With the revolutionized expansion of the Internet, worldwide information increases the application of communication technology, and the rapid growth of significant data volume boosts the requirement to accomplish secure, robust, and confident techniques using various effective algorithms. Lots of algorithms and techniques are available for data security. This paper presents a cryptosystem that combines several Substitution Cipher Algorithms along with the Circular queue data structure. The two different substitution techniques are; Homophonic Substitution Cipher and Polyalphabetic Substitution Cipher in which they merged in a single circular queue with four different keys for each of them, which produces eight different outputs for every single incoming letter. The present work can be applied efficiently for personal information security and network communication security as well, and the time required for ciphering and deciphering a message is less than 0.1 sec.
Solar photovoltaic (PV) system has emerged as one of the most promising technology to generate clean energy. In this work, the performance of monocrystalline silicon photovoltaic module is studied through observing the effect of necessary parameters: solar irradiation and ambient temperature. The single diode model with series resistors is selected to find the characterization of current-voltage (I-V) and power-voltage (P-V) curves by determining the values of five parameters ( ). This model shows a high accuracy in modeling the solar PV module under various weather conditions. The modeling is simulated via using MATLAB/Simulink software. The performance of the selected solar PV module is tested experimentally for differ
... Show MoreIn tolerance or ideological fanaticism and religious causes and ways to treat the psychological
The research aim : to identify the current this topic causes psychological social and religious intolerance sectarian and dogmatic ways of treating .
Research methodology: descriptive and analytical.
Define the terms: intolerance negative :it is the wrong idea plus the accompanying emotion followed by aggressive behavior against don seconded the idea .
... Show More
Corruption (Definition , Characteristics , Reasons , Features , and ways of combating it)
Cobalt substituted nickel copper ferrite samples with general formula Ni0.95-xCoxCu0.05Fe2O4, where (x= 0.00, 0.01, 0.02, 0.03, 0.04 and 0.05) were prepared by solid-state reactions method at 1373 K for 4h. The samples prepared were examined by X-ray diffraction (XRD(, atomic force microscope (AFM), Fourier transform infra-red spectroscopy (FTIR) and Vickers hardness. X-ray diffraction patterns confirm the formation of a single phase of cubic spinel structure in all the prepared samples . XRD analysis showed that the increase in the cobalt concentration causes an increase in the lattice constant, bulk density (ρm) and the x-ray density (ρx), whereas porosity (p) and crystallite size (D) decrease. The Topography of the surface observed
... Show MoreDominated the global arena attempts historic centers of imperialism (the United States, Europe, and Japan) to maintain its control of exclusive on the planet through a combination of economic globalization and liberal policies, which allow for capital transit of nationalism, of the Trinity, that is unique to issue decisions alone in all issues, including the interests of these countries alone . But the global landscape began to change with the entry of the twenty-first century world, although the United States, Europe and Japan remain in the list of major economic powers today, but it can not question the idea that the rising powers (Russia, China and India), has transferred the impact of rise to the level of major powers and the re-arrange
... Show MoreIn cyber security, the most crucial subject in information security is user authentication. Robust text-based password methods may offer a certain level of protection. Strong passwords are hard to remember, though, so people who use them frequently write them on paper or store them in file for computer .Numerous of computer systems, networks, and Internet-based environments have experimented with using graphical authentication techniques for user authentication in recent years. The two main characteristics of all graphical passwords are their security and usability. Regretfully, none of these methods could adequately address both of these factors concurrently. The ISO usability standards and associated characteristics for graphical
... Show MoreThe issue of the Circular Economy is not a new issue to several countries, especially the developed ones. Here in Iraq it is considered newly introduced, despite the few attempts to establish projects that concern recycling most of them were doomed to fail, due to two main reasons: the first one is the financial and administrative corruption widespread in all departments of the country, the second one is the priorities of public spending. It is well known that Iraq was subjected to two major attacks, the ISIS entry attack in 2014 to Iraq. ISIS occupied about a third of Iraqi lands which resulted in a collapse in oil prices, as Iraq depends almost entirely on oil revenues in its budget which is the second attack. This made the Iraqi governme
... Show More