Data security is a fundamental parameter on communication system development. The capability of protecting and securing the information is a great essence for the growth of the data security and electronic commerce. The cryptography has a significant influence upon information security systems against the variety of the attacks, in which higher complexity in secret keys results in the increase of security and the cryptography algorithms’ complexity. The sufficient and newer cryptographic methods’ versions may helpful in the reduction of the security attacks. The main aim of this research is satisfying the purpose of the information security through the addition of a new security level to the Advanced Encryption Standard (AES) algorithm by combining it with two other efficient encryption algorithms Number Theory Research Unit (NTRU), and Improved Hill Cipher (IHC). This aim achieved by using Advanced Encryption Standard (AES) followed by improved Hill Cipher (IHC) algorithm to encrypt and decrypt text in addition to use Number Theory Research Unit (NTRU) for the encryption and decryption of the AES key. The obtained results of this research have sufficient resistance to the brute-force attacks, and that makes this system more effective. Also, these modifications of AES architecture result in enhancing the complexity degree, increasing the search space of the key, and making the cipher-message too difficult to crack by attackers.
As one type of resistance furnace, the electrical tube furnace (ETF) typically experiences input noise, measurement noise, system uncertainties, unmodeled dynamics and external disturbances, which significantly degrade its temperature control performance. To provide precise, and robust temperature tracking performance for the ETF, a robust composite control (RCC) method is proposed in this paper. The overall RCC method consists of four elements: First, the mathematical model of the ETF system is deduced, then a state feedback control (SFC) is constructed. Third, a novel disturbance observer (DO) is designed to estimate the lumped disturbance with one observer parameter. Moreover, the stability of the closed loop system including controller
... Show MoreAbstract
In this paper, the solutions to class of robust non-linear semi-explicit descriptor control systems with matching condition via optimal control strategy are obtained. The optimal control strategy has been introduced and developed in the sense that, the optimal control solution is robust solution to the given non-linear uncertain semi-explicit descriptor control system. The necessary mathematical proofs and remarks as well as discussions are also proposed. The present approach is step-by-step illustrated by application example to show its effectiveness a and efficiency to compensate the structure uncertainty in the given semi-explicit (descriptor) control
... Show MoreCluster analysis (clustering) is mainly concerned with dividing a number of data elements into clusters. The paper applies this method to create a gathering of symmetrical government agencies with the aim to classify them and understand how far they are close to each other in terms of administrative and financial corruption by means of five variables representing the prevalent administrative and financial corruption in the state institutions. Cluster analysis has been applied to each of these variables to understand the extent to which these agencies are close to other in each of the cases related to the administrative and financial corruption.
Flexible joint robot (FJR) manipulators can offer many attractive features over rigid manipulators, including light weight, safe operation, and high power efficiency. However, the tracking control of the FJR is challenging due to its inherent problems, such as underactuation, coupling, nonlinearities, uncertainties, and unknown external disturbances. In this article, a terminal sliding mode control (TSMC) is proposed for the FJR system to guarantee the finite-time convergence of the systems output, and to achieve the total robustness against the lumped disturbance and estimation error. By using two coordinate transformations, the FJR dynamics is turned into a canonical form. A cascaded finite-time sliding mode observer (CFTSMO) is construct
... Show MoreAbstract. Full-waveform airborne laser scanning data has shown its potential to enhance available segmentation and classification approaches through the additional information it can provide. However, this additional information is unable to directly provide a valid physical representation of surface features due to many variables affecting the backscattered energy during travel between the sensor and the target. Effectively, this delivers a mis-match between signals from overlapping flightlines. Therefore direct use of this information is not recommended without the adoption of a comprehensive radiometric calibration strategy that accounts for all these effects. This paper presents a practical and reliable radiometric calibration r
... Show MoreRemoval of heavy metals from waste water has received a great deal of attention. The compare Cr
(VI) adsorption characteristics removing from wastewater by using thermally modified and non-modified
eggshells were examined
Most recent studies have focused on using modern intelligent techniques spatially, such as those
developed in the Intruder Detection Module (IDS). Such techniques have been built based on modern
artificial intelligence-based modules. Those modules act like a human brain. Thus, they should have had the
ability to learn and recognize what they had learned. The importance of developing such systems came after
the requests of customers and establishments to preserve their properties and avoid intruders’ damage. This
would be provided by an intelligent module that ensures the correct alarm. Thus, an interior visual intruder
detection module depending on Multi-Connect Architecture Associative Memory (MCA)
This research aims to realize one of the pillars of Saudi vision (2030) through searching for new sources full of material folklore that had not previously been studied, so this study will study folk motifs engraved on the doors and windows in the Bani Amru Center in the Al-Namas governorate that is situated in the Asir region , in particular the tribe (Bani Rafe), before being disappeared due to the abandonment of the old architecture by the people of the region and their fascination with modern architecture, therefore I must as one of the people of the region document and preserve that through studying, analyzing, classifying it, then inspiring typed paintings using a new technical typing that have not yet been used in the Kingd
... Show MoreThe current research is interested in studying the symbol, due to its significant role in the architecture and arts in the holy shrines regardless of their architecture and artistic patterns, through which the symbolic and philosophical connotations insides the holy shrines are revealed. Due to the importance of the topic of the symbol, Almighty God remarked in the holy Quran (He said, "My Lord, make for me a sign." He Said, "Your sign is that you will not [be able to] speak to the people for three days except by gesture. And remember your Lord much and exalt [Him with praise] in the evening and the morning.") (Surat Al-Imran, verse 41). The research consists of two dimensions dealing with symbol and symbolism in its linguistic an
... Show MoreThe concept of aesthetics is one of the postmodern propositions, and it is one of the branches of philosophy that examines beauty, its standards and theories, and it is a holistic concept that includes several concepts, including the beautiful, the ugly, and the sublime.
The concept of aesthetics dealt with several studies in general (and in the field of architecture in particular), and the problem of aesthetics is in the blurring of the relationship between aesthetics and architectural criticism, based on the research hypothesis which states that there is a relationship between aesthetics and architectural criticism. The importance of the research in accommodating aesthetic standards and bases of evaluation that increases the possi