The technological development in the field of information and communication has been accompanied by the emergence of security challenges related to the transmission of information. Encryption is a good solution. An encryption process is one of the traditional methods to protect the plain text, by converting it into inarticulate form. Encryption implemented can be occurred by using some substitute techniques, shifting techniques, or mathematical operations. This paper proposed a method with two branches to encrypt text. The first branch is a new mathematical model to create and exchange keys, the proposed key exchange method is the development of Diffie-Hellman. It is a new mathematical operations model to exchange keys based on prime numbers and the possibility of using integer numbers. While the second branch of the proposal is the multi-key encryption algorithm. The current algorithm provides the ability to use more than two keys. Keys can be any kind of integer number (at least the last key is a prime number), not necessarily to be of the same length. The Encryption process is based on converting the text characters to suggested integer numbers, and these numbers are converted to other numbers by using a multilevel mathematical model many times (a multilevel process depending on the number of keys used), while the decryption process is a one-level process using just one key as the main key, while the other keys used as secondary keys. The messages are encoded before encryption (coded by ASCII or any suggested system). The algorithm can use an unlimited number of keys with a very large size (more than 7500 bytes), at least one of them a prime number. Exponentiation is also used for keys to increase complexity. The experiments proved the robustness of the key exchange protocol and the encryption algorithm in addition to the security. Comparing the suggested method with other methods ensures that the suggested method is more secure and flexible and easy to implement.
المستخلـص
تم في هذا البحث دراسة الطرائق اللامعلمية الرتيبة لتقدير دالة الأنحدار اللامعلمي، ومعالجة القيم الشاذة الموجودة في دالة الأنحدار اللامعلمي لجعل الدالة رتيبة (متزايدة أو متناقصة).
لذا سنقوم أولاً بتقدير دالة الأنحدار اللامعلمي بإستخدام ممهد Kernel ومن ثم تطبيق الطرائق الرتيبة لجعل الدالة متزايدة إذ سنتناول ثلاث طرائق للتقدير:-
1- طريقة ste
... Show MoreIn this paper, double Sumudu and double Elzaki transforms methods are used to compute the numerical solutions for some types of fractional order partial differential equations with constant coefficients and explaining the efficiently of the method by illustrating some numerical examples that are computed by using Mathcad 15.and graphic in Matlab R2015a.
Analysis of Covariance consider to be quite important procedure to reduce the effect of some independents factors before going through the experiment.
By this procedure we can compare variances causes from the difference between treatments and error term variance of they are equals or less than consider to be not significant, otherwise if is significant.
We carry on with this comparison until we find the greatest covser for the significant variance flam the treatments.
There are methods can be used like least significant difference method, Duncan method and Turkeys' w-procedure and Student Newman.
Key Word: Analysis of variatio
... Show MoreThe problem of independent motion control of mobile robot (МR) in conditions when unforeseen changes of conditions of interaction of wheels with a surface are considered. An example of such changes can be sudden entrance МR a slippery surface. The deployment of an autonomous unmanned ground vehicle for field applications provides the means by which the risk to personnel can be minimized and operational capabilities improved. In rough terrain, it is critical for mobile robots to maintain good wheel traction. Wheel slip could cause the rover to lose control and become trapped. This paper describes the application of fuzzy control to a feedback system within slippery environment. The study is conducted on an example of М
... Show MoreThe combination of wavelet theory and neural networks has lead to the development of wavelet networks. Wavelet networks are feed-forward neural networks using wavelets as activation function. Wavelets networks have been used in classification and identification problems with some success.
In this work we proposed a fuzzy wavenet network (FWN), which learns by common back-propagation algorithm to classify medical images. The library of medical image has been analyzed, first. Second, Two experimental tables’ rules provide an excellent opportunity to test the ability of fuzzy wavenet network due to the high level of information variability often experienced with this type of images.
&n
... Show MoreThe importance of vibrations in rotating rotors in engineering applications has been examined, as has the best approach to interpreting vibration data. The most extensively used analytical approaches for rotating shaft vibration analysis have been investigated. In this research, a detailed study was made of the Rayleigh and Dunkerley methods due to their importance in the special calculations to find the amplitude of vibrations in the rotation system. The multi-node method was used to calculate both Dunkerley's and Rayleigh's methods. An experimental platform was built to study the vibrations that occur in the rotating shafts, and the results were compared with theoretical calculations and with different distances of the bearings. It pro
... Show MoreIn this paper, a new procedure is introduced to estimate the solution for the three-point boundary value problem which is instituted on the use of Morgan-Voyce polynomial. In the beginning, Morgan-Voyce polynomial along with their important properties is introduced. Next, this polynomial with aid of the collocation method utilized to modify the differential equation with boundary conditions to the algebraic system. Finally, the examples approve the validity and accuracy of the proposed method.
In this study the Bauxite has been activated and used to prepare two complexes: Bauxite - urea and Bauxite - melamine, these complexes were merged and polymerized with formaldehyde to prepare the complex Bauxite polymer - urea - melamine - formaldehyde (modified Bauxite). In the Bauxite-urea complex XRD results indicate that the urea molecules penetrate among the layers of the crystal plane (110) of the Gibbsite mineral while in the Bauxite-melamine the interaction was at the outer surface of the Bauxite forming minerals because the relatively large volume of the melamine molecule. FT-IR results show the interaction of these two bases with Bauxite was mainly based on the hydrogen bonding and in less extent on the coordination between N l
... Show MoreTherapeutically and prophylactically using Microspheres containing doxycycline isolated from shell of shrimp. Low molecule weight poly lactic acid was prepared. In this study, Poly lactic acid (PLA)/ poly vinyl alcohol (PVA)/poly ethyleneglycol(PEG) loading doxycycline blend solutions was prepared. Also Poly lactic acid (PLA)-Tannin blend via solvent evaporation method was prepared. Microspheres of chitosan/gelatin microsphere loading doxycycline was prepared by emulsion crosslinking technique. Both microsphere and blends were characterized by Fourier transform infrared (FTIR) spectrophotometer. The FTIR spectra were shown distinguish bands. The in vitro release of doxcycline from its matrix at pH 7 was studied. The prophylactic
... Show More