The Twofish cipher is a very powerful algorithm with a fairly complex structure that permeates most data parsing and switching and can be easily implemented. The keys of the Twofish algorithm are of variable length (128, 192, or 256 bits), and the key schedule is generated once and repeated in encrypting all message blocks, whatever their number, and this reduces the confidentiality of encryption. This article discusses the process of generating cipher keys for each block. This concept is new and unknown in all common block cipher algorithms. It is based on the permanent generation of sub keys for all blocks and the key generation process, each according to its work. The Geffe's Generator is used to generate subkeys to make each explicit block a new key that differs from block to block, gaining protection against attacks. Finally, this algorithm works almost like a One-Time Pad.
In this research we present An idea of setting up same split plots experiments in many locations and many periods by Latin Square Design. This cases represents a modest contribution in area of design and analysis of experiments. we had written (theoretically) the general plans, the mathematical models for these experiments, and finding the derivations of EMS for each component (source) of sources of variation of the analysis of variance tables which uses for the statistical analysis for these expirements
The present work aimed to study the efficiency of thermal osmosis process for recovery of water from organic wastewater solution and study the factors affecting the performance of the osmosis cell. The driving force in the thermo osmosis cell is provided by a difference in temperature across the membrane sides between the draw and feed solution. In this research used a cellulose triacetate (CTA), as flat sheet membranes for treatment of organic wastewater under orientation membrane of active layer facing feed solution (FS) and draw solution (DS) is placed against the support layer. The organic materials were phenol, toluene, xylene and BTX (benzene, toluene, and xylene) used as feed solution. The osmotic agent in draw solution was
... Show MoreWhen employing shorter (sub picosecond) laser pulses, in ablation kinetics the features appear which can no longer be described in the context of the conventional thermal model. Meanwhile, the ablation of materials with the aid of ultra-short (sub picosecond) laser pulses is applied for micromechanical processing. Physical mechanisms and theoretical models of laser ablation are discussed. Typical associated phenomena are qualitatively regarded and methods for studying them quantitatively are considered. Calculated results relevant to ablation kinetics for a number of substances are presented and compared with experimental data. Ultra-short laser ablation with two-temperature model was quantitatively investigated. A two-temperature model
... Show MoreDealing with this study to find a link principle in the construction of the system and disorder to the promise of the principles and concepts of intellectual and philosophical form and content in the act of interior design of the halls education in the Ministry of Labor and Social Affairs , which leads to a reaction design objective and functionally and to increase the strength of the effect on users of the coaches and trainers . As it informs the side cognitive and developmental study of the design of the interior spaces . So it was the goal of research in the detection of the nature of the system and disorder with Focus indicators and the type of regulations and privacy and what constitutes the framework of knowledge in order to explai
... Show MoreIn recent years, with the growing size and the importance of computer networks, it is very necessary to provide adequate protection for users data from snooping through the use of one of the protection techniques: encryption, firewall and intrusion detection systems etc. Intrusion detection systems is considered one of the most important components in the computer networks that deal with Network security problems. In this research, we suggested the intrusion detection and classification system through merging Fuzzy logic and Artificial Bee Colony Algorithm. Fuzzy logic has been used to build a classifier which has the ability to distinguish between the behavior of the normal user and behavior of the intruder. The artificial bee colony al
... Show MoreThe principal goal guiding any designed encryption algorithm must be security against unauthorized attackers. Within the last decade, there has been a vast increase in the communication of digital computer data in both the private and public sectors. Much of this information has a significant value; therefore it does require the protection by design strength algorithm to cipher it. This algorithm defines the mathematical steps required to transform data into a cryptographic cipher and also to transform the cipher back to the original form. The Performance and security level is the main characteristics that differentiate one encryption algorithm from another. In this paper suggested a new technique to enhance the performance of the Data E
... Show MoreIn this study, a genetic algorithm (GA) is used to detect damage in curved beam model, stiffness as well as mass matrices of the curved beam elements is formulated using Hamilton's principle. Each node of the curved beam element possesses seven degrees of freedom including the warping degree of freedom. The curved beam element had been derived based on the Kang and Yoo’s thin-walled curved beam theory. The identification of damage is formulated as an optimization problem, binary and continuous genetic algorithms
(BGA, CGA) are used to detect and locate the damage using two objective functions (change in natural frequencies, Modal Assurance Criterion MAC). The results show the objective function based on change in natural frequency i
Multimedia is one of the most important elements of modern educational media and must be used in educational websites in order to disseminate knowledge on a large scale and should be used to provide scientific information to all, as the current research tried to explore the possibilities of employing them in the design of educational websites and highlight their role in promoting the scientific aspects of the user. This study included four axes, the first of which was devoted to the introduction which includes the problem of research, its importance, objectives and its objective, temporal and spatial limitations, which were limited to the study of the main pages of Arabic educational websites published in 2019. The second axis cont
... Show More