Before users store data in the cloud, many security issues must be addressed, as they will have no direct control over the data that has been outsourced to the cloud, particularly personal and sensitive data (health, finance, military, etc.). This article proposes a system based on chaotic maps for private key generation. A hybrid encryption for fast and secure cryptography. In addition to a multi-cloud storage with Pseudonymized file names to preserve user data privacy on the cloud while minimizing data loss. As well as a hash approach to check data integrity. AES in combination with RSA and fragmenting the file is used for the encryption. Integrity is cheeked using SHA-3. The experiments demonstrated that the key generation strategy may provide efficient keys in a shorter amount of time. Furthermore, the keys for the proposed approach passed NIST randomness testing. When cipher text fragmentation and encryption are combined, the average entropy value was (7.99). In addition, as file sizes grew, the total system's execution time increased only slightly.
Nowadays, a very widespread of smartphones, especially Android smartphones, is observed. This is due to presence of many companies that produce Android based phones and provide them to consumers at reasonable prices with good specifications. The actual benefit of smartphones lies in creating communication between people through the exchange of messages, photos, videos, or other types of files. Usually, this communication is through the existence of an access point through which smartphones can connect to the Internet. However, the availability of the Internet is not guaranteed in all places and at all times, such as in crowded places, remote areas, natural disasters, or interruption of the Internet connection for any reason. To create a
... Show MoreAbstract
This research aims to design a multi-objective mathematical model to assess the project quality based on three criteria: time, cost and performance. This model has been applied in one of the major projects formations of the Saad Public Company which enables to completion the project on time at an additional cost that would be within the estimated budget with a satisfactory level of the performance which match with consumer requirements. The problem of research is to ensure that the project is completed with the required quality Is subject to constraints, such as time, cost and performance, so this requires prioritizing multiple goals. The project
... Show MoreSteganography is one of the most popular techniques for data hiding in the different media such as images, audio or video files. This paper introduced the improved technique to hide the secret message using the LSB algorithm inside the RGB true color image by encrypting it using the secret key transformation function. The key is selecting randomly in the GF (2n) with condition it has an inverse value to retrieve the encrypted message. Only two bits are used for the low byte in each pixel (the blue byte) to hide the secret message, since the blue color has a weak effect on human eyes. The message hidden by the suggested algorithm is less vulnerable to be stolen than other similar applications.
Building numerical reservoir simulation model with a view to model actual case requires enormous amount of data and information. Such modeling and simulation processes normally require lengthy time and different sets of field data and experimental tests that are usually very expensive. In addition, the availability, quality and accessibility of all necessary data are very limited, especially for the green field. The degree of complexities of such modelling increases significantly especially in the case of heterogeneous nature typically inherited in unconventional reservoirs. In this perspective, this study focuses on exploring the possibility of simplifying the numerical simulation pr
One of the main parts in hydraulic system is directional control valve, which is needed in order to operate hydraulic actuator. Practically, a conventional directional control valve has complex construction and moving parts, such as spool. Alternatively, a proposed Magneto-rheological (MR) directional control valve can offer a better solution without any moving parts by means of MR fluid. MR fluid consists of stable suspension of micro-sized magnetic particles dispersed in carrier medium like hydrocarbon oil. The main objectives of this present research are to design a MR directional control valve using MR fluid, to analyse its magnetic circuit using FEMM software, and to study and simulate the performance of this valve. In this research, a
... Show MoreThis manuscript presents a new approach to accurately calculating exponential integral function that arises in many applications such as contamination, groundwater flow, hydrological problems and mathematical physics. The calculation is obtained with easily computed components without any restrictive assumptions
A detailed comparison of the execution times is performed. The calculated results by the suggested approach are better and faster accuracy convergence than those calculated by other methods. Error analysis of the calculations is studied using the absolute error and high convergence is achieved. The suggested approach out-performs all previous methods used to calculate this function and this decision is
... Show MoreThe university course timetable problem (UCTP) is typically a combinatorial optimization problem. Manually achieving a useful timetable requires many days of effort, and the results are still unsatisfactory. unsatisfactory. Various states of art methods (heuristic, meta-heuristic) are used to satisfactorily solve UCTP. However, these approaches typically represent the instance-specific solutions. The hyper-heuristic framework adequately addresses this complex problem. This research proposed Particle Swarm Optimizer-based Hyper Heuristic (HH PSO) to solve UCTP efficiently. PSO is used as a higher-level method that selects low-level heuristics (LLH) sequence which further generates an optimal solution. The proposed a
... Show MoreInformation security in data storage and transmission is increasingly important. On the other hand, images are used in many procedures. Therefore, preventing unauthorized access to image data is crucial by encrypting images to protect sensitive data or privacy. The methods and algorithms for masking or encoding images vary from simple spatial-domain methods to frequency-domain methods, which are the most complex and reliable. In this paper, a new cryptographic system based on the random key generator hybridization methodology by taking advantage of the properties of Discrete Cosine Transform (DCT) to generate an indefinite set of random keys and taking advantage of the low-frequency region coefficients after the DCT stage to pass them to
... Show More