The evolution of cryptography has been crucial to preservation subtle information in the digital age. From early cipher algorithms implemented in earliest societies to recent cryptography methods, cryptography has developed alongside developments in computing field. The growing in cyber threats and the increase of comprehensive digital communications have highlighted the significance of selecting effective and robust cryptographic techniques. This article reviews various cryptography algorithms, containing symmetric key and asymmetric key cryptography, via evaluating them according to security asset, complexity, and execution speed. The main outcomes demonstrate the growing trust on elliptic curve cryptography outstanding its capabi
... Show MoreIn this paper, the finite element method is used to study the dynamic behavior of the damaged rotating composite blade. Three dimensional, finite element programs were developed using a nine node laminated shell as a discretization element for the blade structure (the same element type is used for damaged and non-damaged structure). In this analysis the initial stress effect (geometric stiffness) and other rotational effects except the carioles acceleration effect are included. The investigation covers the effect speed of rotation, aspect ratio, skew angle, pre-twist angle, radius to length, layer lamination and fiber orientation of composite blade. After modeling a non-damaged rotating composite blade, the work procedure was to ap
... Show MoreWith the development of high-speed network technologies, there has been a recent rise in the transfer of significant amounts of sensitive data across the Internet and other open channels. The data will be encrypted using the same key for both Triple Data Encryption Standard (TDES) and Advanced Encryption Standard (AES), with block cipher modes called cipher Block Chaining (CBC) and Electronic CodeBook (ECB). Block ciphers are often used for secure data storage in fixed hard drives, portable devices, and safe network data transport. Therefore, to assess the security of the encryption method, it is necessary to become familiar with and evaluate the algorithms of cryptographic systems. Block cipher users need to be sure that the ciphers the
... Show MoreThis study attempts to provide an approach analysis for the news, depending on the bases and principles which conceptuality semiotic researchers of this field first of them «A. J. Gremas» for the theory of «narrative discourse analysis», to more clarify we tried to apply it on a published press- news, to concludes the most important steps and methods that are necessary to follows gain more understanding of the press- news.
It is easy to talk about democracy, but it is difficult to practice. We talk about postmodernism, but difficult to be embodied in the ground. Yet, the age of democracy and modernity at the same time prompted the researcher to try to find a media concept for it. It does not mean that this concept has not yet formed. But the rooting of democracy and the approaching of states and groups towards it, made it necessary to by studied again.
The relationship between democracy and the media has made them look like one concept. The existence of one is linked to the existence of the other. The reality is only a linguistic formulation, but the social and cultural aspect is related to democracy origin
... Show More<span lang="EN-US">The use of bio-signals analysis in human-robot interaction is rapidly increasing. There is an urgent demand for it in various applications, including health care, rehabilitation, research, technology, and manufacturing. Despite several state-of-the-art bio-signals analyses in human-robot interaction (HRI) research, it is unclear which one is the best. In this paper, the following topics will be discussed: robotic systems should be given priority in the rehabilitation and aid of amputees and disabled people; second, domains of feature extraction approaches now in use, which are divided into three main sections (time, frequency, and time-frequency). The various domains will be discussed, then a discussion of e
... Show MoreThis paper interest to estimation the unknown parameters for generalized Rayleigh distribution model based on censored samples of singly type one . In this paper the probability density function for generalized Rayleigh is defined with its properties . The maximum likelihood estimator method is used to derive the point estimation for all unknown parameters based on iterative method , as Newton – Raphson method , then derive confidence interval estimation which based on Fisher information matrix . Finally , testing whether the current model ( GRD ) fits to a set of real data , then compute the survival function and hazard function for this real data.
The aim of the present work is the synthesis of new carbohydrate derivatives containing 1,2,4-triazole from D-fructose . To obtain these derivatives, the diacetone fructose (1 ) was chosen as the starting material, which was obtained from the reaction of anhydrous fructose with dry acetone in presence of anhydrous ferric chloride. Oxidation of ( 1) with potassium permanganate in potassium hydroxide solution gave the acid ( 2). Esterification of the acid with dimethyl sulphate gave the methyl ester (3 ). Treatment of the methyl ester (3 ) with hydrazine hydrate gave the hydrazide (4 ), which is the desired Chiron. The hydrazide (4 ) was used for the preparation of 1,2,4-triazole-5-one (6 ) derivative. These compounds was synthesized by the i
... Show MoreThe aim of this work is to calculate the one- electron expectation value of the electronic charge of atomic system Z=2,3….7 and we compare with He atom . the electronic density function D(r1) of He atom and like ions are evaluated . using Hartree –Fock wave.