Today, the role of cloud computing in our day-to-day lives is very prominent. The cloud computing paradigm makes it possible to provide demand-based resources. Cloud computing has changed the way that organizations manage resources due to their robustness, low cost, and pervasive nature. Data security is usually realized using different methods such as encryption. However, the privacy of data is another important challenge that should be considered when transporting, storing, and analyzing data in the public cloud. In this paper, a new method is proposed to track malicious users who use their private key to decrypt data in a system, share it with others and cause system information leakage. Security policies are also considered to be int
... Show MoreThis research was conducted to measure the safety of heat stable enterotoxin a (STa) produced by enterotoxigenic Escherichia coli, through studying its toxic effect on mice since it showed a promising effect in reducing the proliferation of colorectal cancer cells. The cytogenetic effect was determined after giving five different doses (100, 200, 400, 800 and 1600)μg/Kg in comparison with negative (phosphate buffer saline / PBS) and positive (mitomycin C/ MMC, at doses of 2 and 5μg/Kg) controls on mouse bone marrow cells by employing the following parameters: mitotic index, chromosomal aberrations and micronucleus, also, the serum level of liver functional enzymes (GOT, GPT, ALP) was recorded. In addition, lethal dose 50 (LD 50) with cert
... Show Morepaper
his study aims to determine most stable isobar from some isobaric elements with mass number (A= 50-65 & 180-195). This aim achieved by, firstly: plot mass parabolas for these isobaric family, second: calculated the atomic number for most stable isobar (ZA) value. To plot the mass parabola, the binding energy (B.E) calculated from semi empirical formula for these isobars. The mass number (A) plotted as a function to the (ZA) for each range; we get a linear relationship between them. An empirical formula for the most stable isobar has been developed from this linear dependence. From the results, we can see that mass parabolas for isobaric elements with odd mass number (A) are different from the mass parabolas of even mass number (A) isobars,
... Show MoreTor (The Onion Routing) network was designed to enable users to browse the Internet anonymously. It is known for its anonymity and privacy security feature against many agents who desire to observe the area of users or chase users’ browsing conventions. This anonymity stems from the encryption and decryption of Tor traffic. That is, the client’s traffic should be subject to encryption and decryption before the sending and receiving process, which leads to delay and even interruption in data flow. The exchange of cryptographic keys between network devices plays a pivotal and critical role in facilitating secure communication and ensuring the integrity of cryptographic procedures. This essential process is time-consuming, which causes del
... Show MoreThis work proposes a new video buffer framework (VBF) to acquire a favorable quality of experience (QoE) for video streaming in cellular networks. The proposed framework consists of three main parts: client selection algorithm, categorization method, and distribution mechanism. The client selection algorithm was named independent client selection algorithm (ICSA), which is proposed to select the best clients who have less interfering effects on video quality and recognize the clients’ urgency based on buffer occupancy level. In the categorization method, each frame in the video buffer is given a specific number for better estimation of the playout outage probability, so it can efficiently handle so many frames from different video
... Show MoreThe aim of this paper is to approximate multidimensional functions f∈C(R^s) by developing a new type of Feedforward neural networks (FFNS) which we called it Greedy ridge function neural networks (GRGFNNS). Also, we introduce a modification to the greedy algorithm which is used to train the greedy ridge function neural networks. An error bound are introduced in Sobolov space. Finally, a comparison was made between the three algorithms (modified greedy algorithm, Backpropagation algorithm and the result in [1]).
Electromyography (EMG) is being explored for evaluating muscle activity. For gait analysis, EMG needs to be small, lightweight, portable device, and with low power consumption. The proposed superficial EMG (sEMG) system is aimed to be used in rehabilitation centers and biomechanics laboratories for gait analysis in Iraq.
The system is built using MyoWare, which is controlled by using STM32F100 microcontroller. The sEMG signal is transferred via Bluetooth to the computer (about 30m range) for further processing. MATLAB is used for sEMG signal conditioning. The overall system cost (without computer) is about $80. The proposed system is validated using wired NORAXON EMG using the mean root mean squared metho
... Show MoreAn impressed current cathodic protection system (ICCP) requires measurements of extremely low-level quantities of its electrical characteristics. The current experimental work utilized the Adafruit INA219 sensor module for acquiring the values for voltage, current, and power of a default load, which consumes quite low power and simulates an ICCP system. The main problem is the adaptation of the INA219 sensor to the LabVIEW environment due to the absence of the library of this sensor. This work is devoted to the adaptation of the Adafruit INA219 sensor module in the LabVIEW environment through creating, developing, and successfully testing a Sub VI to be ready for employment in an ICCP system. The sensor output was monitored with an Arduino
... Show More