Cryptography is the process of transforming message to avoid an unauthorized access of data. One of the main problems and an important part in cryptography with secret key algorithms is key. For higher level of secure communication key plays an important role. For increasing the level of security in any communication, both parties must have a copy of the secret key which, unfortunately, is not that easy to achieve. Triple Data Encryption Standard algorithm is weak due to its weak key generation, so that key must be reconfigured to make this algorithm more secure, effective, and strong. Encryption key enhances the Triple Data Encryption Standard algorithm securities. This paper proposed a combination of two efficient encryption algorithms to satisfy the purpose of information security by adding a new level of security to Triple Data Encryption Standard algorithm using Nth Degree Truncated Polynomial Ring Unit algorithm. This aim achieved by adding two new key functions, the first one is Enckey(), and the second one is Deckey() for encryption and decryption key of Triple Data Encryption Standard to make this algorithm more stronger. The obtained results of this paper also have good resistance against brute-force attack which makes the system more effective by applying Nth Degree Truncated Polynomial Ring Unit algorithm to encrypt and decrypt key of Triple Data Encryption Standard. Also, these modifications enhance the degree of complexity, increase key search space, and make the ciphered message difficult to be cracked by the attacker.
In this paper, a new procedure is introduced to estimate the solution for the three-point boundary value problem which is instituted on the use of Morgan-Voyce polynomial. In the beginning, Morgan-Voyce polynomial along with their important properties is introduced. Next, this polynomial with aid of the collocation method utilized to modify the differential equation with boundary conditions to the algebraic system. Finally, the examples approve the validity and accuracy of the proposed method.
In this paper reliable computational methods (RCMs) based on the monomial stan-dard polynomials have been executed to solve the problem of Jeffery-Hamel flow (JHF). In addition, convenient base functions, namely Bernoulli, Euler and Laguerre polynomials, have been used to enhance the reliability of the computational methods. Using such functions turns the problem into a set of solvable nonlinear algebraic system that MathematicaⓇ12 can solve. The JHF problem has been solved with the help of Improved Reliable Computational Methods (I-RCMs), and a review of the methods has been given. Also, published facts are used to make comparisons. As further evidence of the accuracy and dependability of the proposed methods, the maximum error remainder
... Show MoreAnalysis the economic and financial phenomena and other requires to build the appropriate model, which represents the causal relations between factors. The operation building of the model depends on Imaging conditions and factors surrounding an in mathematical formula and the Researchers target to build that formula appropriately. Classical linear regression models are an important statistical tool, but used in a limited way, where is assumed that the relationship between the variables illustrations and response variables identifiable. To expand the representation of relationships between variables that represent the phenomenon under discussion we used Varying Coefficient Models
... Show MoreSocial media and networks rely heavily on images. Those images should be distributed in a private manner. Image encryption is therefore one of the most crucial components of cyber security. In the present study, an effective image encryption technique is developed that combines the Rabbit Algorithm, a simple algorithm, with the Attractor of Aizawa, a chaotic map. The lightweight encryption algorithm (Rabbit Algorithm), which is a 3D dynamic system, is made more secure by the Attractor of Aizawa. The process separates color images into blocks by first dividing them into bands of red, green, and blue (RGB). The presented approach generates multiple keys, or sequences, based on the initial parameters and conditions, which are
... Show MoreThe PET scans provide images that pinpoint the anatomic location of abnormal metabolic activity within the body. A radionuclide suitable for labeling a wide range of radiopharmaceuticals for positron emission tomography imaging is used also for local therapy of tumors. Among the possible methods for cyclotron production of radionuclide used in PET. We investigate the proton irradiation to produce the standard radionuclide (15O, 11C,1 3N, 18F) and some non-standard Radionuclide (76Br,124I,60Cu,66Ga,86Y and 89Zr). The total integral yield based on the main published and approved experimental results of excitation functions were calculated.
Six house-hold Abyssinian pumps distributed in different villages of Mansoura (Mans-I, Mans-II and Mans-III) and Talkha (Talk-I, Talk-II and Talk-III) cities, Egypt, have been selected for regular seasonal water quality assessment during 2017. Water samples have been collected within the mid-periods of four seasons Standard assessment tools were employed for the integrated water quality assessment including Water Quality Index (WQI) and ISO standard algal toxicity test. WQI displayed remarkable local and seasonal variations with excellent (≥ 90) and good (70 - 89) only recorded for water samples collected from Mans-I pump located in sparsely populated area and far 50 meters only from the eastern (Damietta) branch of Nile River. WQI of
... Show MoreThis study was conducted to determine the ability of water treatment system (Vortisand) to reduce some chemical and physical properties for tigris river raw water, It consisted of turbidity, electrical conductivity, pH, total hardness, calcium Hardness as well as temperature in order to determine the unit`s efficiency for reducing their concentration as compared to those in the water produced by some classical potable water projects (Dora and Wathba) in Baghdad. Samples were collected during the cold months (December 2016 and January 2017) and during the hot months (May and June 2017). The results showed that this system has the ability to reduce some properties such as turbidity, the values were 215NTU in raw water and decreased to NTU
... Show MoreA cap of size and degree in a projective space, (briefly; (k,r)-cap) is a set of points with the property that each line in the space meet it in at most points. The aim of this research is to extend the size and degree of complete caps and incomplete caps, (k, r)-caps of degree r<12 in the finite projective space of dimension three over the finite field of order eleven, which already exist and founded by the action of subgroups of the general linear group over the finite field of order eleven and degree four, to (k+i,r+1) -complete caps. These caps have been classified by giving the t_i-distribution and -distribution. The Gap programming has been used to execute the designed algorit
... Show MoreFrequent data in weather records is essential for forecasting, numerical model development, and research, but data recording interruptions may occur for various reasons. So, this study aims to find a way to treat these missing data and know their accuracy by comparing them with the original data values. The mean method was used to treat daily and monthly missing temperature data. The results show that treating the monthly temperature data for the stations (Baghdad, Hilla, Basra, Nasiriya, and Samawa) in Iraq for all periods (1980-2020), the percentage for matching between the original and the treating values did not exceed (80%). So, the period was divided into four periods. It was noted that most of the congruence values increased, re
... Show More