With the revolutionized expansion of the Internet, worldwide information increases the application of communication technology, and the rapid growth of significant data volume boosts the requirement to accomplish secure, robust, and confident techniques using various effective algorithms. Lots of algorithms and techniques are available for data security. This paper presents a cryptosystem that combines several Substitution Cipher Algorithms along with the Circular queue data structure. The two different substitution techniques are; Homophonic Substitution Cipher and Polyalphabetic Substitution Cipher in which they merged in a single circular queue with four different keys for each of them, which produces eight different outputs for every single incoming letter. The present work can be applied efficiently for personal information security and network communication security as well, and the time required for ciphering and deciphering a message is less than 0.1 sec.
This paper presents ABAQUS simulations of fully encased composite columns, aiming to examine the behavior of a composite column system under different load conditions, namely concentric, eccentric with 25 mm eccentricity, and flexural loading. The numerical results are validated with the experimental results obtained for columns subjected to static loads. A new loading condition with a 50 mm eccentricity is simulated to obtain additional data points for constructing the interaction diagram of load-moment curves, in an attempt to investigate the load-moment behavior for a reference column with a steel I-section and a column with a GFRP I-section. The result comparison shows that the experimental data align closely with the simulation
... Show MoreExpressions for the molecular topological features of silicon carbide compounds are essential for quantitative structure-property and structure-activity interactions. Chemical Graph Theory is a subfield of computational chemistry that investigates topological indices of molecular networks that correlate well with the chemical characteristics of chemical compounds. In the modern age, topological indices are extremely important in the study of graph theory. Topological indices are critical tools for understanding the core topology of chemical structures while examining chemical substances. In this article, compute the first and second k-Banhatti index, modified first and second k-Banhatti index, first and second k-hyper Banhatti index, fir
... Show Moreنسب أغلب مؤرخي العلم الإنساني الطرق التي إتبعت في كتابة المنهج العلمي الصحيح ، في كافة العلوم و المعارف ، إلى العصر الحديث . و قال آخرون ان العقل البشري ، سواء في الأزمنة القديمة أو الحديثة ، هو واحد لا يمكنه التفكير أو العمل إلا بوجود منهج معين يسير عليه فكره و فعله (1) ، مطلقين عليه تسمية المنهج التلقائي . و كما هو واضح من التسمية يمكن وصفه بأنه منهج يفتقر إلى الإدراك و الشعور . و يطبق هذا المنهج الغالبية ا
... Show MoreIn this paper a WLAN network that accesses the Internet through a GPRS network was implemented and tested. The proposed network is managed by the Linux based server. Because of the limited facilities of GPRS such as dynamic IP addressing besides to its limited bandwidth a number of techniques are implemented to overcome these limitations.
Dynamic Host Configuration Protocol (DHCP) server was added to provide a single central control for all TCP/IP resources. Squid Proxy was added to provide caching of the redundant accessed Web content to reduce the Internet bandwidth usage and speeding up the client’s download time. Network Address Translation (NAT) service was configured to share one IP ad
... Show MoreSentiment analysis refers to the task of identifying polarity of positive and negative for particular text that yield an opinion. Arabic language has been expanded dramatically in the last decade especially with the emergence of social websites (e.g. Twitter, Facebook, etc.). Several studies addressed sentiment analysis for Arabic language using various techniques. The most efficient techniques according to the literature were the machine learning due to their capabilities to build a training model. Yet, there is still issues facing the Arabic sentiment analysis using machine learning techniques. Such issues are related to employing robust features that have the ability to discrimina
... Show MoreThe method of request is one of the important rhetorical methods used by the creator in terms of rhetorical diversification, influence, artistic aesthetics and increasing textual coherence, and we tried through a group (Which torments are inferior) by the poet Majid Al-Rubaie, to shed light on these methods and their ability, displacement, relationality, direct and advertising interactions from them, and what they broadcast From metaphorical purposes is the second image of it, after its main image and title. This cohesion and harmony between the two images is an important and influential rhetorical trend.
The method of request is one of the important rhetorical methods used by the creator in terms of rhetorical diversification, influence, artistic aesthetics and increasing textual coherence, and we tried through a group (Which torments are inferior) by the poet Majid Al-Rubaie, to shed light on these methods and their ability, displacement, relationality, direct and advertising interactions from them, and what they broadcast From metaphorical purposes is the second image of it, after its main image and title. This cohesion and harmony between the two images is an important and influential rhetorical trend
Cryptography algorithms play a critical role in information technology against various attacks witnessed in the digital era. Many studies and algorithms are done to achieve security issues for information systems. The high complexity of computational operations characterizes the traditional cryptography algorithms. On the other hand, lightweight algorithms are the way to solve most of the security issues that encounter applying traditional cryptography in constrained devices. However, a symmetric cipher is widely applied for ensuring the security of data communication in constraint devices. In this study, we proposed a hybrid algorithm based on two cryptography algorithms PRESENT and Salsa20. Also, a 2D logistic map of a chaotic system is a
... Show MoreFinding the shortest route in wireless mesh networks is an important aspect. Many techniques are used to solve this problem like dynamic programming, evolutionary algorithms, weighted-sum techniques, and others. In this paper, we use dynamic programming techniques to find the shortest path in wireless mesh networks due to their generality, reduction of complexity and facilitation of numerical computation, simplicity in incorporating constraints, and their onformity to the stochastic nature of some problems. The routing problem is a multi-objective optimization problem with some constraints such as path capacity and end-to-end delay. Single-constraint routing problems and solutions using Dijkstra, Bellman-Ford, and Floyd-Warshall algorith
... Show MoreFeature selection (FS) constitutes a series of processes used to decide which relevant features/attributes to include and which irrelevant features to exclude for predictive modeling. It is a crucial task that aids machine learning classifiers in reducing error rates, computation time, overfitting, and improving classification accuracy. It has demonstrated its efficacy in myriads of domains, ranging from its use for text classification (TC), text mining, and image recognition. While there are many traditional FS methods, recent research efforts have been devoted to applying metaheuristic algorithms as FS techniques for the TC task. However, there are few literature reviews concerning TC. Therefore, a comprehensive overview was systematicall
... Show More