Email is one of the most commonly utilized communication methods. The confidentiality, the integrity and the authenticity are always substantial in communication of the e-mail, mostly in the business utilize. However, these security goals can be ensured only when the cryptography is utilized. Cryptography is a procedure of changing unique data into a configuration with the end goal that it is just perused by the coveted beneficiary. It is utilized to shield data from other individuals for security purposes. Cryptography algorithms can be classified as symmetric and asymmetric methods. Symmetric methods can be classified as stream cipher and block cipher. There are different operation modes provided by the block cipher, these are Cipher Block Chaining (CBC), Output Feedback (OFB), Cipher Feedback (CFB) and Electronic Code Block (ECB). CBC used to complex the cryptographic systems, by using Initialization Vector (IV), Xoring, and encryption with specified key over chain of blocks, but CBC is vulnerable to chosen plaintext attack because the IV is static and vulnerable to chosen ciphertext attack because the encryption method with the key are static. This paper introduce a proposed E-mail messages encryption systems , the proposal based on modified CBC mode operation hybrid with some of techniques exploited in the encryption such as RADG, DNA, RNA and a suggested permutation methods. The proposed modifications applied on the CBC are generate IV randomly, generate key randomly, and propose encryption method, these modifications proposed to avoid the attacks that CBC is vulnerable to.
This paper proposes a new structure of the hybrid neural controller based on the identification model for nonlinear systems. The goal of this work is to employ the structure of the Modified Elman Neural Network (MENN) model into the NARMA-L2 structure instead of Multi-Layer Perceptron (MLP) model in order to construct a new hybrid neural structure that can be used as an identifier model and a nonlinear controller for the SISO linear or nonlinear systems. Weight parameters of the hybrid neural structure with its serial-parallel configuration are adapted by using the Back propagation learning algorithm. The ability of the proposed hybrid neural structure for nonlinear system has achieved a fast learning with minimum number
... Show MoreZnO organic hybrid junction (electroluminescence EL device) was fabricated using phase segregation method. ZnO-nanoparticle (NPs) was prepared as a colloidal by self–assembly method of Zinc acetate solution with KOH solution. Nanoparticle is employed to form organic-inorganic hybrid film and generate white light emission, while N,N’–diphenyl-N,N’ –bis(3-methylphenyl)-1,1’-biphenyl 4,4’-diamine (TPD) and polymethyl methacrylate (PMMA) are adopted as the organic matrices. ZnO NPs was used to fabricate TPD: PMMA: ZnO NPs hybrid junction device. The photoluminescence (PL) and electroluminescence (EL) spectra of the TPD: PMMA: ZnO NPs hybrid device provided a broad emission band covering entirely the visible spectrum (∼350-∼700
... Show MoreSpin coating technique used to prepare ZnPc, CdS and ZnPc/CdS blend thin films, these films annealed at 423K for 1h, 2h and 3h. Optical behavior of these films were examined using UV-Vis. and PL. The absorption spectrum of ZnPc shows a decreasing in absorption with the increase of annealing time while CdS spectrum give a clearly absorption peak at~510 nm. Energy gap of ZnPc increases from 1.41 to 1.52 eV by increasing the annealing time. Eg of CdS decrease by increasing annealing time, from 2.3 eV to 2.2 eV. The intensities of the peaks obtained from PL spectra were strongly dependent on annealing time and confirmed the results obtained from UV-Vis. D.C. conductivity measurement showed that all the thin films have two differen
... Show MoreThis paper deals with proposing new lifting scheme (HYBRID Algorithm) that is capable of preventing images and documents which are fraud through decomposing there in to the real colors value arrays (red, blue and green) to create retrieval keys for its properties and store it in the database and then check the document originality by retrieve the query image or document through the decomposition described above and compare the predicted color values (retrieval keys) of the query document with those stored in the database. The proposed algorithm has been developed from the two known lifting schemes (Haar and D4) by merging them to find out HYBRID lifting scheme. The validity and accuracy of the proposed algorithm have been ev
... Show MoreThis paper reports a.c., d.c. conductivity and dielectric behavior of Ep-hybrid composite with12 Vol.% Kevlar-Carbon hybrid . D.C. conductivity measurements are conducted on the graded composites by using an electrometer over the temperature range from (293-413) K. It was shown then that conductivity increases by increasing number of Kevlar –Carbon fiber layers (Ep1, Ep2, Ep3), due to the high electrical conductivity of Carbon fiber. To identify the mechanism governing the conduction, the activation energies at low temperature region (LTR) and at high temperature region (HTR) have been calculated. The activation energy values for hybrid composite decrease with increasing number of fiber layers. The a.c. conductivity was measured over fr
... Show MoreBefore users store data in the cloud, many security issues must be addressed, as they will have no direct control over the data that has been outsourced to the cloud, particularly personal and sensitive data (health, finance, military, etc.). This article proposes a system based on chaotic maps for private key generation. A hybrid encryption for fast and secure cryptography. In addition to a multi-cloud storage with Pseudonymized file names to preserve user data privacy on the cloud while minimizing data loss. As well as a hash approach to check data integrity. AES in combination with RSA and fragmenting the file is used for the encryption. Integrity is cheeked using SHA-3. The experiments demonstrated that the key generation stra
... Show MoreModern ciphers are one of the more difficult to break cipher systems because these ciphers high security, high speed, non - propagation error and difficulty in breaking it. One of the most important weaknesses of stream cipher is a matching or correlation between the output key-stream and the output of shift registers.
This work considers new investigation methods for cryptanalysis stream cipher using ciphertext only attack depending on Particle Swarm Optimization (PSO) for the automatic extraction for the key. It also introduces a cryptanalysis system based on PSO with suggestion for enhancement of the performance of PSO, by using Simulated Annealing (SA). Additionally, it presents a comparison for the cryptanal
... Show MoreSentiment analysis refers to the task of identifying polarity of positive and negative for particular text that yield an opinion. Arabic language has been expanded dramatically in the last decade especially with the emergence of social websites (e.g. Twitter, Facebook, etc.). Several studies addressed sentiment analysis for Arabic language using various techniques. The most efficient techniques according to the literature were the machine learning due to their capabilities to build a training model. Yet, there is still issues facing the Arabic sentiment analysis using machine learning techniques. Such issues are related to employing robust features that have the ability to discrimina
... Show More