is capable of synchronizing with any of the two parties during the training process.
Ethnographic research is perhaps the most common applicable type of qualitative research method in psychology and medicine. In ethnography studies, the researcher immerses himself in the environment of participants to understand the cultures, challenges, motivations, and topics that arise between them by investigating the environment directly. This type of research method can last for a few days to a few years because it involves in-depth monitoring and data collection based on these foundations. For this reason, the findings of the current study stimuli the researchers in psychology and medicine to conduct studies by applying ethnographic research method to investigate the common cultural patterns language, thinking, beliefs, and behavior
... Show MoreA new colorimetric-flow injection method has been developed and validated for the detection of Cefotaxime sodium in pharmaceutical formulations. This method stands out for its rapid and sensitive nature. The formation of a brown-colored complex between Cefotaxime sodium and the Biuret reagent in a highly alkaline environment serves as the basis for the detection. The intensity of this colored complex is measured using a custom-built Continuous Flow Injection Analyzer, enabling accurate quantification of Cefotaxime sodium. Optimization studies of the chemical and physical parameters such as dilution of Biuret reagent, effect of the medium basicity, flow rate, sample loop and others have been investigated. The calibration gra
... Show MoreThe majority of the environmental outputs from gas refineries are oily wastewater. This research reveals a novel combination of response surface methodology and artificial neural network to optimize and model oil content concentration in the oily wastewater. Response surface methodology based on central composite design shows a highly significant linear model with P value <0.0001 and determination coefficient R2 equal to 0.747, R adjusted was 0.706, and R predicted 0.643. In addition from analysis of variance flow highly effective parameters from other and optimization results verification revealed minimum oily content with 8.5 ± 0.7 ppm when initial oil content 991 ppm, tempe
Let G be a graph with p vertices and q edges and be an injective function, where k is a positive integer. If the induced edge labeling defined by for each is a bijection, then the labeling f is called an odd Fibonacci edge irregular labeling of G. A graph which admits an odd Fibonacci edge irregular labeling is called an odd Fibonacci edge irregular graph. The odd Fibonacci edge irregularity strength ofes(G) is the minimum k for which G admits an odd Fibonacci edge irregular labeling. In this paper, the odd Fibonacci edge irregularity strength for some subdivision graphs and graphs obtained from vertex identification is determined.
Electronic remote identification (ER-ID) is a new radio frequency (RF) technology that is initiated by the Federal Aviation Authorities (FAA). For security reasons, traffic control, and so on, ER-ID has been applied for drones by the FAA to enable them to transmit their unique identification and location so that unauthorized drones can be identified. The current limitation of the existing ER-ID algorithms is that the application is limited to the Wi-Fi and Bluetooth wireless controllers, which results in a maximum range of 10–20 m for Bluetooth and 50–100 m for Wi-Fi. In this study, a mathematical computing technique based on finite state automaton (FSA) is introduced to expand the range of the ER-ID RF system and reduce the ene
... Show MoreKeys for 22 species representing 10 genera of Thripidae were provided collection of
samples carried out during 1999-2001 in different localities in the middle of Iraq. Of them
four species are described as new to science, Frankliniella megacephala sp. nov; Retithrips
bagdadensis sp. nov; Chirothrips imperatus sp. nov; Taeniothrips tigridis sp. nov; Another
fourteen species are recorded for the first time in Iraq; Thrips meridionalis (Pri.);
Microcephalothrips abdominils (Crawford Scolothrips sexmaculatus (Pergande),);Scolothrips
pallidus (Beach); Scritothrips mangiferae Pri.; Frankliniella tritici Bagnall; Frankliniella
schultzie Trybom; Frankliniella unicolor Morgan; Retithrips aegypticus Marchal; Retithrips
java
A crucial area of research in nanotechnology is the formation of environmentally benign nanoparticles. Both unicellular and multicellular play an important role in synthesis nanoparticles through the production of inorganic materials either intracellularly or extracellularly. The agents (pigments, siderophores, cell extracted metabolites and reducing compounds) were used to prepare silver nanparticles with different sizes and shapes. The color variations (dark yellow, slightly dark yellow and golden yellow) arising from changes in the composition, size, and shape of nanoparticles, surrounding medium can be monitored using UV-visible spectrophotometer. These effects are due to the phenomena called surface plasmon resonance. The silver nanopa
... Show MoreMost of the medical datasets suffer from missing data, due to the expense of some tests or human faults while recording these tests. This issue affects the performance of the machine learning models because the values of some features will be missing. Therefore, there is a need for a specific type of methods for imputing these missing data. In this research, the salp swarm algorithm (SSA) is used for generating and imputing the missing values in the pain in my ass (also known Pima) Indian diabetes disease (PIDD) dataset, the proposed algorithm is called (ISSA). The obtained results showed that the classification performance of three different classifiers which are support vector machine (SVM), K-nearest neighbour (KNN), and Naïve B
... Show More