The Twofish cipher is a very powerful algorithm with a fairly complex structure that permeates most data parsing and switching and can be easily implemented. The keys of the Twofish algorithm are of variable length (128, 192, or 256 bits), and the key schedule is generated once and repeated in encrypting all message blocks, whatever their number, and this reduces the confidentiality of encryption. This article discusses the process of generating cipher keys for each block. This concept is new and unknown in all common block cipher algorithms. It is based on the permanent generation of sub keys for all blocks and the key generation process, each according to its work. The Geffe's Generator is used to generate subkeys to make each explicit block a new key that differs from block to block, gaining protection against attacks. Finally, this algorithm works almost like a One-Time Pad.
Identify the effect of an educational design according to the repulsive (allosteric) learning model on the achievement of chemistry and lateral thinking. The sample consisted of (59) students from third-grade intermediate students. They were randomly distributed into two groups (experimental and control), and the equivalence was done in (chronological age, previous achievement in chemistry, intelligence, lateral thinking). The (30) students from experimental group were taught according to the instructional design, other 29 students from the (control) group were taught according to the usual method. Two tests done, one of them is an achievement test consisted of (30) items of the type of multiple choice, the other was a lateral think
... Show MoreA new test system for detecting environment carcinogenes and/or mutagenes and their adversary It has been induced. One hundred and fifty mutants were isolated from the basidiomycete fungus Coprinus cinereus which were resistant to guanine analogue S- az.aguanine .All the spontaneous and induced with UV light origin mutants were isolated from the wild type strains Bc9/6.6 and Hd5.5
.These mutants were te ted on selective medium containing different
concentrations of the analogue and also to their ability to usc purine bases and their degredated &nbs
... Show MoreThis paper proposes a new strategy to enhance the performance and accuracy of the Spiral dynamic algorithm (SDA) for use in solving real-world problems by hybridizing the SDA with the Bacterial Foraging optimization algorithm (BFA). The dynamic step size of SDA makes it a useful exploitation approach. However, it has limited exploration throughout the diversification phase, which results in getting trapped at local optima. The optimal initialization position for the SDA algorithm has been determined with the help of the chemotactic strategy of the BFA optimization algorithm, which has been utilized to improve the exploration approach of the SDA. The proposed Hybrid Adaptive Spiral Dynamic Bacterial Foraging (HASDBF)
... Show MoreGas and downhole water sink-assisted gravity drainage (GDWS-AGD) is a new process of enhanced oil recovery (EOR) in oil reservoirs underlain by large bottom aquifers. The process is capital intensive as it requires the construction of dual-completed wells for oil production and water drainage and additional multiple vertical gas-injection wells. The costs could be substantially reduced by eliminating the gas-injection wells and using triple-completed multi-functional wells. These wells are dubbed triple-completion-GDWS-AGD (TC-GDWS-AGD). In this work, we design and optimize the TC-GDWS-AGD oil recovery process in a fictitious oil reservoir (Punq-S3) that emulates a real North Sea oil field. The design aims at maximum oil recovery us
... Show MoreIn this study, the effect of design parameters such as pipe diameter, pipe wall thickness, pipe material and the effect of fluid velocity on the natural frequency of fluid-structure interaction in straight pipe conveying fully developed turbulent flow were investigate numerically,analytically and experimentally. Also the effect of support conditions, simply-simply and clamped-clamped was investigated. Experimentally, pipe vibrations were characterized by accelerometer mounted on the pipe wall. The natural frequencies of vibration were analyzed by using Fast Fourier Transformer (FFT). Five test sections of two different pipe diameters of 76.2
mm and 50.8 mm with two pipe thicknesses of 3.7 mm and 2.4 mm and two pipe materials,stainles
Solar activity monitoring is important in our life because of its direct or indirect influence on our life, not only on ionospheric communications. To study solar activity, researchers need measuring and monitoring instruments, these instruments are mostly expensive and are not available in all universities. In this paper, a very low frequency radio receiver had been designed and implemented with components available in most markets to support the researchers, college students, and radio astronomy amateurs with a minimum input voltage less than 100µV, an output voltage less than 135 m V with no distortion and an overall gain of 34dB. A comparison had been done between two circuit structures using a workbench software program and experim
... Show MoreRegression testing being expensive, requires optimization notion. Typically, the optimization of test cases results in selecting a reduced set or subset of test cases or prioritizing the test cases to detect potential faults at an earlier phase. Many former studies revealed the heuristic-dependent mechanism to attain optimality while reducing or prioritizing test cases. Nevertheless, those studies were deprived of systematic procedures to manage tied test cases issue. Moreover, evolutionary algorithms such as the genetic process often help in depleting test cases, together with a concurrent decrease in computational runtime. However, when examining the fault detection capacity along with other parameters, is required, the method falls sh
... Show MoreAt the level of both individuals and companies, Wireless Sensor Networks (WSNs) get a wide range of applications and uses. Sensors are used in a wide range of industries, including agriculture, transportation, health, and many more. Many technologies, such as wireless communication protocols, the Internet of Things, cloud computing, mobile computing, and other emerging technologies, are connected to the usage of sensors. In many circumstances, this contact necessitates the transmission of crucial data, necessitating the need to protect that data from potential threats. However, as the WSN components often have constrained computation and power capabilities, protecting the communication in WSNs comes at a significant performance pena
... Show More