This study aims to enhance the RC5 algorithm to improve encryption and decryption speeds in devices with limited power and memory resources. These resource-constrained applications, which range in size from wearables and smart cards to microscopic sensors, frequently function in settings where traditional cryptographic techniques because of their high computational overhead and memory requirements are impracticable. The Enhanced RC5 (ERC5) algorithm integrates the PKCS#7 padding method to effectively adapt to various data sizes. Empirical investigation reveals significant improvements in encryption speed with ERC5, ranging from 50.90% to 64.18% for audio files and 46.97% to 56.84% for image files, depending on file size. A substantial improvement of 59.90% is observed for data files sized at 1500000kb. Partitioning larger files notably reduces encryption time, while smaller files experience marginal benefits. Certain file types benefit from both strategies. Evaluation metrics include encryption execution time and throughput, consistently demonstrating ERC5's superiority over the original RC5. Moreover, ERC5 exhibits reduced power consumption and heightened throughput, highlighting its multifaceted benefits in resource-constrained environments. ERC5 is developed and tested on various file types and sizes to evaluate encryption speed, power consumption, and throughput. ERC5 significantly improves encryption speed across different file types and sizes, with notable gains for audio, image, and large data files. While partitioning smaller files only slightly improves encryption time, larger files partitioning yields faster results. Future research could explore ERC5 optimizations for different computing environments, its integration into real-time encryption scenarios, and its impact on other cryptographic operations and security protocols.
A statistical optical potential has been used to analyze and
evaluate the neutron interaction with heavy nuclei 197Au at the
neutron energy range (1-20 MeV). Empirical formulae of the optical
potentials parameters are predicted by using ABAREX Code with
minimize accuracy compared with experimental bench work data.
The total elastic, absorption, shape elastic and total compound crosssections are calculated for different target nuclei and different
incident neutron energies to predict the appropriate optical
parameters that suit the present interaction. Also the dispersion
relation linking between real and imaginary potential is analyzed
with more accuracy. The results indicate the behavior of the
dispersion c
The nucleon momentum distributions (NMD) for the ground state and elastic electron scattering form factors have been calculated in the framework of the coherent fluctuation model and expressed in terms of the weight function (fluctuation function). The weight function has been related to the nucleon density distributions of nuclei and determined from theory and experiment. The nucleon density distributions (NDD) is derived from a simple method based on the use of the single particle wave functions of the harmonic oscillator potential and the occupation numbers of the states. The feature of long-tail behavior at high momentum region of the NMD has been obtained using both the theoretical and experimental weight functions. The observed ele
... Show MoreEcological risk assessment of mercury contaminant has a means to analyze the ecological risk aspect of ecosystem using the potential impact of mercury pollution in soil, water and organism. The ecological risk assessment in a coastal area can be shown by mangrove zonation, clustering and interpolation of mercury accumulation. This research aims to analyze ecological risk assessment of potential mercury (including bioaccumulation and translocation) using indicators of species distribution, clustering, zonation and interpolation of mercury accumulation. The results showed that the Segara Anakan had a high risk of mercury pollution, using indicators like as the potential of mercury contaminant in water body was 0137±0.0137 ppm, substrate a
... Show MoreThis paper predicts the resilient modulus (Mr) for warm mix asphalt (WMA) mixtures prepared using aspha-min. Various predictor variables were analyzed, including asphalt cement types, asphalt contents, nominal maximum aggregate sizes (NMAS), filler content, test temperatures, and loading times. Univariate and multivariate analyses were conducted to examine the behavior of each predictor variable individually and collectively. Through univariate analysis, it was observed that Mr exhibited an inverse trend with asphalt cement grade, NMAS, test temperature, and load duration. Although Mr increased slightly with higher filler and asphalt content, the magnitude of this increase was minimal. Multivariate analysis revealed that the rate of change
... Show MoreAnomaly detection is still a difficult task. To address this problem, we propose to strengthen DBSCAN algorithm for the data by converting all data to the graph concept frame (CFG). As is well known that the work DBSCAN method used to compile the data set belong to the same species in a while it will be considered in the external behavior of the cluster as a noise or anomalies. It can detect anomalies by DBSCAN algorithm can detect abnormal points that are far from certain set threshold (extremism). However, the abnormalities are not those cases, abnormal and unusual or far from a specific group, There is a type of data that is do not happen repeatedly, but are considered abnormal for the group of known. The analysis showed DBSCAN using the
... Show MoreBrain Fingerprinting (BF) is one of the modern technologies that rely on artificial intelligence in the field of criminal evidence law. Brain information can be obtained accurately and reliably in criminal procedures without resorting to complex and multiple procedures or questions. It is not embarrassing for a person or even violates his human dignity, as well as gives immediate and accurate results. BF is considered one of the advanced techniques related to neuroscientific evidence that relies heavily on artificial intelligence, through which it is possible to recognize whether the suspect or criminal has information about the crime or not. This is done through Magnetic Resonance Imaging (EEG) of the brain and examining
... Show MoreIn this paper, a simple fast lossless image compression method is introduced for compressing medical images, it is based on integrates multiresolution coding along with polynomial approximation of linear based to decompose image signal followed by efficient coding. The test results indicate that the suggested method can lead to promising performance due to flexibility in overcoming the limitations or restrictions of the model order length and extra overhead information required compared to traditional predictive coding techniques.
One of the prominent goals of Metrical Phonology Theory is providing stress of poetry on the syllable-, the foot-, and the phonological word- levels. Analysing poetry is one of the most prominent and controversial issues for the involved number and types of syllables, feet, and meters are stable in poetry compared to other literary texts. The prosodic seeds of the theory have been planted by Firth (1948) in English, while in Arabic يديهارفلا in the second half of the eighth century (A.D.) has done so. Investigating the metrical structure of poetry has been conducted in various languages, whereas scrutinising the metrical structure of English and Arabic poetry has received little attention. This study aims at capturing the
... Show MoreForm the series of generalization of the topic of supra topology is the generalization of separation axioms . In this paper we have been introduced (S * - SS *) regular spaces . Most of the properties of both spaces have been investigated and reinforced with examples . In the last part we presented the notations of supra *- -space ( =0,1) and we studied their relationship with (S * - SS *) regular spaces.
This paper deals with the thirteenth order differential equations linear and nonlinear in boundary value problems by using the Modified Adomian Decomposition Method (MADM), the analytical results of the equations have been obtained in terms of convergent series with easily computable components. Two numerical examples results show that this method is a promising and powerful tool for solving this problems.