The Twofish cipher is a very powerful algorithm with a fairly complex structure that permeates most data parsing and switching and can be easily implemented. The keys of the Twofish algorithm are of variable length (128, 192, or 256 bits), and the key schedule is generated once and repeated in encrypting all message blocks, whatever their number, and this reduces the confidentiality of encryption. This article discusses the process of generating cipher keys for each block. This concept is new and unknown in all common block cipher algorithms. It is based on the permanent generation of sub keys for all blocks and the key generation process, each according to its work. The Geffe's Generator is used to generate subkeys to make each explicit block a new key that differs from block to block, gaining protection against attacks. Finally, this algorithm works almost like a One-Time Pad.
This study deals with the subject of art criticism by using Erwin Panofsky's theory to analyze a few Saudi artists' works. The study aims to identify Panofsky's theory and provide criticism of some Saudi artworks using it. The importance of the study is that it enriches the field of art criticism in the Kingdom of Saudi Arabia and helps critics and artists in using Panofsky’s theory to analyze artworks.
The study sample consists of six artworks produced in 2021 by six contemporary Saudi artists. In the theoretical section, the study dealt with several topics; first, is art criticism, the second part presents Panofsky’s theory with its three stages, the final part deals with the beginning of Saudi art until present time and its
The main intention of this study was to investigate the development of a new optimization technique based on the differential evolution (DE) algorithm, for the purpose of linear frequency modulation radar signal de-noising. As the standard DE algorithm is a fixed length optimizer, it is not suitable for solving signal de-noising problems that call for variability. A modified crossover scheme called rand-length crossover was designed to fit the proposed variable-length DE, and the new DE algorithm is referred to as the random variable-length crossover differential evolution (rvlx-DE) algorithm. The measurement results demonstrate a highly efficient capability for target detection in terms of frequency response and peak forming that was isola
... Show MoreSecurity concerns in the transfer of medical images have drawn a lot of attention to the topic of medical picture encryption as of late. Furthermore, recent events have brought attention to the fact that medical photographs are constantly being produced and circulated online, necessitating safeguards against their inappropriate use. To improve the design of the AES algorithm standard for medical picture encryption, this research presents several new criteria. It was created so that needs for higher levels of safety and higher levels of performance could be met. First, the pixels in the image are diffused to randomly mix them up and disperse them all over the screen. Rather than using rounds, the suggested technique utilizes a cascad
... Show MoreThe research addressed an analytical field investigation of the locality of meander, the factors responsible of the locality of the meander at certain points of the stream other than others, and the role sequence of these factors in the formation process.
The research revealed that the location of forming the meander was associated closely with the scale structural composition of the bank materials from which the first stage of forming the curved stream, for the inhomogeneous or non-identical opposite banks in their scale structural composition saw an activity of differential corrosion, while the homogeneous and identical opposite banks in their scale structural composition saw an identical corrosion activity in its intensity at both
In this paper, the goal of proposed method is to protect data against different types of attacks by unauthorized parties. The basic idea of proposed method is generating a private key from a specific features of digital color image such as color (Red, Green and Blue); the generating process of private key from colors of digital color image performed via the computing process of color frequencies for blue color of an image then computing the maximum frequency of blue color, multiplying it by its number and adding process will performed to produce a generated key. After that the private key is generated, must be converting it into the binary representation form. The generated key is extracted from blue color of keyed image then we selects a c
... Show MoreAbstract:
This research aims to the importance of oil in achieving economic
security in the Arab. Oil is not an ordinary subject and returns it significance to
the followings:
1. The importance of skipping a source of energy.
2. The importance of oil as raw material for petrochemical industry.
3. The importance of the oil sector as an area of foreign investment
4. The importance of oil in the marketing activities, transport, insurance
and various services
In addition to the importance of oil in general and the Arab oil has
additional strategic advantages such as geographic location, And the
magnitude of reserves and production of heavy investment costs are relatively
simple, And the ability to meet the
In this paper, several combination algorithms between Partial Update LMS (PU LMS) methods and previously proposed algorithm (New Variable Length LMS (NVLLMS)) have been developed. Then, the new sets of proposed algorithms were applied to an Acoustic Echo Cancellation system (AEC) in order to decrease the filter coefficients, decrease the convergence time, and enhance its performance in terms of Mean Square Error (MSE) and Echo Return Loss Enhancement (ERLE). These proposed algorithms will use the Echo Return Loss Enhancement (ERLE) to control the operation of filter's coefficient length variation. In addition, the time-varying step size is used.The total number of coefficients required was reduced by about 18% , 10% , 6%
... Show More