196 research outputs found

    Using Genetic Algorithm to Break Knapsack Cipher with Sequence Size 16

    Get PDF
    With the growth of networked system and applications such as eCommerce, the demand for effective internetsecurity is increasing. Cryptology is the science and study of systems for secret communication. It consists of twocomplementary fields of study: cryptography and cryptanalysis.The genetic algorithm is one of the search methods, whichfinds the optimal solution. It is one of the methods, which is used to decrypt cipher.This work focuses on using GeneticAlgorithms to cryptanalyse knapsack cipher. The knapsack cipher is with a knapsack sequence of size 16 to encrypt twocharacters together. Different values of parameters have been used: Population size, mutation rate, number of generation

    ASSESSING THE IMPACT OF ARTISTIC ARCHITECTURE ON PERCEIVED USABILITY AND WILLINGNESS TO USE MOBILE COMMERCE APPLICATIONS

    Get PDF
    Creating a useful portable browser or program is a demanding challenge for organisations due to the size constraints of the display area, which additionally is contingent on usability, internet connectivity, efficient backup power and mobility. Users also expect performance equivalent to that of microcomputers. Portable display programmers need to surmount these challenges without compromising users’ concerns for safety and confidentiality. Various works in the past couple of years revealed the ability of a strongly perceived artistic architecture of a mobile website as a push to overcome clients’ reduced  skill. The investigation conducted in this report sought to determine the distinct impact of eight artistic display  on the  of a mobile website or program and the corresponding clients’ . Organisations may thus take advantage of this knowledge to improve usage, trust, frequency of adoption and consequently financial rewards on m-commerce applications. This study uses a  with a screening objective. Data for the experiment was sourced through a web-based questionnaire program, . At the same time, social network sites were used to disseminate the questionnaires to enable gathering a good number of respondents. The data collection instrument had  statements with  threshold for  Ninety-six  participants took part in the inquiry. In contrast, seventy-six  participants completed the exercise, signifying an estimated.  was used in the study of the association concerning the .  package was utilised in the evaluation of the . Findings revealed that artistic architecture bears a substantial impact on  of portable websites and programs as well as influences  artefacts on such platforms. , as well as the  of an application, turned out as two features with the highest impact on the two  factors. That the orientation of their effects is a reverse of the conjectured outcome suggests that future work should explore this issue

    SURVEY OF E-MAIL CLASSIFICATION: REVIEW AND OPEN ISSUES

    Get PDF
    Email is an economical facet of communication, the importance of which is increasing in spite of access to other approaches, such as electronic messaging, social networks, and phone applications. The business arena depends largely on the use of email, which urges the proper management of emails due to disruptive factors such as spams, phishing emails, and multi-folder categorization. The present study aimed to review the studies regarding emails, which were published during 2016-2020, based on the problem description analysis in terms of datasets, applications areas, classification techniques, and feature sets. In addition, other areas involving email classifications were identified and comprehensively reviewed. The results indicated four email application areas, while the open issues and research directions of email classifications were implicated for further investigation

    HOSPITAL PHARMACY MANAGEMENT SYSTEM

    Get PDF
    Generally, the electronic technology has been implemented to automate the traditional systems. So, differentcopy of management systems in different scope were presented. These systems include the services provided to company as wellas people, such as, healthcare. The traditional data management systems for pharmacy as example, suffer fromthe capacity, time consuming, medicines accessibility, managing the medicines store as well as the need of qualifiedstaff according to the requirements of employer expectations. In this paper, a hospital e-pharmacy system is proposed in order to facilitate the job, outdo the mentioned problems. A data management system to the Iraqi hospital's pharmacy is proposed which is divided into two main parts: database, and Graphical User Interface (GUI) frames. The database built using SQL Server contains the pharmacy information relatedto the medicines, patient information….etc. the GUI frames ease the use of the proposed system by unskilled users. Theproposal system is responsible on monitoring and controlling the work of pharmacy in hospital in terms of management ofmedicine issuing ordering and hospital reports

    DESIGN AND IMPLEMENTATION SMART TRAFFIC LIGHT USING GSM AND IR

    Get PDF
    The increasing in the number of vehicles on streets has led to traffic congestion. In order to reduce the waiting timein cases of emergency, the idea of this work is suggested. This work is divided into two parts, the particular part and softwarepart. The first circular particular part is a model which consists of four lanes junction of a traffic light, it also has GSM system (Global System for Mobile Communications). The GSM and lamps of the traffic light are connected to Arduino UNO. TheArduino controls every signal which is coming from the inputs (GSM) to software and display to the outputs (lamps) Thesecond circular particular part is a model which consist same components the first circuit except replace the GSM withIR(infrared Remote).The goal from this work is to help us in the emergence cases, the opening and closing of the traffic light arecontrolled by using GSM system and IR, the time of each lane, is controlled that means reduce the crowding

