With the revolutionized expansion of the Internet, worldwide information increases the application of communication technology, and the rapid growth of significant data volume boosts the requirement to accomplish secure, robust, and confident techniques using various effective algorithms. Lots of algorithms and techniques are available for data security. This paper presents a cryptosystem that combines several Substitution Cipher Algorithms along with the Circular queue data structure. The two different substitution techniques are; Homophonic Substitution Cipher and Polyalphabetic Substitution Cipher in which they merged in a single circular queue with four different keys for each of them, which produces eight different outputs for every single incoming letter. The present work can be applied efficiently for personal information security and network communication security as well, and the time required for ciphering and deciphering a message is less than 0.1 sec.
This paper presents ABAQUS simulations of fully encased composite columns, aiming to examine the behavior of a composite column system under different load conditions, namely concentric, eccentric with 25 mm eccentricity, and flexural loading. The numerical results are validated with the experimental results obtained for columns subjected to static loads. A new loading condition with a 50 mm eccentricity is simulated to obtain additional data points for constructing the interaction diagram of load-moment curves, in an attempt to investigate the load-moment behavior for a reference column with a steel I-section and a column with a GFRP I-section. The result comparison shows that the experimental data align closely with the simulation
... Show MoreThe method of request is one of the important rhetorical methods used by the creator in terms of rhetorical diversification, influence, artistic aesthetics and increasing textual coherence, and we tried through a group (Which torments are inferior) by the poet Majid Al-Rubaie, to shed light on these methods and their ability, displacement, relationality, direct and advertising interactions from them, and what they broadcast From metaphorical purposes is the second image of it, after its main image and title. This cohesion and harmony between the two images is an important and influential rhetorical trend
The method of request is one of the important rhetorical methods used by the creator in terms of rhetorical diversification, influence, artistic aesthetics and increasing textual coherence, and we tried through a group (Which torments are inferior) by the poet Majid Al-Rubaie, to shed light on these methods and their ability, displacement, relationality, direct and advertising interactions from them, and what they broadcast From metaphorical purposes is the second image of it, after its main image and title. This cohesion and harmony between the two images is an important and influential rhetorical trend.
Expressions for the molecular topological features of silicon carbide compounds are essential for quantitative structure-property and structure-activity interactions. Chemical Graph Theory is a subfield of computational chemistry that investigates topological indices of molecular networks that correlate well with the chemical characteristics of chemical compounds. In the modern age, topological indices are extremely important in the study of graph theory. Topological indices are critical tools for understanding the core topology of chemical structures while examining chemical substances. In this article, compute the first and second k-Banhatti index, modified first and second k-Banhatti index, first and second k-hyper Banhatti index, fir
... Show MoreIn this paper, we have extracted Silica from rice husk ash (RHA) by sodium hydroxide to produce sodium silicate. 3-(chloropropyl)triethoxysilane (CPTES) functionalized with sodium silicate via a sol-gel method in one pot synthesis to prepare RHACCl. Chloro group in compound RHACCl replacement in iodo group to prepere RHACI. The FT-IR clearly showed absorption band of C-I at 580 cm-1. Functionalized silica RHACI has high surface area (410 m2/g) and average pore diameter (3.8 nm) within mesoporous range. X-ray diffraction pattern showed that functionalized silica RHACI has amorphous phase .Thermogravemitric analysis (TGA) showed two decomposition stages and SEM morphology of RHACI showed that the particles have irregu
... Show MoreThe confirming of security and confidentiality of multimedia data is a serious challenge through the growing dependence on digital communication. This paper offers a new image cryptography based on the Chebyshev chaos polynomials map, via employing the randomness characteristic of chaos concept to improve security. The suggested method includes block shuffling, dynamic offset chaos key production, inter-layer XOR, and block 90 degree rotations to disorder the correlations intrinsic in image. The method is aimed for efficiency and scalability, accomplishing complexity order for n-pixels over specific cipher rounds. The experiment outcomes depict great resistant to cryptanalysis attacks, containing statistical, differential and brut
... Show MoreIn this contribution, density functional theory-based calculations have been carried out to assess the electronic, photocatalytic and optical properties of Ce1-xTixO2 system. Ti incorporation leads to a decrease of Ce 4f states and enhancement of Ti 3d states in the bottom of conduction band. Furthermore, it was found that doping ceria with Ti-like transition metals could evidently shift the absorption of pure CeO2 towards higher wavelength range. These findings can provide some new insights for designing CeO2-based photocatalysts with high photocatalytic performance. To the best of our knowledge, this investigation calculates Mullikan’s charge transfer of Ce1-xTixO2 system for the first time. Charge transfer reveals an ionic bond between
... Show MoreIn the latest years there has been a profound evolution in computer science and technology, which incorporated several fields. Under this evolution, Content Base Image Retrieval (CBIR) is among the image processing field. There are several image retrieval methods that can easily extract feature as a result of the image retrieval methods’ progresses. To the researchers, finding resourceful image retrieval devices has therefore become an extensive area of concern. Image retrieval technique refers to a system used to search and retrieve images from digital images’ huge database. In this paper, the author focuses on recommendation of a fresh method for retrieving image. For multi presentation of image in Convolutional Neural Network (CNN),
... Show MoreWith the growing use of electronic commerce has worked many companies, especially public shareholding to take advantage of them treated in the trade, so that the e-commerce part of the corporate environment, and this has made a career of accounting and auditing facing new challenges to the sophistication of the information and the rapid growth in the market for electronic commerce. And raised many questions about the ability of the audit profession to facing these challenges and how to audit operations of e-commerce and how to give confidence on websites, this sense it has become necessary keep the internal control systems of this technology and what has caused changes to the accounting system, and evolve to fit the developments that hav
... Show MoreFinding the shortest route in wireless mesh networks is an important aspect. Many techniques are used to solve this problem like dynamic programming, evolutionary algorithms, weighted-sum techniques, and others. In this paper, we use dynamic programming techniques to find the shortest path in wireless mesh networks due to their generality, reduction of complexity and facilitation of numerical computation, simplicity in incorporating constraints, and their onformity to the stochastic nature of some problems. The routing problem is a multi-objective optimization problem with some constraints such as path capacity and end-to-end delay. Single-constraint routing problems and solutions using Dijkstra, Bellman-Ford, and Floyd-Warshall algorith
... Show More