Research Summary
The doctrine of belief in the Last Day is one of the pillars of faith, and the doctrine of resurrection and reckoning are part of this day.
Belief in the Last Day puts a person in constant control over himself, as this control creates in this person happiness and a decent life, and he renounces the world and turns away from all vices and adorns all virtues.
On the other hand, we find that the person who does not believe in this day does not stand before his eyes anything that prevents him from doing injustices and corruption in the land. The doctrine of belief in the Last Day alone is
... Show MoreToday, the role of cloud computing in our day-to-day lives is very prominent. The cloud computing paradigm makes it possible to provide demand-based resources. Cloud computing has changed the way that organizations manage resources due to their robustness, low cost, and pervasive nature. Data security is usually realized using different methods such as encryption. However, the privacy of data is another important challenge that should be considered when transporting, storing, and analyzing data in the public cloud. In this paper, a new method is proposed to track malicious users who use their private key to decrypt data in a system, share it with others and cause system information leakage. Security policies are also considered to be int
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreA substantial portion of today’s multimedia data exists in the form of unstructured text. However, the unstructured nature of text poses a significant task in meeting users’ information requirements. Text classification (TC) has been extensively employed in text mining to facilitate multimedia data processing. However, accurately categorizing texts becomes challenging due to the increasing presence of non-informative features within the corpus. Several reviews on TC, encompassing various feature selection (FS) approaches to eliminate non-informative features, have been previously published. However, these reviews do not adequately cover the recently explored approaches to TC problem-solving utilizing FS, such as optimization techniques.
... Show MoreA new Schiff bases ligand 4- ((2-hyolroxy phenylimino) methyl) -2, 6-dimethoxyphenol derived from condensation of 2- amino phenol with 4-hydroxy -3, 5-dimethoxy benzaldehyde have been synthesized and characterized by spectroscopy, spectra, Mass spectrum and elemental microanalysis (C.H.N). Metal Complexes with ions have been also synthesized and characterized spectroscopic methods spectroscopy, flame atomic absorption, molar conductivity measurements and magnetic susceptibility. These studies indicate that the moler ratio for the complexes. The complexes showed characteristics octahedral geometry with the (O,N) ligand coordinated in bidentate mode while with showed square planer. The enzyme activity of the ligand and i
... Show MoreTitanium-dioxide (TiO2) nanoparticles suspended in water, and ethanol based fluids have been prepared using one step method and characterized by scanning electron microscopy (SEM), and UV–visible spectrophotometer. The TiO2 nanoparticles were added to base fluids with different volume concentrations from 0.1% to1.5% by dispersing the synthesized nanoparticles in deionized water and ethanol solutions. The effective thermal conductivity, viscosity and pH of prepared nanofluids at different temperatures from 15 to 30 oC were carried out and investigated. It was observed that the thermal conductivity, pH, and viscosity of nanofluids increases with the increase in TiO2 nanoparticle volume fraction
... Show MoreRecommender Systems are tools to understand the huge amount of data available in the internet world. Collaborative filtering (CF) is one of the most knowledge discovery methods used positively in recommendation system. Memory collaborative filtering emphasizes on using facts about present users to predict new things for the target user. Similarity measures are the core operations in collaborative filtering and the prediction accuracy is mostly dependent on similarity calculations. In this study, a combination of weighted parameters and traditional similarity measures are conducted to calculate relationship among users over Movie Lens data set rating matrix. The advantages and disadvantages of each measure are spotted. From the study, a n
... Show More