Data security is a significant requirement in our time. As a result of the rapid development of unsecured computer networks, the personal data should be protected from unauthorized persons and as a result of exposure AES algorithm is subjected to theoretical attacks such as linear attacks, differential attacks, and practical attacks such as brute force attack these types of attacks are mainly directed at the S-BOX and since the S-BOX table in the algorithm is static and no dynamic so this is a major weakness for the S-BOX table, the algorithm should be improved to be impervious to future dialects that attempt to analyse and break the algorithm in order to remove these weakness points, Will be generated dynamic substitution box (S-BOX) base on the input key, shifting, chaotic theory (1D, 2D logistic map), and particle swarm algorithm. At the same time will be generated inverse of the table S-BOX through output of the S-BOX which will be generated from the suggestions above will return the values of the union of the row and the column for all the values generated for S-BOX. The S-BOX output is tested in several measurements represent (complexity, time, avalanche criterion, and balance) and the results show that any change in the input will change the output S-BOX also the proposed algorithm will be measured by the five statistical and NIST measurements all results will show a successful exception random excursions, random excursions variant (test not application ). The time needed to implement it requires only milliseconds and is approximated to the time taken for the original algorithm.
Using the Neural network as a type of associative memory will be introduced in this paper through the problem of mobile position estimation where mobile estimate its location depending on the signal strength reach to it from several around base stations where the neural network can be implemented inside the mobile. Traditional methods of time of arrival (TOA) and received signal strength (RSS) are used and compared with two analytical methods, optimal positioning method and average positioning method. The data that are used for training are ideal since they can be obtained based on geometry of CDMA cell topology. The test of the two methods TOA and RSS take many cases through a nonlinear path that MS can move through that region. The result
... Show MoreUsing the Neural network as a type of associative memory will be introduced in this paper through the problem of mobile position estimation where mobile estimate its location depending on the signal strength reach to it from several around base stations where the neural network can be implemented inside the mobile. Traditional methods of time of arrival (TOA) and received signal strength (RSS) are used and compared with two analytical methods, optimal positioning method and average positioning method. The data that are used for training are ideal since they can be obtained based on geometry of CDMA cell topology. The test of the two methods TOA and RSS take many cases through a nonlinear path that MS can move through tha
... Show MoreThe Disi water samples were collected from different Disi aquifer wells in Jordan using a clean polyethylene container of 10-liter size. A hyper-pure germanium (HPGe) detector with high- resolution gamma-ray spectroscopy and a low background counting system was used for the identification of unknown gamma-rays emitting from radionuclides in the environmental samples. The ranges of specific activity concentrations of 226Ra and 228Ra in the Disi aquifer water were found to be from 0.302 ± 0.085 to 0.723 ± 0.207 and from 0.047 ± 0.010 to 0.525 ± 0.138 Bq L−1, with average values of 0.516 ± 0.090 and 0.287 ± 0.091 Bq L−1, respectively. The average combined radium (226Ra + 228Ra) activity and radium activity ratio (228Ra/226Ra) in Disi
... Show MoreAbstract Throughout this paper R represents commutative ring with identity and M is a unitary left R-module, the purpose of this paper is to study a new concept, (up to our knowledge), named St-closed submodules. It is stronger than the concept of closed submodules, where a submodule N of an R-module M is called St-closed (briefly N ≤Stc M) in M, if it has no proper semi-essential extensions in M, i.e if there exists a submodule K of M such that N is a semi-essential submodule of K then N = K. An ideal I of R is called St-closed if I is an St-closed R-submodule. Various properties of St-closed submodules are considered.
In this review paper, several studies and researches were surveyed for assisting future researchers to identify available techniques in the field of classification of Synthetic Aperture Radar (SAR) images. SAR images are becoming increasingly important in a variety of remote sensing applications due to the ability of SAR sensors to operate in all types of weather conditions, including day and night remote sensing for long ranges and coverage areas. Its properties of vast planning, search, rescue, mine detection, and target identification make it very attractive for surveillance and observation missions of Earth resources. With the increasing popularity and availability of these images, the need for machines has emerged to enhance t
... Show MoreThe present study deals with prepositions in the patterns of analytical unite of modern Russian language out of the functional -semantic aspects, which enhances the lexical semantics. The study, also, sheds light on the prepositions of semantic derivation that adds value to the meaning of the unites, promotes the appearance of new forms that match the more important diverse complex analytical unit.
В статье рассмотрены отыменные предлоги в системе литических единиц русского языка с позиций функционального и семантического аспектов. Репрезентирована специфика функциониров
... Show MoreMany tools and techniques have been recently adopted to develop construction materials that are less harmful and friendlier to the environment. New products can be achieved through the recycling of waste material. Thus, this study aims to use recycled glass bottles as sustainable materials.
Our challenge is to use nano glass powder by the addition or replacement of the weight of the cement for producing concrete with enhanced strength.
A nano recycled glass p
Sixteen water samples were collected from the operation units of the Al-Quds
power plant, north Baghdad city and the surrounding trocars, surface and
groundwater, and analyzed to assess the resulting pollution. The samples were
analyzed for heavy metals (As, Cd, Cr, Cu, Mn, Mo, Ni, Pb, Sb, Se, U and Zn) by
using inductively coupled plasma- mass spectrometry (ICP-MS). The results were
compared with local and international and standard limits. Heavy metals analysis of
the water samples shows that water of operation units and trocars have mean
concentrations of As, Cd, Cr, Cu, Mo, Pb, Sb, Se, U and Zn were within or lower
than the national and world limits, while Mn and Ni were higher than these limits.
Concentrat
This paper concerned with estimation reliability ( for K components parallel system of the stress-strength model with non-identical components which is subjected to a common stress, when the stress and strength follow the Generalized Exponential Distribution (GED) with unknown shape parameter α and the known scale parameter θ (θ=1) to be common. Different shrinkage estimation methods will be considered to estimate  depending on maximum likelihood estimator and prior estimates based on simulation using mean squared error (MSE) criteria. The study approved that the shrinkage estimation using shrinkage weight function was the best.
This paper is concerned with introducing and studying the first new approximation operators using mixed degree system and second new approximation operators using mixed degree system which are the core concept in this paper. In addition, the approximations of graphs using the operators first lower and first upper are accurate then the approximations obtained by using the operators second lower and second upper sincefirst accuracy less then second accuracy. For this reason, we study in detail the properties of second lower and second upper in this paper. Furthermore, we summarize the results for the properties of approximation operators second lower and second upper when the graph G is arbitrary, serial 1, serial 2, reflexive, symmetric, tra
... Show More