suggested strategy
Recently Published Documents


TOTAL DOCUMENTS

113
(FIVE YEARS 55)

H-INDEX

8
(FIVE YEARS 2)

Author(s):  
Ahmed h. Alahmadi

AbstractThe key exchange mechanism in this paper is built utilizing neural network coordination and a hyperchaotic (or chaotic) nonlinear dynamic complex system. This approach is used to send and receive sensitive data between Internet-of-Things (IoT) nodes across a public network. Using phishing, Man-In-The-Middle (MITM), or spoofing attacks, an attacker can easily target sensitive information during the exchange process. Furthermore, minimal research has been made on the exchange of input seed values for creating identical input at both ends of neural networks. The proposed method uses a 5D hyperchaotic or chaotic nonlinear complex structure to ensure the sharing of input seed value across two neural networks, resulting in the identical input on both ends. This study discusses two ways for sharing seed values for neural coordination. The first is a chaotic system with all real variables, whereas the second is a hyperchaotic system with at least one complex variable. Each neural network has its own random weight vector, and the outputs are exchanged. It achieves full coordination in some stages by altering the neuronal weights according to the mutual learning law. The coordinated weights are utilized as a key after the neural coordination technique. The network’s core structure is made up of triple concealed layers. So, determining the inner configuration will be tough for the intruder. The efficiency of the suggested model is validated by simulations, and the findings reveal that the suggested strategy outperforms current equivalent techniques.


2022 ◽  
Vol 1 ◽  
Author(s):  
Leonid A. Dombrovsky

The most interesting, but insufficiently known results obtained by the author in modeling laser-induced hyperthermia of human tumors are discussed. It is important that the traditional equation for the local bio-heat transfer does not work in superficial layers of the body. It is shown also that the classical Arrhenius law is not applicable to living tissues because of the tissue regeneration due to oxygen supplied by the arterial blood. The latter is one of the main reasons of the suggested strategy of laser heating of tumors in the therapeutic window of semitransparency when the tumor asphyxiation is considered as one of important weapons against the cancer. The other advantages of this advanced strategy of a soft thermal treatment (in few of sessions), which is painless for patients, are discussed as well. Some features of modeling various heat transfer modes are also considered. The best choice between the simplest differential models for the radiative transfer calculations is dependent of the particular problem statement. The known finite-difference or finite element algorithms can be preferable in solving transient heat transfer problems. As a rule, it depends on the shape of the computational region. It is expected that this paper will help the colleagues to overcome some typical weaknesses of computational modeling of infrared photothermal treatment of superficial tumors.


2021 ◽  
Vol 29 ◽  
Author(s):  
◽  

The aim of the current research is to identify the effectiveness of a proposed strategy according to visual thinking in the achievement of physics and mental sharpness among fifth- grade biology student , by verifying the following null hypothesis : there is no difference or statistical significance at the level ( 0.05 ) average scores of the experimental group students which was studied according suggested strategy and the average scores of the students of the control group who studied in the usual way at the level of achievement in physics and mental sharpness . The research limited for fifth grade biology students in the middle and high schools of the day affiliated to the directorate of education Al-Diwaniyah center for the academic year ( 2020 – 2021 ) , the research chose Al-Zaytoun high school intentionally , then two division were chosen out of four divisions for the fifth grade biology were randomly selected , the sample number was ( 71 ) students , and by ( 35 ) students for the control group , which studied in the usual way and ( 36 ) students for the experimental group , which studied according to the proposed strategy , the pilot and officer groups have been equal in a number of variables are the time-old in the months of the semi-year test degree with physics and previous information , for the purpose of achieving my research goals , researchers adopted a threat to a multi-choice (35) paragraph , the test was verified and its stability was also verified as the discriminatory force was calculated for its paragraphs , the mental acuity test was also built , which consisted of (45) items distributed over 3 sub-dimensions , the validity and reliability of the test were verified , and the discriminatory power of the items was calculated , the results showed the superiority of the students of the experimental group that studied according to the proposed strategy over the students of the control group that studied in the usual away in achievement in physics and mental acuity for the fifth grade biology students , thus , the null hypothesis was rejected accordingly, the researchers recommended using the proposed strategy in teaching physics and suggested conducting other studies for other stages of study and different study subjects to know the effectiveness of the proposed .


