Preferred Language
Articles
/
ijs-6300
Secure Big Data Transmission based on Modified Reverse Encryption and Genetic Algorithm
...Show More Authors

      The modern systems that have been based upon the hash function are more suitable compared to the conventional systems; however, the complicated algorithms for the generation of the invertible functions have a high level of time consumption. With the use of the GAs, the key strength is enhanced, which results in ultimately making the entire algorithm sufficient. Initially, the process of the key generation is performed by using the results of n-queen problem that is solved by the genetic algorithm, with the use of a random number generator and through the application of the GA operations. Ultimately, the encryption of the data is performed with the use of the Modified Reverse Encryption Algorithm (MREA). It was noticed that the suggested algorithm provided more sufficient results concerning the key and the strength of security. However, it has lower computational efficiency as compared to the other algorithms.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Jan 30 2020
Journal Name
Journal Of Engineering
Dynamic Response Assessment of the Nigerian 330kV Transmission System
...Show More Authors

This paper presents the dynamic responses of generators in a multi-machine power system.  The fundamental swing equations for a multi-machine stability analysis are revisited. The swing equations are solved to investigate the influence of a three-phase fault on the network largest load bus. The Nigerian 330kV transmission network was used as a test case for the study. The time domain simulation approach was explored to determine if the system could withstand a 3-phase fault. The stability of the transmission network is estimated considering the dynamic behaviour of the system under various contingency conditions. This study identifies Egbin, Benin, Olorunsogo, Akangba, Sakete, Omotosho and Oshogbo as the key buses w

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue May 16 2023
Journal Name
Mathematics
A Mathematical Study for the Transmission of Coronavirus Disease
...Show More Authors

Globally, the COVID-19 pandemic’s development has presented significant societal and economic challenges. The carriers of COVID-19 transmission have also been identified as asymptomatic infected people. Yet, most epidemic models do not consider their impact when accounting for the disease’s indirect transmission. This study suggested and investigated a mathematical model replicating the spread of coronavirus disease among asymptomatic infected people. A study was conducted on every aspect of the system’s solution. The equilibrium points and the basic reproduction number were computed. The endemic equilibrium point and the disease-free equilibrium point had both undergone local stability analyses. A geometric technique was used

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Thu Feb 15 2024
Journal Name
Journal Of Theoretical And Applied Information Technology
CHOOSING THE RIGHT CHAOTIC MAP FOR IMAGE ENCRYPTION: A DETAILED EXAMINATION
...Show More Authors

This article investigates how an appropriate chaotic map (Logistic, Tent, Henon, Sine...) should be selected taking into consideration its advantages and disadvantages in regard to a picture encipherment. Does the selection of an appropriate map depend on the image properties? The proposed system shows relevant properties of the image influence in the evaluation process of the selected chaotic map. The first chapter discusses the main principles of chaos theory, its applicability to image encryption including various sorts of chaotic maps and their math. Also this research explores the factors that determine security and efficiency of such a map. Hence the approach presents practical standpoint to the extent that certain chaos maps will bec

... Show More
View Publication
Scopus
Publication Date
Thu Jan 14 2021
Journal Name
Iraqi Journal Of Science
VoIP Speech Encryption System Using Stream Cipher with Chaotic Key Generator
...Show More Authors

Recently, with the development multimedia technologies and wireless telecommunication, Voice over Internet Protocol, becomes widely used in communication between connecting people, VoIP allows people that are connected to the local network or the Internet to make voice calls using digital connection instead of based on the analog traditional telephone network. The technologies of Internet doesn’t give any security mechanism and there is no way to guarntee that the voice streams will be transmitted over Internet or network have not been intercepted in between. In this paper, VoIP is developed using stream cipher algorithm and the chaotic cryptography for key generator. It is based on the chaotic maps for generating a one-time rando

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (2)
Scopus Crossref
Publication Date
Fri Oct 01 2010
Journal Name
Iraqi Journal Of Physics
Effect of Carbon Black and Water Absorption on Dielectric behavior of EP-modified SiO2 composites
...Show More Authors

Epoxy (EP) – Silica (SiO2) composites are well known composites used in microelectronic industry . So it is important to study their dielectric behavior under different conditions such as
the presence carbon black (UV absorber) and immersion in the water for 30 days .
Dielectric properties were calculated over the frequency range 102 – 106 Hz for epoxy composites with different weight % of micrometer 1.5μm SiO2 particles (60%, 65% and 70wt%) modified with 0.5wt% silane coupling agent to improve adhesion between EP and SiO2 phases .

View Publication Preview PDF
Publication Date
Sat Jan 25 2020
Journal Name
Indian Journal Of Forensic Medicine & Toxicology
Bioactivity of Gutta flow II versus Modified Gutta Percha based Silicon Endodontic Sealers by Nanobioactive Fillers
...Show More Authors

The success of endodontic therapy is relied on radicular system cleaning, shaping, elimination of micro-organisms, and three dimensional filling of the radicular complex.This study was conducted to develop and assess new root canal sealer incorporating nano-sized bioactive glass into Gutta Flow II. The following concentration was used depend on a pilot study included adding (3%) of 45S5 bioactive glass into the Gutta Flow II. These materials were tested through assessment bioactivity. bioactivity test was undertaken after immersion of the tested samples into PBS for three days, seven days, fourteen days, and twenty eight days using FTIR too. study was found that it’s peaks was appear at level 800-1000 cm-1. The results showed that GFII gr

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Sep 01 2020
Journal Name
Optical Fiber Technology
A novel modified fiber Bragg grating (FBG) based ammonia sensor coated with polyaniline/graphite nanofibers nanocomposites
...Show More Authors

View Publication
Scopus (18)
Crossref (17)
Scopus Clarivate Crossref
Publication Date
Tue Sep 01 2020
Journal Name
Ceramics International
High-performance (K,Na)NbO3-based binary lead-free piezoelectric ceramics modified with acceptor metal oxide
...Show More Authors

View Publication
Scopus (31)
Crossref (27)
Scopus Clarivate Crossref
Publication Date
Sun Sep 01 2013
Journal Name
Journal Of Economics And Administrative Sciences
The role of competitive intelligence and reverse engineering to achieve competitive advantage
...Show More Authors

Abstract

In light of the great technological development and the emergence of globalization has increased global competition, where it became competitive exercise pressure on all sectors. In light of this companies mast enviorment depend on the means that keeps them on the competitive position through access to information about competitors in order to help them to draw a strategy that will achieve a competitive edge either through excellence or reduce the costs of their products and this means intelligence competitive and reverse engineering that help to gain information on competitors analyze and put of the decision-maker From this point formed the idea of ​​research in the statement of the role of

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Sep 30 2023
Journal Name
Journal Of The College Of Education For Women
A Pragmatic Study of Narcissism in the American Movie Big Eyes (2014)
...Show More Authors

Narcissism is a complicated phenomenon that can be reflected in the narcissist’s language. Investigating narcissism in terms of linguistics, and pragmatics in particular, does not seem to have been given its due attention, as this study reveals. Thus, this study is an endeavor to discover how narcissism is reflected in the American movie Big Eyes (2014). It is known for introducing narcissistic behaviors. This paper aims to identify the types, motivations, and pragmatic manifestations of narcissism in the selected movie. Three pragmatic theories are chosen to scrutinize narcissism in the data: Searle’s speech acts (1969), Grice’s maxims breaching (1975), and Culppeper’s impoliteness (1996). To cope with the nature of the

... Show More
View Publication Preview PDF
Crossref