With the revolutionized expansion of the Internet, worldwide information increases the application of communication technology, and the rapid growth of significant data volume boosts the requirement to accomplish secure, robust, and confident techniques using various effective algorithms. Lots of algorithms and techniques are available for data security. This paper presents a cryptosystem that combines several Substitution Cipher Algorithms along with the Circular queue data structure. The two different substitution techniques are; Homophonic Substitution Cipher and Polyalphabetic Substitution Cipher in which they merged in a single circular queue with four different keys for each of them, which produces eight different outputs for every single incoming letter. The present work can be applied efficiently for personal information security and network communication security as well, and the time required for ciphering and deciphering a message is less than 0.1 sec.
The continuous increase in population has led to the development of underground structures like tunnels to be of great importance due to several reasons. One of these reasons is that tunnels do not affect the living activities on the surface, nor they interfere with the existing traffic network. More importantly, they have a less environmental impact than conventional highways and railways. This paper focuses on using numerical analysis of circular tunnels in terms of their behavior during construction and the deformations that may occur due to overburden and seismic loads imposed on them. In this study, the input data are taken from an existing Cairo metro case study; results were found for the lateral and vertical displacements, the Peak
... Show MoreExperiments were carried out to investigate natural convection heat transfer in an inclined uniformly heated circular cylinder . The effects of surface heat flux and angle of inclination on the temperature and local Nusselt number variations along the cylinder surface are discussed . The investigation covers heat flux range from 92 W/m² to 487 W/m², and angles of inclination 0° ( horizontal) , 30° , 60° and 90° (vertical) . Results show an increase in the natural convection as heat flux increases and as angle of inclination moves from vertical to horizontal position. An empirical equation of average Nusselt number as a function of Rayliegh number was deduced for each angle of inclination .
In tolerance or ideological fanaticism and religious causes and ways to treat the psychological
The research aim : to identify the current this topic causes psychological social and religious intolerance sectarian and dogmatic ways of treating .
Research methodology: descriptive and analytical.
Define the terms: intolerance negative :it is the wrong idea plus the accompanying emotion followed by aggressive behavior against don seconded the idea .
... Show More
Corruption (Definition , Characteristics , Reasons , Features , and ways of combating it)
Dominated the global arena attempts historic centers of imperialism (the United States, Europe, and Japan) to maintain its control of exclusive on the planet through a combination of economic globalization and liberal policies, which allow for capital transit of nationalism, of the Trinity, that is unique to issue decisions alone in all issues, including the interests of these countries alone . But the global landscape began to change with the entry of the twenty-first century world, although the United States, Europe and Japan remain in the list of major economic powers today, but it can not question the idea that the rising powers (Russia, China and India), has transferred the impact of rise to the level of major powers and the re-arrange
... Show MoreIn cyber security, the most crucial subject in information security is user authentication. Robust text-based password methods may offer a certain level of protection. Strong passwords are hard to remember, though, so people who use them frequently write them on paper or store them in file for computer .Numerous of computer systems, networks, and Internet-based environments have experimented with using graphical authentication techniques for user authentication in recent years. The two main characteristics of all graphical passwords are their security and usability. Regretfully, none of these methods could adequately address both of these factors concurrently. The ISO usability standards and associated characteristics for graphical
... Show MoreCobalt substituted nickel copper ferrite samples with general formula Ni0.95-xCoxCu0.05Fe2O4, where (x= 0.00, 0.01, 0.02, 0.03, 0.04 and 0.05) were prepared by solid-state reactions method at 1373 K for 4h. The samples prepared were examined by X-ray diffraction (XRD(, atomic force microscope (AFM), Fourier transform infra-red spectroscopy (FTIR) and Vickers hardness. X-ray diffraction patterns confirm the formation of a single phase of cubic spinel structure in all the prepared samples . XRD analysis showed that the increase in the cobalt concentration causes an increase in the lattice constant, bulk density (ρm) and the x-ray density (ρx), whereas porosity (p) and crystallite size (D) decrease. The Topography of the surface observed
... Show MoreThis research aims to estimate production functions through which production relations, possibilities for production elements substitution, measurement of its substitution elasticity, and efficiency and distribution coefficients can be analyzed. This would be done through estimation of constant elasticity of substitution production function for agricultural companies in Iraq depending on data from Iraqi Stock Exchange reports of 2005-2016. The researcher had used panel data model and estimated its three models: the Pooled Regression Model (PRM), the Fixed Effect Model (FEM) and the Random Effect Model (REM). A comparison was made for theses three models using F, LM, Husman tests. Tests show that Fixed Effect Model (FEM) is the best
... Show More