Cipher security is becoming an important step when transmitting important information through networks. The algorithms of cryptography play major roles in providing security and avoiding hacker attacks. In this work two hybrid cryptosystems have been proposed, that combine a modification of the symmetric cryptosystem Playfair cipher called the modified Playfair cipher and two modifications of the asymmetric cryptosystem RSA called the square of RSA technique and the square RSA with Chinese remainder theorem technique. The proposed hybrid cryptosystems have two layers of encryption and decryption. In the first layer the plaintext is encrypted using modified Playfair to get the cipher text, this cipher text will be encrypted using squared
... Show MoreAn Expression for the transition charge density is investigated
where the deformation in nuclear collective modes is taken into
consideration besides the shell model transition density. The
inelastic longitudinal C2 and C4 form factors are calculated using
this transition charge density for the Ne Mg 20 24 , , Si 28 and S 32
nuclei. In this work, the core polarization transition density is
evaluated by adopting the shape of Tassie model togther with the
derived form of the ground state two-body charge density
distributions (2BCDD's). It is noticed that the core polarization
effects which represent the collective modes are essential in
obtaining a remarkable agreement between the calculated inelastic
longi
Inelastic longitudinal electron scattering form factors have been calculated for isoscaler transition
T = 0 of the (0+ ®2+ ) and (0+ ®4+ ) transitions for the 20Ne ,24Mg and 28Si nuclei. Model
space wave function defined by the orbits 1d5 2 ,2s1 2 and 1d3 2 can not give reasonable result for
the form factor. The core-polarization effects are evaluated by adopting the shape of the Tassie-
Model, together with the calculated ground Charge Density Distribution CDD for the low mass 2s-1d
shell nuclei using the occupation number of the states where the sub-shell 2s is included with an
occupation number of protons (a ) .
Many approaches of different complexity already exist to edge detection in
color images. Nevertheless, the question remains of how different are the results
when employing computational costly techniques instead of simple ones. This
paper presents a comparative study on two approaches to color edge detection to
reduce noise in image. The approaches are based on the Sobel operator and the
Laplace operator. Furthermore, an efficient algorithm for implementing the two
operators is presented. The operators have been applied to real images. The results
are presented in this paper. It is shown that the quality of the results increases by
using second derivative operator (Laplace operator). And noise reduced in a good
High peak to average power ration (PAPR) in orthogonal frequency division multiplexing (OFDM) is an important problem, which increase the cost and complexity of high power amplifiers. One of the techniques used to reduce the PAPR in OFDM system is the tone reservation method (TR). In our work we propose a modified tone reservation method to decrease the PAPR with low complexity compared with the conventional TR method by process the high and low amplitudes at the same time. An image of size 128×128 is used as a source of data that transmitted using OFDM system. The proposed method decrease the PAPR by 2dB compared with conventional method with keeping the performance unchanged. The performance of the proposed method is tested with
... Show MoreCryptography algorithms play a critical role in information technology against various attacks witnessed in the digital era. Many studies and algorithms are done to achieve security issues for information systems. The high complexity of computational operations characterizes the traditional cryptography algorithms. On the other hand, lightweight algorithms are the way to solve most of the security issues that encounter applying traditional cryptography in constrained devices. However, a symmetric cipher is widely applied for ensuring the security of data communication in constraint devices. In this study, we proposed a hybrid algorithm based on two cryptography algorithms PRESENT and Salsa20. Also, a 2D logistic map of a chaotic system is a
... Show MoreThe objective of the study is to demonstrate the predictive ability is better between the logistic regression model and Linear Discriminant function using the original data first and then the Home vehicles to reduce the dimensions of the variables for data and socio-economic survey of the family to the province of Baghdad in 2012 and included a sample of 615 observation with 13 variable, 12 of them is an explanatory variable and the depended variable is number of workers and the unemployed.
Was conducted to compare the two methods above and it became clear by comparing the logistic regression model best of a Linear Discriminant function written
... Show More