The Twofish cipher is a very powerful algorithm with a fairly complex structure that permeates most data parsing and switching and can be easily implemented. The keys of the Twofish algorithm are of variable length (128, 192, or 256 bits), and the key schedule is generated once and repeated in encrypting all message blocks, whatever their number, and this reduces the confidentiality of encryption. This article discusses the process of generating cipher keys for each block. This concept is new and unknown in all common block cipher algorithms. It is based on the permanent generation of sub keys for all blocks and the key generation process, each according to its work. The Geffe's Generator is used to generate subkeys to make each explicit block a new key that differs from block to block, gaining protection against attacks. Finally, this algorithm works almost like a One-Time Pad.
Features is the description of the image contents which could be corner, blob or edge. Corners are one of the most important feature to describe image, therefore there are many algorithms to detect corners such as Harris, FAST, SUSAN, etc. Harris is a method for corner detection and it is an efficient and accurate feature detection method. Harris corner detection is rotation invariant but it isn’t scale invariant. This paper presents an efficient harris corner detector invariant to scale, this improvement done by using gaussian function with different scales. The experimental results illustrate that it is very useful to use Gaussian linear equation to deal with harris weakness.
Landsat7 of Enhanced thematic mapper plus (ETM+) was launched on April 15, 1999. Four years later, images start degrading due to the scan line corrector (SLC). SLC is a malfunction that results in pixel gaps in images captured by the sensor of Landsat7. The pixel gap regions extend from about one pixel near the image center and reach up to about 14 pixels in width near the image edge. The shape of this loss is like a zigzag line; however, there are different studies about repairing these gaps. The challenge of all studies depends on retrieving inhomogeneous areas because the homogenous area can be retrieved quickly depending on the surrounding area. This research focuses on filling these gaps by utilizing pixels around them
... Show MoreDigital image started to including in various fields like, physics science, computer science, engineering science, chemistry science, biology science and medication science, to get from it some important information. But any images acquired by optical or electronic means is likely to be degraded by the sensing environment. In this paper, we will study and derive Iterative Tikhonov-Miller filter and Wiener filter by using criterion function. Then use the filters to restore the degraded image and show the Iterative Tikhonov-Miller filter has better performance when increasing the number of iteration To a certain limit then, the performs will be decrease. The performance of Iterative Tikhonov-Miller filter has better performance for less de
... Show MoreTHE ACTUAL SOCIETY MODEL
Our society model has been showing signs of exhaustion since the end of the XX century. The recent appearance of the Covid-19 virus is another consequence of humanity's distance from Nature and the environment it inhabits. Also, climate change, environmental deterioration, loss of biodiversity, overexploitation of natural resources, and social inequality are some of the consequences derived from this separation between society and Nature. We must change our operating habits. Inevitably from a society based on the market, hyper consumption, fossil energy and individual enrichment at all costs, we will have to change to another
... Show MoreOne of the most important challenges facing project management at present time is to ensure project accomplishment in spite of the specific restrictions like the specific time the financial resources specialized to do the project ; which require an accurate consideration for time and cost . the modern village project (residential building aspect) is one of the great project that ministry of agriculture is trying to do Wasit governorate it is chosen as the work in this project is dilatory for that is being studied in term of some modern mathematical and scientific methods like critical path method (CPM)which is one of the project management and scheduling methods to know the time needed to accomplish residential building pro
... Show MoreIn this work Study effect of annealing temperature on the Structure
of a-Se and electrical properties of a-Se/c-Si hetrojunction have been
studied.The hetrojunction fabricated by deposition of a-Se film on c-
Si using thermal evaporation.
Electrical properties of a-Se/ c-Si heterojunction include I-V
characteristics, in dark at different annealing temperature and C-V
characteristics are considered in the present work.
C-V characteristics suggested that the fabricated diode was
abrupt type, built in potential determined by extrapolation from
1/C2-V curve. The built - in potential (Vbi) for the Se/ Si System
was found to be increase from 1.21 to 1.62eV with increasing of
annealing temperature
Money laundering is consider a crime in legal perspective and aphenomenon of negative effects in economic and Social perspective for thevarious countries of the world by the diversity of their economies to make thebadly damaged in the banking service and its reputation in some cases may leadto bankruptcy of banks, and the fact that banks is one of the most importantcircles that revolve the illicit funds, Due to its branched the banking operations,speed and overlap and increase it's complicated with the progress of bankingoperations and the use of electronic services modern here's challenges atvarious levels between the application of the legislation to combat moneylaundering and between actual fact it must find ways and means of legislat
... Show MoreData centric techniques, like data aggregation via modified algorithm based on fuzzy clustering algorithm with voronoi diagram which is called modified Voronoi Fuzzy Clustering Algorithm (VFCA) is presented in this paper. In the modified algorithm, the sensed area divided into number of voronoi cells by applying voronoi diagram, these cells are clustered by a fuzzy C-means method (FCM) to reduce the transmission distance. Then an appropriate cluster head (CH) for each cluster is elected. Three parameters are used for this election process, the energy, distance between CH and its neighbor sensors and packet loss values. Furthermore, data aggregation is employed in each CH to reduce the amount of data transmission which le
... Show MoreClustering algorithms have recently gained attention in the related literature since
they can help current intrusion detection systems in several aspects. This paper
proposes genetic algorithm (GA) based clustering, serving to distinguish patterns
incoming from network traffic packets into normal and attack. Two GA based
clustering models for solving intrusion detection problem are introduced. The first
model coined as handles numeric features of the network packet, whereas
the second one coined as concerns all features of the network packet.
Moreover, a new mutation operator directed for binary and symbolic features is
proposed. The basic concept of proposed mutation operator depends on the most
frequent value