Open Access Short Research Article
Uzo Izuchukwu Uchenna, Ugboaja Samuel Gregory, Ugwu Nnaemeka Virginus, Obayi Adaora Angela, Chigbundu Kanu Enyioma, Nnamdi Johnson Ezeora, Okwueze Chisom Nneoma, Anigbogu Kenechukwu, Ihedioha Uchechi Michael
Communication networks makes it easier to connect internationally in today's world. Chat systems, such as WhatsApp, Twitter, Instagram and others, enable people to connect and chat over the internet. This chat system has evolved into one of the most important intermediate tools for people to exchange information and materials over the internet, thereby requiring secured socket system. In a social cultural environment, communication with a given network goal system necessitates a stress-free method of knowledge delivery. Surfing websites like "My Room" and "Facebook" has become a common occurrence among the younger generation. Nowadays, social networking websites are an important part of people's social, educational, and professional lives. The aim of this study is to create a group communication framework that uses a protected socket browser interface. This architecture was created with a server scripting language, a SQLite database model, and Python web application frameworks in mind.
Open Access Original Research Article
Ali Muhammad Ali Rushdi, Motaz Hussain Amashah
This paper deals with an emergent variant of the classical problem of computing the probability of the union of n events, or equivalently the expectation of the disjunction (ORing) of n indicator variables for these events, i.e., the probability of this disjunction being equal to one. The variant considered herein deals with multi-valued variables, in which the required probability stands for the reliability of a multi-state delivery network (MSDN), whose binary system success is a two-valued function expressed in terms of multi-valued component successes. The paper discusses a simple method for handling the afore-mentioned problem in terms of a standard example MSDN, whose success is known in minimal form as the disjunction of prime implicants or minimal paths of the pertinent network. This method utilizes the multi-state inclusion-exclusion (MS-IE) principle associated with a multi-state generalization of the idempotency property of the ANDing operation. The method discussed is illustrated with a detailed symbolic example of a real-case study, and it produces a more precise version of the same numerical value that was obtained earlier. The example demonstrates the notorious shortcomings and the extreme inefficiency that the MS-IE method suffers, but, on the positive side, it reveals the way to alternative methods, in which such a shortcoming is (partially) mitigated. A prominent and well known example of these methods is the construction of a multi-state probability-ready expression (MS-PRE). Another candidate method would be to apply the MS-IE principle to the union of fewer (factored or composite) paths that is converted (at minimal cost) to PRE form. A third candidate method, employed herein, is a novel method for combining the MS-PRE and MS-IE concepts together. It confines the use of MS-PRE to ‘shellable’ disjointing of ORed terms, and then applies MS-IE to the resulting partially orthogonalized disjunctive form. This new method makes the most of both MS-PRE and MS-IE, and bypasses the troubles caused by either of them. The method is illustrated successfully in terms of the same real-case problem used with the conventional MS-IE.
Open Access Review Article
Bahzad Taha Jijo, Subhi R. M. Zeebaree, Rizgar R. Zebari, Mohammed A. M. Sadeeq, Amira B. Sallow, Sanaa Mohsin, Zainab Salih Ageed
Physical layer protection, which protects data confidentiality using information-theoretic methods, has recently attracted a lot of research attention. Using the inherent randomness of the transmission channel to ensure protection in the physical layer is the core concept behind physical layer security. In 5G wireless communication, new challenges have arisen in terms of physical layer security. This paper introduces the most recent survey on various 5G technologies, including millimeter-Wave, massive multi-input multiple outputs, microcells, beamforming, full-duplex technology, etc. The mentioned technologies have been used to solve this technology, such as attenuation, millimeter-Wave penetration, antenna array architecture, security, coverage, scalability, etc. Besides, the author has used descriptions of the techniques/algorithms, goals, problems, and meaningful outcomes, and the results obtained related to this approach were demonstrated.
Open Access Review Article
Zainab Salih Ageed, Subhi R. M. Zeebaree, Mohammed A. M. Sadeeq, Maiwan B. Abdulrazzaq, Baraa Wasfi Salim, Azar Abid Salih, Hajar Maseeh Yasin, Awder Mohammed Ahmed
In this study, the significance and necessities of surveillance systems have been investigated in several areas - both in the use of neural networks, street lighting systems, factories, and laboratories - for the monitoring systems, especially concerning the design of artificial intelligence programs. The importance of these initiatives and how they can affect any sector and industry reach an essential point from here. Here we reach an important point. An algorithm and an extraordinary approach have been used in every field to develop an intelligent programmer. Something has been mentioned here: the ability to access these intelligent programs in all areas of life. We concentrate on a variety of fields of use and design of monitoring systems in this review article.
Open Access Review Article
Hajar Maseeh Yasin, Adnan Mohsin Abdulazeez
Image compression is an essential technology for encoding and improving various forms of images in the digital era. The inventors have extended the principle of deep learning to the different states of neural networks as one of the most exciting machine learning methods to show that it is the most versatile way to analyze, classify, and compress images. Many neural networks are required for image compressions, such as deep neural networks, artificial neural networks, recurrent neural networks, and convolution neural networks. Therefore, this review paper discussed how to apply the rule of deep learning to various neural networks to obtain better compression in the image with high accuracy and minimize loss and superior visibility of the image. Therefore, deep learning and its application to different types of images in a justified manner with distinct analysis to obtain these things need deep learning.