Cipher security is becoming an important step when transmitting important information through networks. The algorithms of cryptography play major roles in providing security and avoiding hacker attacks. In this work two hybrid cryptosystems have been proposed, that combine a modification of the symmetric cryptosystem Playfair cipher called the modified Playfair cipher and two modifications of the asymmetric cryptosystem RSA called the square of RSA technique and the square RSA with Chinese remainder theorem technique. The proposed hybrid cryptosystems have two layers of encryption and decryption. In the first layer the plaintext is encrypted using modified Playfair to get the cipher text, this cipher text will be encrypted using squared RSA to get the final cipher text. This algorithm achieved higher security to data but suffers from a long computational time. So Chinese remainder theorem has been used in the second hybrid cryptosystem to obtain less encryption and decryption time. The simulation results indicated that using the modified Playfair with the proposed square RSA has improved security. Moreover, using the Chinese remainder theorem achieved less encryption and decryption time in comparison to our first proposed and the standard algorithms.
: The Aluminium (Al) material emerged as a plasmonic material in the wavelength ranges from the ultraviolet to the visible bands in different on-chip plasmonic applications. In this paper, we demonstrate the effect of using Al on the electromagnetic (EM) field distribution of a compact hybrid plasmonic waveguide (HPW) acting as a polarization rotator. We compare the performance of Al with other familiar metals that are widely used as plasmonic materials, which are Silver (Ag) and Gold (Au). Furthermore, we study the effect of reducing the geometrical dimensions of the used materials on the EM field distributions inside the HPW and, consequently, on the efficiency of the polarization rotation. We perform the study based o
... Show MoreIn modern era, which requires the use of networks in the transmission of data across distances, the transport or storage of such data is required to be safe. The protection methods are developed to ensure data security. New schemes are proposed that merge crypto graphical principles with other systems to enhance information security. Chaos maps are one of interesting systems which are merged with cryptography for better encryption performance. Biometrics is considered an effective element in many access security systems. In this paper, two systems which are fingerprint biometrics and chaos logistic map are combined in the encryption of a text message to produce strong cipher that can withstand many types of attacks. The histogram analysis o
... Show MoreMost of the Internet of Things (IoT), cell phones, and Radio Frequency Identification (RFID) applications need high speed in the execution and processing of data. this is done by reducing, system energy consumption, latency, throughput, and processing time. Thus, it will affect against security of such devices and may be attacked by malicious programs. Lightweight cryptographic algorithms are one of the most ideal methods Securing these IoT applications. Cryptography obfuscates and removes the ability to capture all key information patterns ensures that all data transfers occur Safe, accurate, verified, legal and undeniable. Fortunately, various lightweight encryption algorithms could be used to increase defense against various at
... Show MoreThe expansion of web applications like e-commerce and other services yields an exponential increase in offers and choices in the web. From these needs, the recommender system applications have arisen. This research proposed a recommender system that uses user's reviews as implicit feedback to extract user preferences from their reviews to enhance personalization in addition to the explicit ratings. Diversity also improved by using k-furthest neighbor algorithm upon user's clusters. The system tested using Douban movie standard dataset from Kaggle, and show good performance.
Attack stream cipher system , using cipher text only , depends on the characteristics of plain teKt language and the randomness of the key , that used in encryption , without having detailed k.nuwh:dgt:: uf cipher algorithm by benefiting from the balance between O's and I' in the key to reduce the probability of key space.
Generally, statistical methods are used in various fields of science, especially in the research field, in which Statistical analysis is carried out by adopting several techniques, according to the nature of the study and its objectives. One of these techniques is building statistical models, which is done through regression models. This technique is considered one of the most important statistical methods for studying the relationship between a dependent variable, also called (the response variable) and the other variables, called covariate variables. This research describes the estimation of the partial linear regression model, as well as the estimation of the “missing at random” values (MAR). Regarding the
... Show MoreThis paper describes a new proposed structure of the Proportional Integral Derivative (PID) controller based on modified Elman neural network for the DC-DC buck converter system which is used in battery operation of the portable devices. The Dolphin Echolocation Optimization (DEO) algorithm is considered as a perfect on-line tuning technique therefore, it was used for tuning and obtaining the parameters of the modified Elman neural-PID controller to avoid the local minimum problem during learning the proposed controller. Simulation results show that the best weight parameters of the proposed controller, which are taken from the DEO, lead to find the best action and unsaturated state that will stabilize the Buck converter system performan
... Show MoreLocalization is an essential issue in pervasive computing application. FM performs worse in some indoor environment when its structure is same to some extent the outdoor environment like shopping mall. Furthermore, FM signal are less varied over time, low power consumption and less effected by human and small object presence when it compared to Wi-Fi. Consequently, this paper focuses on FM radio signal technique and its characteristics that make it suitable to be used for indoor localization, its benefits, areas of applications and limitations.
A proposed feature extraction algorithm for handwriting Arabic words. The proposed method uses a 4 levels discrete wavelet transform (DWT) on binary image. sliding window on wavelet space and computes the stander derivation for each window. The extracted features were classified with multiple Support Vector Machine (SVM) classifiers. The proposed method simulated with a proposed data set from different writers. The experimental results of the simulation show 94.44% recognition rate.
Most of today’s techniques encrypt all of the image data, which consumes a tremendous amount of time and computational payload. This work introduces a selective image encryption technique that encrypts predetermined bulks of the original image data in order to reduce the encryption/decryption time and the
computational complexity of processing the huge image data. This technique is applying a compression algorithm based on Discrete Cosine Transform (DCT). Two approaches are implemented based on color space conversion as a preprocessing for the compression phases YCbCr and RGB, where the resultant compressed sequence is selectively encrypted using randomly generated combined secret key.
The results showed a significant reduct