Author(s):  
Urooj Akram ◽  
Aly. R. Seadawy ◽  
Syed T. R. Rizvi ◽  
Muhammad Younis ◽  
Ali Althobaiti

This paper focuses on the Davey–Stewartson (DS)-II equation, and the extended modified auxiliary equation mapping (EMAEM) architectonic is used to develop a new set of solutions such as kink, singular kink, rational, combined soliton-like solutions, bell-type solutions, trigonometric and hyperbolic solutions. Furthermore, this study reveals that the used technique is efficient for solving other nonlinear evolution equations (NLEEs). The Painleve test ([Formula: see text]-test) will also be used to examine the integrability of the DS-II equation. Finally, graphical simulations are designed to show the exact behavior of solutions as well as the efficacy of the suggested strategy.


Author(s):  
Luigi Vito Stefanelli ◽  
Alessio Franchina ◽  
Andrea Pranno ◽  
Gerardo Pellegrino ◽  
Agnese Ferri ◽  
...  

Objectives: The use of digital devices is strongly influencing the dental rehabilitation workflow both for single-crown rehabilitation and for full-arch prosthetic treatments. Methods: In this study, trueness was analyzed by overlapping the scan dataset made with Medit I-500 (by using two different tips and two different scan strategies) with the scan dataset made with lab scanning, and the values of the (90°–10°)/2 method were reported. Precision was evaluated by using the same values of trueness coming from the intra-group overlapping (scan dataset made with an IOS overlapped and compared to each other). Moreover, two different software programs of overlapping were used to calculate accuracy values. Results: The mean difference of trueness was 26.61 ± 5.07 µm with the suggested strategy of intraoral scanning and using a new design of the tip, 37.99 ± 4.94 µm with the suggested strategy of intraoral scanning and using the old design of the tip, and 51.22 ± 6.57 µm with a new strategy of intraoral scanning and using the old design of the tip. The mean difference of precision was 23.57 ± 5.77 µm with the suggested strategy of intraoral scanning and using a new design of the tip, 38.34 ± 11.39 µm with the suggested strategy of intraoral scanning and using the old design of the tip, and 46.93 ± 7.15 µm with a new strategy of intraoral scanning and using the old design of the tip. No difference was found in the trueness and precision data extracted using the two different programs of superimposition Geomagic Control X and Medit Compare. Conclusions: The outcomes of this study showed that the latest version of I-Medit 500 with the use of a new tip seems to be promising in terms of accuracy when a full arch needs to be scanned. Moreover, Medit Compare, which is an application of Medit IOS software, can be used to calculate IOS accuracy.


2021 ◽  
Vol 13 (4) ◽  
pp. 49
Author(s):  
Amin Ali AlAzzam-Khraiwish ◽  
Ahmed M. Bataineh ◽  
Ayman H. Alzyod

The aim of this study is to investigate the effect of using WhatsApp on developing fifth grade EFL students’ speaking skill during the first semester of the academic year 2020-2021. To achieve this purpose, the researchers selected carefully a representative sample of 46 male students studying at Jijin Secondary School for Boys. The participants were already divided into two groups; a control group of 21 students and an experimental one of 25 students.This study tended to apply this experiment by using the quasi-experimental method. The instrument was a performance test in a shape of an interview that was used as a pre-test and a post-test. Moreover, this test was used to measure any possible differences between the both groups. The results of the study indicated that there were statistically significant differences between both of the groups and the mean scores, in favor of the experimental one in speaking due to the suggested strategy of using WhatsApp.In the light of the findings, the researchers recommend the necessity of implementing contemporary strategies such as WhatsApp in teaching and learning English speaking skill. Besides, the researchers suggest that further studies should be conducted on the effect of WhatsApp on developing other English language skills and in other language competences.


2021 ◽  
Vol 23 (07) ◽  
pp. 876-885
Author(s):  
Haripriya Sargoch ◽  

During the last 15 years, multi-objective mathematical programming has been one of the fastest developing fields of personal view. Following the use of evolutionary methods over single-objective optimization for a longer period of time, more than two decades, the wellness industry has incorporated several goals. The function has finally gained attention as a field of science. As a result, many people variations of current strategies and new evolutionary-based methods have been developed. In the scientific articles, it was recently written. In this paper, we suggest a multi-objective optimization algorithm that is based on antibody production theorem (either constrained or unconstrained). The aim of this paper is to summarise and compile details on these existing methods, stressing the relevance of analyzing operations analysis strategies, which are used by the majority of them. In an effort to entice scholars to explore these problems, they are focused. Approaches to mathematical analysis for new ways to utilize the scope evolved algorithms’ features. An overview of the key algorithms behind these methods is also given, as well as a short critique that includes their benefits and drawbacks, applicability, and some recommendations applications that are well-known. Finally, future developments in this field are discussed, as well as any potential future directions, additional analysis is also being considered. According to the findings, the suggested strategy seems to be a feasible solution for solving multi-objective optimization problems.


