The objective of this work is to design and implement a cryptography system that enables the sender to send message through any channel (even if this channel is insecure) and the receiver to decrypt the received message without allowing any intruder to break the system and extracting the secret information. This work modernize the feedforward neural network, so the secret message will be encrypted by unsupervised neural network method to get the cipher text that can be decrypted using the same network to get the original text. The security of any cipher system depends on the security of the related keys (that are used by the encryption and the decryption processes) and their corresponding lengths. In this work, the key is the final weights that are obtained from the learning process within the neural network stage, So the work can be represented as an update or development for using the neural network to enhance the security of text. As a result for a powerful design, the resulted cipher system provides a high degree of security which satisfies the data confidentially which is the main goal of the most cryptography systems.
The instant global trend towards developing tight reservoir is great; however, development can be very challenging due to stress and geomechanical properties effect in horizontal well placement and hydraulic fracturing design. Many parameters are known to be important to determine the suitable layer for locating horizontal well such as petrophysical and geomechanical properties. In the present study, permeability sensitivity to stress is also considered in the best layer selection for well placement. The permeability sensitivity to the stress of the layers was investigated using measurements of 27 core sample at different confining stress values. 1-D mechanical earth model (MEM) was built and converted to a 3-D full-field geomechanical mode
... Show MoreThe research discussed the possibility of adsorption of Brilliant Blue Dye (BBD) from wastewater using 13X zeolite adsorbent, which is considered a byproduct of the production process of potassium carbonate from Iraqi potash raw materials. The 13X zeolite adsorbent was prepared and characterized by X-ray diffraction that showed a clear match with the standard 13X zeolite. The crystallinity rate was 82.15% and the crystal zeolite size was 5.29 nm. The surface area and pore volume of the obtained 13X zeolite were estimated. The prepared 13X zeolite showed the ability to remove BBD contaminant from wastewater at concentrations 5 to 50 ppm and the removal reached 96.60% at the lower pollutant concentration. Adsorption measurements versus tim
... Show MoreIn this paper, Bayes estimators of the parameter of Maxwell distribution have been derived along with maximum likelihood estimator. The non-informative priors; Jeffreys and the extension of Jeffreys prior information has been considered under two different loss functions, the squared error loss function and the modified squared error loss function for comparison purpose. A simulation study has been developed in order to gain an insight into the performance on small, moderate and large samples. The performance of these estimators has been explored numerically under different conditions. The efficiency for the estimators was compared according to the mean square error MSE. The results of comparison by MSE show that the efficiency of B
... Show MoreIs the chemical industries of great importance for the economy of any country, through what is borne by these industries is an important part of the changes contained in the industrial output of transfer and, moreover, that these industries are overlaps and intricacies of sector-wide with the rest of the manufacturing sectors, with agriculture and services , through the offering of these industries produce Production requirements intervention such as chemical fertilizer used in the production of agricultural crops, in addition to the various areas for the use of phosphorus in the food industry, to the extent that it is difficult to find material Food preparation is not included i
... Show MoreWireless sensor networks (WSNs) are emerging in various application like military, area monitoring, health monitoring, industry monitoring and many more. The challenges of the successful WSN application are the energy consumption problem. since the small, portable batteries integrated into the sensor chips cannot be re-charged easily from an economical point of view. This work focusses on prolonging the network lifetime of WSNs by reducing and balancing energy consumption during routing process from hop number point of view. In this paper, performance simulation was done between two types of protocols LEACH that uses single hop path and MODLEACH that uses multi hop path by using Intel Care i3 CPU (2.13GHz) laptop with MATLAB (R2014a). Th
... Show MoreFlexible job-shop scheduling problem (FJSP) is one of the instances in flexible manufacturing systems. It is considered as a very complex to control. Hence generating a control system for this problem domain is difficult. FJSP inherits the job-shop scheduling problem characteristics. It has an additional decision level to the sequencing one which allows the operations to be processed on any machine among a set of available machines at a facility. In this article, we present Artificial Fish Swarm Algorithm with Harmony Search for solving the flexible job shop scheduling problem. It is based on the new harmony improvised from results obtained by artificial fish swarm algorithm. This improvised solution is sent to comparison to an overall best
... Show MoreConvolutional Neural Networks (CNN) have high performance in the fields of object recognition and classification. The strength of CNNs comes from the fact that they are able to extract information from raw-pixel content and learn features automatically. Feature extraction and classification algorithms can be either hand-crafted or Deep Learning (DL) based. DL detection approaches can be either two stages (region proposal approaches) detector or a single stage (non-region proposal approach) detector. Region proposal-based techniques include R-CNN, Fast RCNN, and Faster RCNN. Non-region proposal-based techniques include Single Shot Detector (SSD) and You Only Look Once (YOLO). We are going to compare the speed and accuracy of Faster RCNN,
... Show More