Cryptography is the process of transforming message to avoid an unauthorized access of data. One of the main problems and an important part in cryptography with secret key algorithms is key. For higher level of secure communication key plays an important role. For increasing the level of security in any communication, both parties must have a copy of the secret key which, unfortunately, is not that easy to achieve. Triple Data Encryption Standard algorithm is weak due to its weak key generation, so that key must be reconfigured to make this algorithm more secure, effective, and strong. Encryption key enhances the Triple Data Encryption Standard algorithm securities. This paper proposed a combination of two efficient encryption algorithms to satisfy the purpose of information security by adding a new level of security to Triple Data Encryption Standard algorithm using Nth Degree Truncated Polynomial Ring Unit algorithm. This aim achieved by adding two new key functions, the first one is Enckey(), and the second one is Deckey() for encryption and decryption key of Triple Data Encryption Standard to make this algorithm more stronger. The obtained results of this paper also have good resistance against brute-force attack which makes the system more effective by applying Nth Degree Truncated Polynomial Ring Unit algorithm to encrypt and decrypt key of Triple Data Encryption Standard. Also, these modifications enhance the degree of complexity, increase key search space, and make the ciphered message difficult to be cracked by the attacker.
Gangyong Lee, S. Tariq Rizvi, and Cosmin S. Roman studied Dual Rickart modules. The main purpose of this paper is to define strong dual Rickart module. Let M and N be R- modules , M is called N- strong dual Rickart module (or relatively sd-Rickart to N)which is denoted by M it is N-sd- Rickart if for every submodule A of M and every homomorphism fHom (M , N) , f (A) is a direct summand of N. We prove that for an R- module M , if R is M-sd- Rickart , then every cyclic submodule of M is a direct summand . In particular, if M<
... Show MoreThe aerodynamic characteristics of general three-dimensional rectangular wings are considered using non-linear interaction between two-dimensional viscous-inviscid panel method and vortex ring method. The potential flow of a two-dimensional airfoil by the pioneering Hess & Smith method was used with viscous laminar, transition and turbulent boundary layer to solve flow about complex configuration of airfoils including stalling effect. Viterna method was used to extend the aerodynamic characteristics of the specified airfoil to high angles of attacks. A modified vortex ring method was used to find the circulation values along span wise direction of the wing and then interacted with sectional circulation obtained by Kutta-Joukowsky theorem of
... Show MoreSteganography is a useful technique that helps in securing data in communication using different data carriers like audio, video, image and text. The most popular type of steganography is image steganography. It mostly uses least significant bit (LSB) technique to hide the data but the probability of detecting the hidden data using this technique is high. RGB is a color model which uses LSB to hide the data in three color channels, where each pixel is represented by three bytes to indicate the intensity of red, green and blue in that pixel. In this paper, steganography based RGB image is proposed which depends on genetic algorithm (GA). GA is used to generate random key that represents the best ordering of secret (image/text) blocks to b
... Show MoreThe paper is devoted to solve nth order linear delay integro-differential equations of convolution type (DIDE's-CT) using collocation method with the aid of B-spline functions. A new algorithm with the aid of Matlab language is derived to treat numerically three types (retarded, neutral and mixed) of nth order linear DIDE's-CT using B-spline functions and Weddle rule for calculating the required integrals for these equations. Comparison between approximated and exact results has been given in test examples with suitable graphing for every example for solving three types of linear DIDE's-CT of different orders for conciliated the accuracy of the results of the proposed method.
This work evaluates the influence of combining twisted fins in a triple-tube heat exchanger utilised for latent heat thermal energy storage (LHTES) in three-dimensional numerical simulation and comparing the outcome with the cases of the straight fins and no fins. The phase change material (PCM) is in the annulus between the inner and the outer tube, these tubes include a cold fluid that flows in the counter current path, to solidify the PCM and release the heat storage energy. The performance of the unit was assessed based on the liquid fraction and temperature profiles as well as solidification and the energy storage rate. This study aims to find suitable and efficient fins number and the optimum values of the Re and the inlet tem
... Show MoreWith the development of communication technologies for mobile devices and electronic communications, and went to the world of e-government, e-commerce and e-banking. It became necessary to control these activities from exposure to intrusion or misuse and to provide protection to them, so it's important to design powerful and efficient systems-do-this-purpose. It this paper it has been used several varieties of algorithm selection passive immune algorithm selection passive with real values, algorithm selection with passive detectors with a radius fixed, algorithm selection with passive detectors, variable- sized intrusion detection network type misuse where the algorithm generates a set of detectors to distinguish the self-samples. Practica
... Show MoreRadio observations from astronomical sources like supernovae became one the most important sources of information about the physical properties of those objects. However, such radio observations are affected by various types of noise such as those from sky, background, receiver, and the system itself. Therefore, it is essential to eliminate or reduce these undesired noise from the signals in order to ensure accurate measurements and analysis of radio observations. One of the most commonly used methods for reducing the noise is to use a noise calibrator. In this study, the 3-m Baghdad University Radio Telescope (BURT) has been used to observe crab nebula with and without using a calibration unit in order to investigate its impact on the sign
... Show MoreRadio observations from astronomical sources like supernovae became one the most important sources of information about the physical properties of those objects. However, such radio observations are affected by various types of noise such as those from sky, background, receiver, and the system itself. Therefore, it is essential to eliminate or reduce these undesired noise from the signals in order to ensure accurate measurements and analysis of radio observations. One of the most commonly used methods for reducing the noise is to use a noise calibrator. In this study, the 3-m Baghdad University Radio Telescope (BURT) has been used to observe crab nebula with and without using a calibration unit in order to investigate its impact on the sign
... Show More