Symmetric cryptography forms the backbone of secure data communication and storage by relying on the strength and randomness of cryptographic keys. This increases complexity, enhances cryptographic systems' overall robustness, and is immune to various attacks. The present work proposes a hybrid model based on the Latin square matrix (LSM) and subtractive random number generator (SRNG) algorithms for producing random keys. The hybrid model enhances the security of the cipher key against different attacks and increases the degree of diffusion. Different key lengths can also be generated based on the algorithm without compromising security. It comprises two phases. The first phase generates a seed value that depends on producing a randomly predefined set of key numbers of size n via the Donald E. Knuths SRNG algorithm (subtractive method). The second phase uses the output key (or seed value) from the previous phase as input to the Latin square matrix (LSM) to formulate a new key randomly. To increase the complexity of the generated key, another new random key of the same length that fulfills Shannon’s principle of confusion and diffusion properties is XORed. Four test keys for each 128, 192,256,512, and 1024–bit length are used to evaluate the strength of the proposed model. The experimental results and security analyses revealed that all test keys met the statistical National Institute of Standards (NIST) standards and had high values for entropy values exceeding 0.98. The key length of the proposed model for n bits is 25*n, which is large enough to overcome brute-force attacks. Moreover, the generated keys are very sensitive to initial values, which increases the complexity against different attacks.
In this article, the backstepping control scheme is proposed to stabilize the fractional order Riccati matrix differential equation with retarded arguments in which the fractional derivative is presented using Caputo's definition of fractional derivative. The results are established using Mittag-Leffler stability. The fractional Lyapunov function is defined at each stage and the negativity of an overall fractional Lyapunov function is ensured by the proper selection of the control law. Numerical simulation has been used to demonstrate the effectiveness of the proposed control scheme for stabilizing such type of Riccati matrix differential equations.
The aim of this paper is to construct cyclic subgroups of the projective general linear group over from the companion matrix, and then form caps of various degrees in . Geometric properties of these caps as secant distributions and index distributions are given and determined if they are complete. Also, partitioned of into disjoint lines is discussed.
Cluster analysis (clustering) is mainly concerned with dividing a number of data elements into clusters. The paper applies this method to create a gathering of symmetrical government agencies with the aim to classify them and understand how far they are close to each other in terms of administrative and financial corruption by means of five variables representing the prevalent administrative and financial corruption in the state institutions. Cluster analysis has been applied to each of these variables to understand the extent to which these agencies are close to other in each of the cases related to the administrative and financial corruption.
Abstract
The research aimed to prepare an audit program focusing on the activities of municipal institutions related to the environmental dimension as one of the dimensions of sustainable development, and applying the program for the purpose of preparing an oversight report related to assessing the impact of the activities of municipal institutions on the environmental reality as the main channel through which municipal institutions contribute to achieving the part related to it. Among the requirements of sustainable development, the proposed program was prepared and applied to the institutions affiliated to the Directorate of Mu
... Show MoreIn this work, we study two species of predator with two species of prey model, where the two species of prey live in two diverse habitats and have the ability to group-defense. Only one of the two predators tends to switch between the habitats. The mathematical model has at most 13 possible equilibrium points, one of which is the point of origin, two are axial, tow are interior points and the others are boundary points. The model with , where n is the switching index, is discussed regarding the boundedness of its solutions and the local stability of its equilibrium points. In addition, a basin of attraction was created for the interior point. Finally, three numerical examples were given to support the theoretical results.
This paper treats the interactions among four population species. The system includes one mutuality prey, one harvested prey and two predators. The four species interaction can be described as a food chain, where the first prey helps the second harvested prey. The first and the second predator attack the first and the second prey, respectively, according to Lotka-Volterra type functional responses. The model is formulated using differential equations. One equilibrium point of the model is found and analysed to reveal a threshold that will allow the coexistence of all species. All other equilibrium points of the system are located, with their local and global stability being assessed. To back up the conclusions of the mathema
... Show MoreThe most important function of a prosthetic hand is their ability to perform tasks in a manner similar to a natural hand, so it is necessary to perform kinematic analysis to determine the performance and the ability of the prosthetic human finger design to work normally and smoothly when it's drive by two sets of links that embedded in its structure and pulled by a servomotor, so the Denvit-Hartenberg method was used to analyse the forward kinematics for the prosthetic finger joints to deduction the trajectory of the fingertip and the velocity of the joints was computed by using the Jacobian matrix. The prosthetic finger was modelled by the Solidwork - 2018 program and the results of kinematics were verified using MATLAB. The analys
... Show MoreCognitive radios have the potential to greatly improve spectral efficiency in wireless networks. Cognitive radios are considered lower priority or secondary users of spectrum allocated to a primary user. Their fundamental requirement is to avoid interference to potential primary users in their vicinity. Spectrum sensing has been identified as a key enabling functionality to ensure that cognitive radios would not interfere with primary users, by reliably detecting primary user signals. In addition, reliable sensing creates spectrum opportunities for capacity increase of cognitive networks. One of the key challenges in spectrum sensing is the robust detection of primary signals in highly negative signal-to-noise regimes (SNR).In this paper ,
... Show MoreWith the fast progress of information technology and the computer networks, it becomes very easy to reproduce and share the geospatial data due to its digital styles. Therefore, the usage of geospatial data suffers from various problems such as data authentication, ownership proffering, and illegal copying ,etc. These problems can represent the big challenge to future uses of the geospatial data. This paper introduces a new watermarking scheme to ensure the copyright protection of the digital vector map. The main idea of proposed scheme is based on transforming the digital map to frequently domain using the Singular Value Decomposition (SVD) in order to determine suitable areas to insert the watermark data.
... Show MoreThe change in project cost, or cost growth, occurs from many factors, some of which are related to soil problem conditions that may occurs during construction and/or during site investigation period. This paper described a new soil improvement method with a minimum cost solution by using polymer fiber materials having a length of (3 cm) in both directions and (2.5 mm) in thickness, distributed in uniform medium dense .
sandy soil at different depths (B, 1.5B and 2B) below the footings. Three square footings has been used (5,7.5 and 10 cm) to carry the above investigation by using lever arm loading system design for such purposes.
These fibers were distributed from depth of (0.1B) below the footing base down to the investigated dep