The Internet is providing vital communications between millions of individuals. It is also more and more utilized as one of the commerce tools; thus, security is of high importance for securing communications and protecting vital information. Cryptography algorithms are essential in the field of security. Brute force attacks are the major Data Encryption Standard attacks. This is the main reason that warranted the need to use the improved structure of the Data Encryption Standard algorithm. This paper proposes a new, improved structure for Data Encryption Standard to make it secure and immune to attacks. The improved structure of Data Encryption Standard was accomplished using standard Data Encryption Standard with a new way of two key generations. This means the key generation system generates two keys: one is simple, and the other one is encrypted by using an improved Caesar algorithm. The encryption algorithm in the first 8 round uses simple key 1, and from round 9 to round 16, the algorithm uses encrypted key 2. Using the improved structure of the Data Encryption Standard algorithm, the results of this paper increase Data Encryption Standard encryption security, performance, and complexity of search compared with standard Data Encryption Standard. This means the Differential cryptanalysis cannot be performed on the cipher-text.
The present study showed that the caudal fin of adult mosquitofish (Gambusia affinis) is homocercal and rounded . It consists of 22-24 fin rays (Lepidotrichia) . Each fin ray consists of many segments . Some of these rays are short and unbranched whereas others long and branched dichotomously. Pigment cells are shown to be dispersed on the fin and they are condensened at the edges of the fin rays and at the regions of their dichotomy . Histologically the transverse section of the fin is surrounded by a fin membrane (composed of epidermis and dermis)
... Show MoreAbstract
The article is devoted to the study of modal framework of the utterance with the semantics of “disappearance” in modern Russian language. The empirical basis of the study was the works of Russian writers, such as M.A. Bulgakov, F.M. Dostoevsky, A.I. Kuprin., L.M. Leonov, B.L. Pasternak, K.G. Paustovsky, L.N. Tolstoy, I.S. Turgenev and others. The author focuses special attention on the role of the modal component in the formation of the sentences and its modal semantics. A lot attention is paid to the analysis of the reasons of productivity / low productivity in the functioning of the temporal forms of the verbs that form these utterances. The nature of the material of study determined the choice of
... Show MoreAn investigation of the quadrupole deformation of Kr, Sr, Zr, and Mo isotopes has been conducted using the HFB method and SLy4 Skyrme parameterization. The primary role of occupancy of single particle state 2d5/2 in the existence of the weakly bound structure around N=50 is probed. Shell gaps are performed using a few other calculations for the doubly magic number 100Sn using different Skyrme parameterizations. We explore the interplays among neutron pairing strength and neutron density profile in two dimensions, along with the deformations of 100Sn.
Ab – initio restricted Hartree - Fock method within the framework of large unit cell (LUC) formalism is used to investigate the electronic structure of Si and Ge nanocrystals. The surface and core properties are investigated. A large unit cell of 8 atoms is used in the present analysis. Cohesive energy, energy gap, conduction and valence band widths are obtained from the electronic structure calculations. The results are compared with available experimental data and theoretical results of other investigators. The calculated lattice constant is found to be slightly larger than the corresponding experimental value because we use only 8 atoms and we compared the results with that of the bulk crystals, nanoclusters are expected to have str
... Show MoreThere are many problems facing the economic entities as a result of its mass production &variation of its products , the matter which had increased the need & importance of cost accounting which is regarded a main tool for the managerial control.
The actual costing system is unable to meet the contemporary management needs ,so the Standard costing system appear to provide the management with required information to perform its functions by the best use& way.
This research aims to determine the standard cost for the direct material for oil extraction activity by applying it in the north oil company.
Impressed current cathodic protection controlled by computer gives the ideal solution to the changes in environmental factors and long term coating degradation. The protection potential distribution achieved and the current demand on the anode can be regulated to protection criteria, to achieve the effective protection for the system.
In this paper, cathodic protection problem of above ground steel storage tank was investigated by an impressed current of cathodic protection with controlled potential of electrical system to manage the variation in soil resistivity. Corrosion controller has been implemented for above ground tank in LabView where tank's bottom potential to soil was manipulated to the desired set poi
... Show MoreA multivariate multisite hydrological data forecasting model was derived and checked using a case study. The philosophy is to use simultaneously the cross-variable correlations, cross-site correlations and the time lag correlations. The case study is of two variables, three sites, the variables are the monthly rainfall and evaporation; the sites are Sulaimania, Dokan, and Darbandikhan.. The model form is similar to the first order auto regressive model, but in matrices form. A matrix for the different relative correlations mentioned above and another for their relative residuals were derived and used as the model parameters. A mathematical filter was used for both matrices to obtain the elements. The application of this model indicates i
... Show MoreSteganography is a technique of concealing secret data within other quotidian files of the same or different types. Hiding data has been essential to digital information security. This work aims to design a stego method that can effectively hide a message inside the images of the video file. In this work, a video steganography model has been proposed through training a model to hiding video (or images) within another video using convolutional neural networks (CNN). By using a CNN in this approach, two main goals can be achieved for any steganographic methods which are, increasing security (hardness to observed and broken by used steganalysis program), this was achieved in this work as the weights and architecture are randomized. Thus,
... Show MoreThe deployment of UAVs is one of the key challenges in UAV-based communications while using UAVs for IoT applications. In this article, a new scheme for energy efficient data collection with a deadline time for the Internet of things (IoT) using the Unmanned Aerial Vehicles (UAV) is presented. We provided a new data collection method, which was set to collect IoT node data by providing an efficient deployment and mobility of multiple UAV, used to collect data from ground internet of things devices in a given deadline time. In the proposed method, data collection was done with minimum energy consumption of IoTs as well as UAVs. In order to find an optimal solution to this problem, we will first provide a mixed integer linear programming m
... Show MoreIn this paper, image compression technique is presented based on the Zonal transform method. The DCT, Walsh, and Hadamard transform techniques are also implements. These different transforms are applied on SAR images using Different block size. The effects of implementing these different transforms are investigated. The main shortcoming associated with this radar imagery system is the presence of the speckle noise, which affected the compression results.