    REVIEW ON DETECTION OF RICE PLANT LEAVES DISEASES USING DATA AUGMENTATION AND TRANSFER LEARNING TECHNIQUES

    Get PDF
    The most important cereal crop in the world is rice (Oryza sativa). Over half of the world's population uses it as a staple food and energy source. Abiotic and biotic factors such as precipitation, soil fertility, temperature, pests, bacteria, and viruses, among others, impact the yield production and quality of rice grain. Farmers spend a lot of time and money managing diseases, and they do so using a bankrupt "eye" method that leads to unsanitary farming practices. The development of agricultural technology is greatly conducive to the automatic detection of pathogenic organisms in the leaves of rice plants. Several deep learning algorithms are discussed, and processors for computer vision problems such as image classification, object segmentation, and image analysis are discussed. The paper showed many methods for detecting, characterizing, estimating, and using diseases in a range of crops. The methods of increasing the number of images in the data set were shown. Two methods were presented, the first is traditional reinforcement methods, and the second is generative adversarial networks. And many of the advantages have been demonstrated in the research paper for the work that has been done in the field of deep learning

    COMPARATIVE STUDY OF FONT RECOGNITION USING CONVOLUTIONAL NEURAL NETWORKS AND TWO FEATURE EXTRACTION METHODS WITH SUPPORT VECTOR MACHINE

    Get PDF
    Font recognition is one of the essential issues in document recognition and analysis, and is frequently a complex and time-consuming process. Many techniques of optical character recognition (OCR) have been suggested and some of them have been marketed, however, a few of these techniques considered font recognition. The issue of OCR is that it saves copies of documents to make them searchable, but the documents stop having the original appearance. To solve this problem, this paper presents a system for recognizing three and six English fonts from character images using Convolution Neural Network (CNN), and then compare the results of proposed system with the two studies. The first study used NCM features and SVM as a classification method, and the second study used DP features and SVM as classification method. The data of this study were taken from Al-Khaffaf dataset [21]. The two types of datasets have been used: the first type is about 27,620 sample for the three fonts classification and the second type is about 72,983 sample for the six fonts classification and both datasets are English character images in gray scale format with 8 bits. The results showed that CNN achieved the highest recognition rate in the proposed system compared with the two studies reached 99.75% and 98.329 % for the three and six fonts recognition, respectively. In addition, CNN got the least time required for creating model about 6 minutes and 23- 24 minutes for three and six fonts recognition, respectively. Based on the results, we can conclude that CNN technique is the best and most accurate model for recognizing fonts

    Comparing Three Different Algorithms to Estimate Parameters of new Generated Marshal – Olkin Uniform Distribution

    Get PDF
    This paper deals with constructing a new generated Marshal – Olkin Uniform family distribution which include finding the probability density function

    Network Coded Modulation for Two Way Relay Networks

    Get PDF
    Modern wireless networks use cooperative relaying to expand its coverage area. Wireless relaying allows mobile terminals toparticipate in transmission even when these terminals are not being the initial source or final destination. This can be achieved in differentways ranging from simple conventional relaying to more sophisticated coding at terminal and relay nodes to improve transmissionperformance. The proposed work here studied such system by simulating different coding techniques to be used in two way relay networkcoding (TWRC). Some of these techniques were previously proposed to improve transmission performance in conventional datacommunication systems. BER performance of different arrangements of coding and relaying schemes are evaluated using computersimulation tests. Ideal AWGN channel model and standard wireless channel models for wireless networks are considered in the simulationtests. The results have been shown that coding schemes such as Trellis Coded Modulation (TCM) and Repeat Accumulate (RA) codes aremore suitable in two way relaying networks. Over AWGN, TCM-8PSK improves BER performance by at least 2 dB at high SNR fordifferent relaying arrangements. For fading channels, this advantage is slightly reduced. Regenerative repeating at relay node seems to be apromising arrangement. It seems that there is no sense in using RA codes over fading channels due to its poor performance and relativelylower speed caused by repetitions

    Review of Recycling of E-DATA Through Green Computing

    Get PDF
    This century has a progressive evolution in IT. New techniques gadgets and tools are being invented every day. ThisLeeds to consume energy and resources. The planet need a friendly environment in which consuming resources is balanced andtemperature is decreased. So; one of the most important responsibilities of human is providing green industry in order to get apurity environment This paper is a review of a few vital writings identified with the field of green processing that underscoresthe vitality of green registering for reasonable improvement
    • …
    corecore