Data security is a fundamental parameter on communication system development. The capability of protecting and securing the information is a great essence for the growth of the data security and electronic commerce. The cryptography has a significant influence upon information security systems against the variety of the attacks, in which higher complexity in secret keys results in the increase of security and the cryptography algorithms’ complexity. The sufficient and newer cryptographic methods’ versions may helpful in the reduction of the security attacks. The main aim of this research is satisfying the purpose of the information security through the addition of a new security level to the Advanced Encryption Standard (AES) algorithm by combining it with two other efficient encryption algorithms Number Theory Research Unit (NTRU), and Improved Hill Cipher (IHC). This aim achieved by using Advanced Encryption Standard (AES) followed by improved Hill Cipher (IHC) algorithm to encrypt and decrypt text in addition to use Number Theory Research Unit (NTRU) for the encryption and decryption of the AES key. The obtained results of this research have sufficient resistance to the brute-force attacks, and that makes this system more effective. Also, these modifications of AES architecture result in enhancing the complexity degree, increasing the search space of the key, and making the cipher-message too difficult to crack by attackers.
Took apple branches Genuine and Architecture tissue cultured in vitro 3 cm long and planted in the middle of food MS that contains different concentrations of inorganic salts and of Mntmat free growth and incubated Transplanter to study their effect on rooting Aalavra
Beyond the immediate content of speech, the voice can provide rich information about a speaker's demographics, including age and gender. Estimating a speaker's age and gender offers a wide range of applications, spanning from voice forensic analysis to personalized advertising, healthcare monitoring, and human-computer interaction. However, pinpointing precise age remains intricate due to age ambiguity. Specifically, utterances from individuals at adjacent ages are frequently indistinguishable. Addressing this, we propose a novel, end-to-end approach that deploys Mozilla's Common Voice dataset to transform raw audio into high-quality feature representations using Wav2Vec2.0 embeddings. These are then channeled into our self-attentio
... Show MoreA condense study was done to compare between the ordinary estimators. In particular the maximum likelihood estimator and the robust estimator, to estimate the parameters of the mixed model of order one, namely ARMA(1,1) model.
Simulation study was done for a varieties the model. using: small, moderate and large sample sizes, were some new results were obtained. MAPE was used as a statistical criterion for comparison.
Since the Internet has been more widely used and more people have access to multimedia content, copyright hacking, and piracy have risen. By the use of watermarking techniques, security, asset protection, and authentication have all been made possible. In this paper, a comparison between fragile and robust watermarking techniques has been presented to benefit them in recent studies to increase the level of security of critical media. A new technique has been suggested when adding an embedded value (129) to each pixel of the cover image and representing it as a key to thwart the attacker, increase security, rise imperceptibility, and make the system faster in detecting the tamper from unauthorized users. Using the two watermarking ty
... Show MoreModified optical fiber sensors received increasing attention because of their superior properties over electrical sensors. These properties include their immunity towards electromagnetic interference and the ability to be deployed in corrosive and volatile environment. Several optical fiber platforms have been developed for chemical sensing applications based on modifying optical fiber cladding layer such as etched, tapered, D-shaped and etched-tapered. The modifications purpose is to extend the evanescent wave propagating out of the core physical dimensions. Thus, evanescent wave interaction with analyte is enhanced. Modified optical transducing platforms are integrated in gas sensing applications, such as ammonia. Modified optical
... Show More
Nanomaterials have an excellent potential for improving the rheological and tribological properties of lubricating oil. In this study, oleic acid was used to surface-modify nanoparticles to enhance the dispersion and stability of Nanofluid. The surface modification was conducted for inorganic nanoparticles (NPs) TiO₂ and CuO with oleic acid (OA) surfactant, where oleic acid could render the surface of TiO2-CuO hydrophobic. Fourier transform infrared spectroscopy (FTIR), and Scanning electron microscopy (SEM) were used to characterize the surface modification of NPs. The main objective of this study was to investigate the influence of adding modified TiO₂-CuO NPs with weight ratio 1:1 on thermal-physical propertie
... Show More