This work presents an approach for the applying Triple DES (TRIPLE DES) based on using genetic algorithm by adding intelligent feature for TRIPLE DES with N round for genetic algorithm. Encapsulated cipher file with special program which send an acknowledgment to a sender to know who decipher or broken to crash it , Thus it is considered as the initial step to improve privacy. The outcome for proposed system gives a good indication that it is a promising system compared with other type of cipher system.
With the development of high-speed network technologies, there has been a recent rise in the transfer of significant amounts of sensitive data across the Internet and other open channels. The data will be encrypted using the same key for both Triple Data Encryption Standard (TDES) and Advanced Encryption Standard (AES), with block cipher modes called cipher Block Chaining (CBC) and Electronic CodeBook (ECB). Block ciphers are often used for secure data storage in fixed hard drives, portable devices, and safe network data transport. Therefore, to assess the security of the encryption method, it is necessary to become familiar with and evaluate the algorithms of cryptographic systems. Block cipher users need to be sure that the ciphers the
... Show MoreIn the present work, heterojunction diode detectors will be prepared using germanium wafers as a substrate material and 200 nm tin sulfide thickness will be evaporated by using thermal evaporation method as thin film on the substrate. Nd:YAG laser (λ=532 nm) with different energy densities (5.66 J/cm2 and 11.32 J/cm2) is used to diffuse the SnS inside the surface of the germanium samples with 10 laser shots in different environments (vacuum and distilled water). I-V characteristics in the dark illumination, C-V characteristics, transmission measurements, spectral responsivity and quantum efficiency were investigated at 300K. The C-V measurements have shown that the heterojunction were of abrupt type and the maximum value of build-in pot
... Show MorePorous silicon (PS) layers were formed on n-type silicon (Si) wafers using Photo- electrochemical Etching technique (PEC) was used to produce porous silicon for n-type with orientation of (111). The effects of current density were investigated at: (10, 20, 30, 40, and50) mA/cm2 with etching time: 10min. X-ray diffraction studies showed distinct variations between the fresh silicon surface and the synthesized porous silicon. The maximum crystal size of Porous Silicon is (33.9nm) and minimum is (2.6nm) The Atomic force microscopy (AFM) analysis and Field Emission Scanning Electron Microscope (FESEM) were used to study the morphology of porous silicon layer. AFM results showed that root mean square (RMS) of roughness and the grain size of p
... Show MoreAt the level of both individuals and companies, Wireless Sensor Networks (WSNs) get a wide range of applications and uses. Sensors are used in a wide range of industries, including agriculture, transportation, health, and many more. Many technologies, such as wireless communication protocols, the Internet of Things, cloud computing, mobile computing, and other emerging technologies, are connected to the usage of sensors. In many circumstances, this contact necessitates the transmission of crucial data, necessitating the need to protect that data from potential threats. However, as the WSN components often have constrained computation and power capabilities, protecting the communication in WSNs comes at a significant performance pena
... Show MorePattern matching algorithms are usually used as detecting process in intrusion detection system. The efficiency of these algorithms is affected by the performance of the intrusion detection system which reflects the requirement of a new investigation in this field. Four matching algorithms and a combined of two algorithms, for intrusion detection system based on new DNA encoding, are applied for evaluation of their achievements. These algorithms are Brute-force algorithm, Boyer-Moore algorithm, Horspool algorithm, Knuth-Morris-Pratt algorithm, and the combined of Boyer-Moore algorithm and Knuth–Morris– Pratt algorithm. The performance of the proposed approach is calculated based on the executed time, where these algorithms are applied o
... Show MoreA new ligand [N-(4-methoxy benzoyl amino)-thioxo methyl ] leucine (MBL) was prepared from the reaction of (4-methoxy benzoyl isothiocyanate with leucine acid in molar ratio (l:l), it was characterized by elemental analysis (C.H.N.S), FT-IR, UV-Vis, 1H and 13C-NMR. The complexes of the bivalent ions (Mn, Fe, Co, Ni, Cu, Zn, Cd and Hg ) have been prepared and characterized too. The structural was established by elemental analysis (C.H.N.S), FT-IR, UV-Vis spectra, conductivity measurements atomic absorption and magnetic susceptibility and determination of molar ration (M:L). The complexes showed characteristic behavior of tetrahedral geometry around the metal ions except with (Cu) complex showed square planer.
Rapid, reproducible and accurate method has been developed for the assay for of mebendazol (MBZ) residual assay. The method is based on alkaline hydrolysis of MBZ with sodium hydroxide then oxidation with N-bromosuccinimide (NBS) followed by coupling with 4-Bromoaniline (4-BA) to yield a highly colored product absorbed at maximum 434 nm. Regression analysis of linearity range was found (0.6-2.8) µg.ml-1. The optimum conditions that affect the oxidation were studied. The developed method was found to be precise with mean value of relative standard deviation (1.153- 1.303) and accurate with relative error (-0.5940-1.7821) .The calculated molar absorptivity and sandal sensitivity values of (29825 L.mol-1.cm-1), 0.0099 µg.cm-2 respe
... Show More