As s widely use of exchanging private information in various communication applications, the issue to secure it became top urgent. In this research, a new approach to encrypt text message based on genetic algorithm operators has been proposed. The proposed approach follows a new algorithm of generating 8 bit chromosome to encrypt plain text after selecting randomly crossover point. The resulted child code is flipped by one bit using mutation operation. Two simulations are conducted to evaluate the performance of the proposed approach including execution time of encryption/decryption and throughput computations. Simulations results prove the robustness of the proposed approach to produce better performance for all evaluation metrics with respect to the conventional encryption techniques like RSA, DES, etc.
KE Sharquie, SA Al-Mashhadani, AA Noaimi, AA Hasan, Journal of Cutaneous and Aesthetic Surgery, 2012 - Cited by 19
A novel mixed natural coagulant has been developed to remove sewage pollutants and heavy metals from Qanat- al- Jayesh by using low cost adsorbent natural materials. In these materials, significant interaction contains Arabic gum mixed with extracted silica from rice husk ash (natural coagulants) by the Batch device approach, using two variables, pH values ranging from 5-8 and contact times between 0.25-5 hrs. All wastewater samples were collected after treatment by adsorbents and examined for determination of residual heavy metal concentrations: Pb, Ni, Zn and Cu by atomic absorption spectroscopy (AAS), turbidity, pH, total dissolved salts (TDS), electrical conductivity (EC) and total salinity (TS). The results obtained indicate Th
... Show MoreThis research aims to identify the cognitive distortion of kindergarten children and its relationship to their parenting reinforcement. The researcher used the descriptive approach, being the closest to reaching the study objectives, To measure the relationship between the research variables, the researcher prepared two questionnaire tools for this purpose, the first for measuring "cognitive distortion", And the second is to measure "parental reinforcement", and each tool consisted of (20) items.
After ensuring the validity and reliability of the two research tools and their suitabi
... Show MoreIndividual cannot live alone due to to his need for others to facilitate His supplies for living, thus social affiliation is considered one of the most important psychological, social needs in individuals life through his willing to affiliate to others whether they were friends ,family, colleague , or even home to reach some degree of psychological stability.
Affiliation is a tool to search for Satiate through living with group from the same type or comply for group or to be compatible with them or even to be adherent and accept what the group agreed about of criterion.
 
... Show MoreThe possibility of using zero-valent iron as permeable reactive barrier in removing lead from a contaminated groundwater was investigated. In the batch tests, the effects of many parameters such as contact time between adsorbate and adsorbent (0-240 min), initial pH of the solution (4-8), sorbent dosage (1-12 g/100 mL), initial metal concentration (50-250 mg/L), and agitation speed
(0-250 rpm) were studied. The results proved that the best values of these parameters achieve the maximum removal efficiency of Pb+2 (=97%) were 2 hr, 5, 5 g/100 mL, 50 mg/L and 200 rpm respectively. The sorption data of Pb+2 ions on the zero-valent iron have been performed well by Langmuir isotherm model in compared with Freundlich model under the studied
In recent years, the world witnessed a rapid growth in attacks on the internet which resulted in deficiencies in networks performances. The growth was in both quantity and versatility of the attacks. To cope with this, new detection techniques are required especially the ones that use Artificial Intelligence techniques such as machine learning based intrusion detection and prevention systems. Many machine learning models are used to deal with intrusion detection and each has its own pros and cons and this is where this paper falls in, performance analysis of different Machine Learning Models for Intrusion Detection Systems based on supervised machine learning algorithms. Using Python Scikit-Learn library KNN, Support Ve
... Show MoreThis research aims to address the most recent international standard in the field of insurance contracts, the International Financial Reporting Standard (IFRS17) and the theoretical framework of the standard in addition to the most important characteristics of the standard (IFRS17), as well as to identify the paragraphs of the modern standard, with the challenges its application in general and the use of the approach (inputs - operations - outputs) to present the challenges of its application in the Iraqi environment and specifically in the environment of Iraqi insurance sector companies (government), the research is based on the main premise that the identification of the requirements for the application of the International Fin
... Show MoreThis research is devoted to design and implement a Supervisory Control and Data Acquisition system (SCADA) for monitoring and controlling the corrosion of a carbon steel pipe buried in soil. A smart technique equipped with a microcontroller, a collection of sensors and a communication system was applied to monitor and control the operation of an ICCP process for a carbon steel pipe. The integration of the built hardware, LabVIEW graphical programming and PC interface produces an effective SCADA system for two types of control namely: a Proportional Integral Derivative (PID) that supports a closed loop, and a traditional open loop control. Through this work, under environmental temperature of 30°C, an evaluation and comparison were done for
... Show More