This paper proposes a new encryption method. It combines two cipher algorithms, i.e., DES and AES, to generate hybrid keys. This combination strengthens the proposed W-method by generating high randomized keys. Two points can represent the reliability of any encryption technique. Firstly, is the key generation; therefore, our approach merges 64 bits of DES with 64 bits of AES to produce 128 bits as a root key for all remaining keys that are 15. This complexity increases the level of the ciphering process. Moreover, it shifts the operation one bit only to the right. Secondly is the nature of the encryption process. It includes two keys and mixes one round of DES with one round of AES to reduce the performance time. The W-method deals with Arabic and English texts with the same efficiency. The result showed that the proposed method performs faster and more securely when compared to standard DES and AES algorithms.
This paper focuses on developing a self-starting numerical approach that can be used for direct integration of higher-order initial value problems of Ordinary Differential Equations. The method is derived from power series approximation with the resulting equations discretized at the selected grid and off-grid points. The method is applied in a block-by-block approach as a numerical integrator of higher-order initial value problems. The basic properties of the block method are investigated to authenticate its performance and then implemented with some tested experiments to validate the accuracy and convergence of the method.
The present study aimed at identifying the effectiveness of Macaton method in improving some sensory and cognitive skills in autistic children. In order to achieve the aims of the study, the researcher used the experimental method. The present study sample was (10) children whose ages ranged between (7-10) years and were diagnosed medically with autism disorder. The researcher randomly selected the sample and divided it into two groups: the first group consisted of (5) children representing the experimental group, and (5) children representing the control group after extracting the equivalence between the two groups in terms of age, intelligence, economic and social level and the degree of communication. The program was implemented for t
... Show MoreHand gestures are currently considered one of the most accurate ways to communicate in many applications, such as sign language, controlling robots, the virtual world, smart homes, and the field of video games. Several techniques are used to detect and classify hand gestures, for instance using gloves that contain several sensors or depending on computer vision. In this work, computer vision is utilized instead of using gloves to control the robot's movement. That is because gloves need complicated electrical connections that limit user mobility, sensors may be costly to replace, and gloves can spread skin illnesses between users. Based on computer vision, the MediaPipe (MP) method is used. This method is a modern method that is discover
... Show MoreThe collected premiums and the compensations paid are among the main variables that have a prominent role in determining the level of financial solvency of insurance companies, as the higher the financial solvency of the insurance company, the more attractive it is to the target audience to acquire the company's insurance services.
Hence the importance of the issue of the solvency of insurance companies, as it is one of the critical matters on which the effectiveness of the insurance company and its continuation in the labor market depend.
In this research, we try to clarify the role of collected premiums and compensations paid in determining the level of operational solvency of t
... Show MoreTo expedite the learning process, a group of algorithms known as parallel machine learning algorithmscan be executed simultaneously on several computers or processors. As data grows in both size andcomplexity, and as businesses seek efficient ways to mine that data for insights, algorithms like thesewill become increasingly crucial. Data parallelism, model parallelism, and hybrid techniques are justsome of the methods described in this article for speeding up machine learning algorithms. We alsocover the benefits and threats associated with parallel machine learning, such as data splitting,communication, and scalability. We compare how well various methods perform on a variety ofmachine learning tasks and datasets, and we talk abo
... Show MoreAn efficient modification and a novel technique combining the homotopy concept with Adomian decomposition method (ADM) to obtain an accurate analytical solution for Riccati matrix delay differential equation (RMDDE) is introduced in this paper . Both methods are very efficient and effective. The whole integral part of ADM is used instead of the integral part of homotopy technique. The major feature in current technique gives us a large convergence region of iterative approximate solutions .The results acquired by this technique give better approximations for a larger region as well as previously. Finally, the results conducted via suggesting an efficient and easy technique, and may be addressed to other non-linear problems.
Speech is the essential way to interact between humans or between human and machine. However, it is always contaminated with different types of environment noise. Therefore, speech enhancement algorithms (SEA) have appeared as a significant approach in speech processing filed to suppress background noise and return back the original speech signal. In this paper, a new efficient two-stage SEA with low distortion is proposed based on minimum mean square error sense. The estimation of clean signal is performed by taking the advantages of Laplacian speech and noise modeling based on orthogonal transform (Discrete Krawtchouk-Tchebichef transform) coefficients distribution. The Discrete Kra
Abstract
The aim of this work is to create a power control system for wind turbines based on fuzzy logic. Three power control loop was considered including: changing the pitch angle of the blade, changing the length of the blade and turning the nacelle. The stochastic law was given for changes and instant inaccurate assessment of wind conditions changes. Two different algorithms were used for fuzzy inference in the control loop, the Mamdani and Larsen algorithms. These two different algorithms are materialized and developed in this study in Matlab-Fuzzy logic toolbox which has been practically implemented using necessary intelligent control system in electrical engineerin
... Show More