Protecting information sent through insecure internet channels is a significant challenge facing researchers. In this paper, we present a novel method for image data encryption that combines chaotic maps with linear feedback shift registers in two stages. In the first stage, the image is divided into two parts. Then, the locations of the pixels of each part are redistributed through the random numbers key, which is generated using linear feedback shift registers. The second stage includes segmenting the image into the three primary colors red, green, and blue (RGB); then, the data for each color is encrypted through one of three keys that are generated using three-dimensional chaotic maps. Many statistical tests (entropy, peak signa
... Show MoreIntrusion detection system is an imperative role in increasing security and decreasing the harm of the computer security system and information system when using of network. It observes different events in a network or system to decide occurring an intrusion or not and it is used to make strategic decision, security purposes and analyzing directions. This paper describes host based intrusion detection system architecture for DDoS attack, which intelligently detects the intrusion periodically and dynamically by evaluating the intruder group respective to the present node with its neighbors. We analyze a dependable dataset named CICIDS 2017 that contains benign and DDoS attack network flows, which meets certifiable criteria and is ope
... Show MoreThe aim of this paper is to present a new methodology to find the private key of RSA. A new initial value which is generated from a new equation is selected to speed up the process. In fact, after this value is found, brute force attack is chosen to discover the private key. In addition, for a proposed equation, the multiplier of Euler totient function to find both of the public key and the private key is assigned as 1. Then, it implies that an equation that estimates a new initial value is suitable for the small multiplier. The experimental results show that if all prime factors of the modulus are assigned larger than 3 and the multiplier is 1, the distance between an initial value and the private key
... Show MoreA remarkable correlation between chaotic systems and cryptography has been established with sensitivity to initial states, unpredictability, and complex behaviors. In one development, stages of a chaotic stream cipher are applied to a discrete chaotic dynamic system for the generation of pseudorandom bits. Some of these generators are based on 1D chaotic map and others on 2D ones. In the current study, a pseudorandom bit generator (PRBG) based on a new 2D chaotic logistic map is proposed that runs side-by-side and commences from random independent initial states. The structure of the proposed model consists of the three components of a mouse input device, the proposed 2D chaotic system, and an initial permutation (IP) table. Statist
... Show MoreThis article proposes a new strategy based on a hybrid method that combines the gravitational search algorithm (GSA) with the bat algorithm (BAT) to solve a single-objective optimization problem. It first runs GSA, followed by BAT as the second step. The proposed approach relies on a parameter between 0 and 1 to address the problem of falling into local research because the lack of a local search mechanism increases intensity search, whereas diversity remains high and easily falls into the local optimum. The improvement is equivalent to the speed of the original BAT. Access speed is increased for the best solution. All solutions in the population are updated before the end of the operation of the proposed algorithm. The diversification f
... Show MoreLow conversion copolymerization of N-vinyl-2-pyrrolidon M.W = (111.14) VP (monomer-1) has been conducted with acrylic acid AA and methymethacrylate MMA in ethanol at 70ºC , using Benzoyl peroxide BPO as initiator . The copolymer composition has been determined by elemental analysis. The monomer reactivity ratios have been calculated by the Kelen-Tudos and Finman-Ross graphical procedures . The derived reactivity ratios (r1 , r2 ) are : (0.51 , 4.85) for (VP / AA ) systems and (0.34 , 7.58) for (VP , MMA) systems , and found the reactivity ratios of the monomer AA , MMA is mor than the monomer VP in the copolymerization of (VP / AA) and (VP /MMA) systems respectly . The reactivity ratios values were used for microstructures calculation.
Half of the oil production of the worldwide is a result of the water flooding project. But the main concern of this process is mobility control of the injected fluid, because the unfavorable mobility ratio leads to fingering effect. Adding polymer to the injection water increase the water viscosity, therefore, the displacement will be more stable and have a greater sweep efficiency.
Using of polymer flooding has received more attention these days. Polymer has great potential in the Middle East region, especially in reservoir with high temperature and salinity.
The main objective of this work is to show the effect of shear rate, salinity, temperature, polymer concentration on polymer v
... Show MoreThe monomer phenyl acrylamide was synthesized by reacting acrylamide with chloro benzene in the presence of pyridine. Copolymer of phenyl acrylamide (PAM) with methyl methacrylate (MMA) was synthesized by free radical technique using dimethylsulfoxide (DMSO) as solvent and benzoyl peroxide (BPO) as initiator. The overall conversion was kept low (≤ 15% wt/wt) for all studies copolymers samples. The synthesized copolymers were characterized using fourier transform infrared spectroscopy (FT-IR), and their thermal properties were studied by thermogravimetric analysis (TGA) and differential scanning calorimetry (DSC). The copolymers compositions were determined by elemental analysis. The monomer reactivity ratios have been calculated b
... Show MoreTransactions on Engineering and Sciences