With the revolutionized expansion of the Internet, worldwide information increases the application of communication technology, and the rapid growth of significant data volume boosts the requirement to accomplish secure, robust, and confident techniques using various effective algorithms. Lots of algorithms and techniques are available for data security. This paper presents a cryptosystem that combines several Substitution Cipher Algorithms along with the Circular queue data structure. The two different substitution techniques are; Homophonic Substitution Cipher and Polyalphabetic Substitution Cipher in which they merged in a single circular queue with four different keys for each of them, which produces eight different outputs for every single incoming letter. The present work can be applied efficiently for personal information security and network communication security as well, and the time required for ciphering and deciphering a message is less than 0.1 sec.
In this paper an attempt to provide a single degree of freedom lumped model for fluid structure interaction (FSI) dynamical analysis will be presented. The model can be used to clarify some important concept in the FSI dynamics such as the added mass, added stiffness, added damping, wave coupling ,influence mass coefficient and critical fluid depth . The numerical results of the model show that the natural frequency decrease with the increasing of many parameters related to the structure and the fluid .It is found that the interaction phenomena can become weak or strong depending on the depth of the containing fluid .The damped and un damped free response are plotted in time domain and phase plane for different model parameters It is fou
... Show MoreThis research attempts to investigate narrative structure in oral narrative particularly in Oprah's Show from a sociolinguistic viewpoint. Narrative is said to be universal in the sense that it is found in all times and places. There is no society or culture without narrative. Oral narrative is organized in a specific order. The research aims at studying and analyzing this order. In addition to that, it highlights the importance of narrative in conveying some moral messages to people who are listening to the story. The study is divided into two parts; theoretical and practical. The theoretical part draws on presenting a survey of literature which includes definitions and explanations of some related terms. The practical part is concerned
... Show MoreThe structure is considered in its scientific formula one of the concepts which complete the architectural image that seeks to take out an effective and attractive structure in contemporary architectural production, especially that the structure -in general- represents strength in addition to delight and functional benefits according to Vitruvius trinity. So, the role of structure depends on making its aesthetical properties able to give efficiency within architectural product. That has come through adoption of intellectual mechanism of structural means and details –as a whole or parts- and focused on structure with the recipient's needs, aesthetical, and sensory purposes in addition to its fundamental role of stabilit
... Show MoreA polycrystalline CdSe thin films doped with (5wt%) of Cu was fabricated using vacuum evaporation technique in the substrate temperature range(Ts=RT-250)oC on glass substrates of the thickness(0.8?m). The structure of these films are determined by X-ray diffraction (XRD). The X-ray diffraction studies shows that the structure is polycrystalline with hexagonal structure, and there are strong peaks at the direction (200) at (Ts=RT-150) oC, while at higher substrate temperature(Ts=150-250) oC the structure is single crystal. The optical properties as a function of Ts were studied. The absorption, transmission, and reflection has been studied, The optical energy gap (Eg)increases with increase of substrate temperature from (1.65
... Show MoreA study carried out to prepare Hg1-xCdxTe compound and to see the effect on increasing the percentage of x on the compound structure by using x-ray diffraction and atomic absorption for 0
The consensus algorithm is the core mechanism of blockchain and is used to ensure data consistency among blockchain nodes. The PBFT consensus algorithm is widely used in alliance chains because it is resistant to Byzantine errors. However, the present PBFT (Practical Byzantine Fault Tolerance) still has issues with master node selection that is random and complicated communication. The IBFT consensus technique, which is enhanced, is proposed in this study and is based on node trust value and BLS (Boneh-Lynn-Shacham) aggregate signature. In IBFT, multi-level indicators are used to calculate the trust value of each node, and some nodes are selected to take part in network consensus as a result of this calculation. The master node is chosen
... Show MoreThis present work is concerned with one of the syntactic issues that has been researched by many linguists, grammarians, and specialists in Islamic studies, the estimated answer to a condition. However, this topic is researched this time by examining Imam Al-Qurtbi’s opinions in interpreting related ayas from the holly Quraan in his book (Collector of Quranic Rules) or its transliteration (Al-Jami’ Li Ahkam Al-Quran). Such a step involves commenting on, tracking what Al-Qurtbi said in this regard, discussing it from the points of view of other grammarians, and judging it accordingly, taking into account the apparent surface structures of the examples collected. To achieve this objective, the inductive analytical approach has be
... Show MoreThe drill bit is the most essential tool in drilling operation and optimum bit selection is one of the main challenges in planning and designing new wells. Conventional bit selections are mostly based on the historical performance of similar bits from offset wells. In addition, it is done by different techniques based on offset well logs. However, these methods are time consuming and they are not dependent on actual drilling parameters. The main objective of this study is to optimize bit selection in order to achieve maximum rate of penetration (ROP). In this work, a model that predicts the ROP was developed using artificial neural networks (ANNs) based on 19 input parameters. For the
Abstract
Much attention has been paid for the use of robot arm in various applications. Therefore, the optimal path finding has a significant role to upgrade and guide the arm movement. The essential function of path planning is to create a path that satisfies the aims of motion including, averting obstacles collision, reducing time interval, decreasing the path traveling cost and satisfying the kinematics constraints. In this paper, the free Cartesian space map of 2-DOF arm is constructed to attain the joints variable at each point without collision. The D*algorithm and Euclidean distance are applied to obtain the exact and estimated distances to the goal respectively. The modified Particle Swarm Optimization al
... Show More