With the revolutionized expansion of the Internet, worldwide information increases the application of communication technology, and the rapid growth of significant data volume boosts the requirement to accomplish secure, robust, and confident techniques using various effective algorithms. Lots of algorithms and techniques are available for data security. This paper presents a cryptosystem that combines several Substitution Cipher Algorithms along with the Circular queue data structure. The two different substitution techniques are; Homophonic Substitution Cipher and Polyalphabetic Substitution Cipher in which they merged in a single circular queue with four different keys for each of them, which produces eight different outputs for every single incoming letter. The present work can be applied efficiently for personal information security and network communication security as well, and the time required for ciphering and deciphering a message is less than 0.1 sec.
Structure type and disorder have become important questions in catalyst design, with the most active catalysts often noted to be “disordered” or “amorphous” in nature. To quantify the effects of disorder and structure type systematically, a test set of manganese(III,IV) oxides was developed and their reactivity as oxidants and catalysts tested against three substrates: methylene blue, hydrogen peroxide, and water. We find that disorder destabilizes the materialsthermodynamically, making them stronger chemical oxidantsbut not necessarily better catalysts. For the disproportionation of H2O2 and the oxidative decomposition of methylene blue, MnOx-mediated direct oxidation competes with catalytically mediated oxidation, making the most
... Show MoreAccelerates operating managements in the facilities contemporary business environment toward redefining processes and strategies that you need to perform tasks of guaranteeing them continue in an environment performance dominated by economic globalization and the circumstances of uncertainty attempt the creation of a new structure through multiple pages seek to improve profitability and sustainable growth in performance in a climatefocuses on the development of institutional processes, reduce costs and achieve customer satisfaction to meet their demands and expectations are constantly changing. The research was presented structural matrix performance combines methodology Alsigma in order to improve customer satisfaction significantly bet
... Show MoreABSTRACT
Metal (II) complexes of Co, Ni, Cu and Zn with cefdinir C14H13N5O5S2 derivative (L) were synthesized and identification by elemental analysis CHNS Uv-Vis, FTIR, TGA, metal analysis AA, magnetic susceptibility and conduct metric measurement. by analysis the ligand behaves as a bidentate. For the cobalt complex, Tetrahedral geometry shape was suggested, while other complexes that have nickel, copper and zinc ions were proposed as octahedral geometry shape. The experimental method was studied for prevention of corrosion carbon steel in 3.5% NaCl by using a novel Cefdinir derivations drugs. The results showed that metal complex was a strong corro
... Show Moreيھدف البحث الى اجراء تقدير دالة المعولية لتوزيــع ويبل ذي المعلمتين بالطرائـق المعلميــة والمتمثلة بـ (NWLSM,RRXM,RRYM,MOM,MLM (، وكذلك اجراء تقدير لدالة المعولية بالطرائق الالمعلمية والمتمثلة بـ . (EM, PLEM, EKMEM, WEKM, MKMM, WMR, MMO, MMT) وتم استخدام اسلوب المحاكاة لغرض المقارنة باستخدام حجوم عينات مختلفة (20,40,60,80,100) والوصول الى افضل الطرائق في التقدير باالعتماد على المؤشر االحصائي متوسط مربعات الخطا التكاملي (IMSE(، وقد توصل البحث الى
... Show MoreThe research demonstrates new species of the games by applying separation axioms via sets, where the relationships between the various species that were specified and the strategy of winning and losing to any one of the players, and their relationship with the concepts of separation axioms via sets have been studied.
MCA has gained a reputation for being a very useful statistical method for determining the association between two or more categorical variables and their graphical description. For performance this method, we must calculate the singular vectors through (SVD). Which is an important primary tool that allows user to construct a low-dimensional space to describe the association between the variables categories. As an alternative procedure to use (SVD), we can use the (BMD) method, which involves using orthogonal polynomials to reflect the structure of ordered categorical responses. When the features of BMD are combined with SVD, the (HD) is formed. The aim of study is to use alternative method of (MCA) that is appropriate with order
... Show MoreThe research aims to estimate missing values using covariance analysis method Coons way to the variable response or dependent variable that represents the main character studied in a type of multi-factor designs experiments called split block-design (SBED) so as to increase the accuracy of the analysis results and the accuracy of statistical tests based on this type of designs. as it was noted in the theoretical aspect to the design of dissident sectors and statistical analysis have to analyze the variation in the experience of experiment )SBED) and the use of covariance way coons analysis according to two methods to estimate the missing value, either in the practical side of it has been implemented field experiment wheat crop in
... Show MoreThe marketing logistic chain, as an integrated system aimed to balance the achievement of its main opposite objectives which represented in the access to the best service presented to the customer with lowest possible logistic costs especially the transportation costs, where encourages the researcher to choose the second objective as a field of this study in order to reduce the transportation costs in the final link of marketing logistic chain which related to delivering of fuel oil to the customer that falls within organizational responsibilities of the company under consideration (Oil Marketing Company) and also known in a brief name by (SOMO) through two methods, the first is by functioning quantative techniques by using trans
... Show MoreSensitive information of any multimedia must be encrypted before transmission. The dual chaotic algorithm is a good option to encrypt sensitive information by using different parameters and different initial conditions for two chaotic maps. A dual chaotic framework creates a complex chaotic trajectory to prevent the illegal use of information from eavesdroppers. Limited precisions of a single chaotic map cause a degradation in the dynamical behavior of the communication system. To overcome this degradation issue in, a novel form of dual chaos map algorithm is analyzed. To maintain the stability of the dynamical system, the Lyapunov Exponent (LE) is determined for the single and dual maps. In this paper, the LE of the single and dual maps
... Show MoreSimple, sensitive and accurate two methods were described for the determination of terazosin. The spectrophotometric method (A) is based on measuring the spectral absorption of the ion-pair complex formed between terazosin with eosin Y in the acetate buffer medium pH 3 at 545 nm. Method (B) is based on the quantitative quenching effect of terazosin on the native fluorescence of Eosin Y at the pH 3. The quenching of the fluorescence of Eosin Y was measured at 556 nm after excitation at 345 nm. The two methods obeyed Beer’s law over the concentration ranges of 0.1-8 and 0.05-7 µg/mL for method A and B respectively. Both methods succeeded in the determination of terazosin in its tablets