Email is one of the most commonly utilized communication methods. The confidentiality, the integrity and the authenticity are always substantial in communication of the e-mail, mostly in the business utilize. However, these security goals can be ensured only when the cryptography is utilized. Cryptography is a procedure of changing unique data into a configuration with the end goal that it is just perused by the coveted beneficiary. It is utilized to shield data from other individuals for security purposes. Cryptography algorithms can be classified as symmetric and asymmetric methods. Symmetric methods can be classified as stream cipher and block cipher. There are different operation modes provided by the block cipher, these are Cipher Block Chaining (CBC), Output Feedback (OFB), Cipher Feedback (CFB) and Electronic Code Block (ECB). CBC used to complex the cryptographic systems, by using Initialization Vector (IV), Xoring, and encryption with specified key over chain of blocks, but CBC is vulnerable to chosen plaintext attack because the IV is static and vulnerable to chosen ciphertext attack because the encryption method with the key are static. This paper introduce a proposed E-mail messages encryption systems , the proposal based on modified CBC mode operation hybrid with some of techniques exploited in the encryption such as RADG, DNA, RNA and a suggested permutation methods. The proposed modifications applied on the CBC are generate IV randomly, generate key randomly, and propose encryption method, these modifications proposed to avoid the attacks that CBC is vulnerable to.
sensor sampling rate (SSR) may be an effective and crucial field in networked control systems. Changing sensor sampling period after designing the networked control system is a critical matter for the stability of the system. In this article, a wireless networked control system with multi-rate sensor sampling is proposed to control the temperature of a multi-zone greenhouse. Here, a behavior based Mamdany fuzzy system is used in three approaches, first is to design the fuzzy temperature controller, second is to design a fuzzy gain selector and third is to design a fuzzy error handler. The main approach of the control system design is to control the input gain of the fuzzy temperature controller depending on the cur
... Show MoreFuzzy logic is used to solve the load flow and contingency analysis problems, so decreasing computing time and its the best selection instead of the traditional methods. The proposed method is very accurate with outstanding computation time, which made the fuzzy load flow (FLF) suitable for real time application for small- as well as large-scale power systems. In addition that, the FLF efficiently able to solve load flow problem of ill-conditioned power systems and contingency analysis. The FLF method using Gaussian membership function requires less number of iterations and less computing time than that required in the FLF method using triangular membership function. Using sparsity technique for the input Ybus sparse matrix data gi
... Show MoreConstruction projects need methods and techniques to ensure the level of quality and commensurate with the level required and documented in the project contract. The quality of the project is affected by the quality of the inputs and accompanying procedures in the construction of the project.
Al-Rumaitha residential project found that the quality of the concrete for the ceilings in the research sample (the roof of the third floor of buildings A25 and A26) and (roof of the second floor of buildings A27, A28, A29, A30, A31, A32 and A33) and roof of buildings A15 and A16 A19)) is not the required quality level.
The idea of the research came after the need to improve the performance o
... Show MoreAbstract
The project of balad's major sewerage system is one of the biggest projects who is still in progress in salahulddin province provincial - development plan that was approved in 2013 . This project works in two parts ; the 1st is installing the sewerage networks (both of heavy sewerage & rain sewerage) and the 2nd is installing the life – off units (for heavy sewerage & rain sewerage , as well) . the directorate of salahuiddin is aiming that at end of construction it will be able to provide services for four residential quarters , one of the main challenges that project's management experience is how to achieve thes
... Show MoreThis research has come out with that, function-based responsibility accounting system has harmful side – effects preventing it of achieving its controlling objective, that is, goal congruence, which are due to its un integrated measures, its focus on measuring measurable behaviors while neglecting behaviors that are hardly measured, and its dependence on standard operating procedures.
In addition, the system hypotheses and measures are designed to fit previous business environment, not the current environment.
The research has also concluded that the suggestive model, that is, activity-based responsibility accounting is designed to get ride of harmful side – effects of functi
... Show MoreIn this paper, a FPGA model of intelligent traffic light system with power saving was built. The intelligent traffic light system consists of sensors placed on the side's ends of the intersection to sense the presence or absence of vehicles. This system reduces the waiting time when the traffic light is red, through the transition from traffic light state to the other state, when the first state spends a lot of time, because there are no more vehicles. The proposed system is built using VHDL, simulated using Xilinx ISE 9.2i package, and implemented using Spartan-3A XC3S700A FPGA kit. Implementation and Simulation behavioral model results show that the proposed intelligent traffic light system model satisfies the specified operational req
... Show MoreThe nature of the political system of any country in the international system must have an impact on the policy of the State, whether in the interior or exterior, both regional and international, Turkey is one of the most important countries in the Middle East, which have a place and effectiveness on the surrounding environment, hence the importance of research lies in its political system and the transfer of power in it and its transformation from the form of the parliamentary system to the presidential system of the repercussions of the task and mutual effects between Turkey and the countries of the surrounding region in terms of the extent of achieving political stability in the Turkish interior or not and how this can be refl
... Show MoreIn this paper the design of hybrid retina matching algorithm that is used in identification systems is considered. Retina based recognition is apparent as the most secure method for identification of an identity utilized to differentiate persons.
The characteristics of Speeded up Robust Feature (SURF) and Binary Robust Invariant Scalable Key-Points (BRISK) algorithm have been used in order to produce a fast matching algorithm than the classical ones, those characteristics are important for real-time applications which usually need quick processing of a growing quantity of data. The algorithm is divided into three stages: retinal image processing and segmentation, extracting the lo
... Show MoreA characteristic study of a passively Q-switched diode pumped solid state laser system is presented in this work. For laser a comparison study for the theoretically calculated results with a simulation results using a software which calculates the Q-switched solid state laser parameters was such as energy, peak power and pulse width were performed. There was a good agreement between our theoretical calculations and the simulation values.
Algeria is one of the states that are important to the Ottoman state, because of its geographic location is important to the Mediterranean Sea, as well as the economic resources of the nature of its soil geography and climate,diverse, making it the focus of attention of the Ottomans, along with the van, which has increased the interest of the Ottomans in Algeriais the fall Andalusat the hands of the Spaniardsin1492, and force the Muslims to get out of them, and did not Only Europeans do it, butrushed to the prosecution of Muslims tothe coast of North Africa and seizing control of manyofits ports and cities, prompting the Ottoman state to go forth and back to the barn Muslims,Especially after hehad appealed to the Arabs of the Ottoman sta
... Show More