The modern systems that have been based upon the hash function are more suitable compared to the conventional systems; however, the complicated algorithms for the generation of the invertible functions have a high level of time consumption. With the use of the GAs, the key strength is enhanced, which results in ultimately making the entire algorithm sufficient. Initially, the process of the key generation is performed by using the results of n-queen problem that is solved by the genetic algorithm, with the use of a random number generator and through the application of the GA operations. Ultimately, the encryption of the data is performed with the use of the Modified Reverse Encryption Algorithm (MREA). It was noticed that the suggested algorithm provided more sufficient results concerning the key and the strength of security. However, it has lower computational efficiency as compared to the other algorithms.
This paper presents the dynamic responses of generators in a multi-machine power system. The fundamental swing equations for a multi-machine stability analysis are revisited. The swing equations are solved to investigate the influence of a three-phase fault on the network largest load bus. The Nigerian 330kV transmission network was used as a test case for the study. The time domain simulation approach was explored to determine if the system could withstand a 3-phase fault. The stability of the transmission network is estimated considering the dynamic behaviour of the system under various contingency conditions. This study identifies Egbin, Benin, Olorunsogo, Akangba, Sakete, Omotosho and Oshogbo as the key buses w
... Show MoreGlobally, the COVID-19 pandemic’s development has presented significant societal and economic challenges. The carriers of COVID-19 transmission have also been identified as asymptomatic infected people. Yet, most epidemic models do not consider their impact when accounting for the disease’s indirect transmission. This study suggested and investigated a mathematical model replicating the spread of coronavirus disease among asymptomatic infected people. A study was conducted on every aspect of the system’s solution. The equilibrium points and the basic reproduction number were computed. The endemic equilibrium point and the disease-free equilibrium point had both undergone local stability analyses. A geometric technique was used
... Show MoreThis article investigates how an appropriate chaotic map (Logistic, Tent, Henon, Sine...) should be selected taking into consideration its advantages and disadvantages in regard to a picture encipherment. Does the selection of an appropriate map depend on the image properties? The proposed system shows relevant properties of the image influence in the evaluation process of the selected chaotic map. The first chapter discusses the main principles of chaos theory, its applicability to image encryption including various sorts of chaotic maps and their math. Also this research explores the factors that determine security and efficiency of such a map. Hence the approach presents practical standpoint to the extent that certain chaos maps will bec
... Show MoreRecently, with the development multimedia technologies and wireless telecommunication, Voice over Internet Protocol, becomes widely used in communication between connecting people, VoIP allows people that are connected to the local network or the Internet to make voice calls using digital connection instead of based on the analog traditional telephone network. The technologies of Internet doesn’t give any security mechanism and there is no way to guarntee that the voice streams will be transmitted over Internet or network have not been intercepted in between. In this paper, VoIP is developed using stream cipher algorithm and the chaotic cryptography for key generator. It is based on the chaotic maps for generating a one-time rando
... Show MoreEpoxy (EP) – Silica (SiO2) composites are well known composites used in microelectronic industry . So it is important to study their dielectric behavior under different conditions such as
the presence carbon black (UV absorber) and immersion in the water for 30 days .
Dielectric properties were calculated over the frequency range 102 – 106 Hz for epoxy composites with different weight % of micrometer 1.5μm SiO2 particles (60%, 65% and 70wt%) modified with 0.5wt% silane coupling agent to improve adhesion between EP and SiO2 phases .
The success of endodontic therapy is relied on radicular system cleaning, shaping, elimination of micro-organisms, and three dimensional filling of the radicular complex.This study was conducted to develop and assess new root canal sealer incorporating nano-sized bioactive glass into Gutta Flow II. The following concentration was used depend on a pilot study included adding (3%) of 45S5 bioactive glass into the Gutta Flow II. These materials were tested through assessment bioactivity. bioactivity test was undertaken after immersion of the tested samples into PBS for three days, seven days, fourteen days, and twenty eight days using FTIR too. study was found that it’s peaks was appear at level 800-1000 cm-1. The results showed that GFII gr
... Show MoreAbstract
In light of the great technological development and the emergence of globalization has increased global competition, where it became competitive exercise pressure on all sectors. In light of this companies mast enviorment depend on the means that keeps them on the competitive position through access to information about competitors in order to help them to draw a strategy that will achieve a competitive edge either through excellence or reduce the costs of their products and this means intelligence competitive and reverse engineering that help to gain information on competitors analyze and put of the decision-maker From this point formed the idea of research in the statement of the role of
... Show MoreNarcissism is a complicated phenomenon that can be reflected in the narcissist’s language. Investigating narcissism in terms of linguistics, and pragmatics in particular, does not seem to have been given its due attention, as this study reveals. Thus, this study is an endeavor to discover how narcissism is reflected in the American movie Big Eyes (2014). It is known for introducing narcissistic behaviors. This paper aims to identify the types, motivations, and pragmatic manifestations of narcissism in the selected movie. Three pragmatic theories are chosen to scrutinize narcissism in the data: Searle’s speech acts (1969), Grice’s maxims breaching (1975), and Culppeper’s impoliteness (1996). To cope with the nature of the
... Show More