2021 ◽  
Vol 35 (3) ◽  
pp. 217-222
Author(s):  
Benamar Bouougada ◽  
Djelloul Bouchiha ◽  
Redha Rebhi ◽  
Ali Kidar ◽  
Giulio Lorenzini ◽  
...  

Ontology is an important aspect of the semantic web, which is why semantic web developers are interested in constructing ontology in various applications based on domain experts. By transforming an existing application database into ontology, we many construct ontologies without having to hire an expert in the field. Model-driven engineering is the foundation of the suggested strategy (MDE). In a nutshell, the technique is divided into two phases, the first of which attempts to prepare the data needed for the transformation in the form of a model with a database. A compliance relationship between this model and its meta-model is required. Phase (2) applies a set of rules written in the Atlas Transformational Language to change the model produced in the first phase into another model, which is an OWL ontology (ATL). We tested our solution using a set of databases created specifically for this purpose and built it in an eclipse environment using an EMF and ATL transform language. The acquired findings demonstrate the strength and efficacy of the recommended strategy.


Author(s):  
Dinesh Kumar ◽  
Kailash Patidar ◽  
Gourav Saxena ◽  
Rishi Kushwaha

Visual encryption technology becomes the latest research area in which a lot of scopes persist. Presently such a particular cryptosystem procedure is now used by numerous other countries around the world for the private transmission of formal records, financial documents, content visuals, digital voting, and so on. Visualization Cryptographic algorithms one of the protected methods of transferring pictures online. The main benefit of image encryption has been that it disguises peripheral vision with encrypt data secret data with no computation usually needed. In this work a hybrid visual cryptography method using a sigmoid function (HVMSF) for enhancing the security in gray images. HVMSF strategy utilizes a chaos framework to scramble pixel values as well as blocks while using the Modified Arnold Cat Map method (MACM) as well as the Henon Map method (HMM). The methodology includes a confusion procedure wherein the location of each image pixel is shuffled by utilizing MACM. The shuffling of image pixel leads to the creation of a subset pixel which will be protected for transmitting. This proposed HVMSF mainly tries to overcome the limitation of the previous approaches by applying sigmoid function in image feature space for contrast enhancement throughout the consequent source images. The experimental outcomes precisely show that the suggested strategy can further give additional effectiveness to ensure the protection of transmitting information out over previous techniques.


Author(s):  
Dinesh Kumar ◽  
◽  
Kailash Patidar ◽  
Mr. Gourav Saxena ◽  
Mr. Rishi Kushwaha ◽  
...  

Visual encryption technology becomes the latest research area in which a lot of scopes persist. Presently such a particular cryptosystem procedure is now used by numerous other countries around the world for the private transmission of formal records, financial documents, content visuals, digital voting, and so on. Visualization Cryptographic algorithms one of the protected methods of transferring pictures online. The main benefit of image encryption has been that it disguises peripheral vision with encrypt data secret data with no computation usually needed. In this work a hybrid visual cryptography method using a sigmoid function (HVMSF) for enhancing the security in gray images. HVMSF strategy utilizes a chaos framework to scramble pixel values as well as blocks while using the Modified Arnold Cat Map method (MACM) as well as the Henon Map method (HMM). The methodology includes a confusion procedure wherein the location of each image pixel is shuffled by utilizing MACM. The shuffling of image pixel leads to the creation of a subset pixel which will be protected for transmitting. This proposed HVMSF mainly tries to overcome the limitation of the previous approaches by applying sigmoid function in image feature space for contrast enhancement throughout the consequent source images. The experimental outcomes precisely show that the suggested strategy can further give additional effectiveness to ensure the protection of transmitting information out over previous techniques.


Sign in / Sign up

Export Citation Format

Share Document