With the wide developments of computer science and applications of networks, the security of information must be increased and make it more complex. The most important issues is how to control and prevent unauthorized access to secure information, therefore this paper presents a combination of two efficient encryption algorithms to satisfy the purpose of information security by adding a new level of encryption in Rijndael-AES algorithm. This paper presents a proposed Rijndael encryption and decryption process with NTRU algorithm, Rijndael algorithm is important because of its strong encryption. The proposed updates are represented by encryption and decryption Rijndael S-Box using NTRU algorithm. These modifications enhance the degree of complexity, increase key search space, and make the ciphered message difficult to be cracked by the attacker.
Worldwide, enormous amounts of waste cause major environmental issues, including scrap tires and plastic, and large waste, a consequence of the demolition of buildings, including crushed concrete, crushed clay bricks, and crushed thermo-stone. From that point, it’s possible to consider that the recycling processes for these materials and using them in the manufacturing field will reduce the adverse effects on the environment of these wastes and the consumption of natural resources. Sustainable concrete blocks can be considered as one of the products produced by using these materials as partial volume replacement of the coarse, fine aggregate, or cement content, considering their dry density, workability, absorption, co
... Show MoreIn this study, an easy, low-cost, green, and environmentally
friendlier reagents have been used to prepare CdS QDs, in chemical
reaction method by mixed different ratio of CdO and sulfur in
paraffin liquid as solvent and oleic acid as the reacting media in
different concentration to get the optimum condition of the reaction
to formation CdS QDs. The results give an indication that the
behavior is at small concentration of 4ml of the oleic acid is best
concentration which give CdS QDs of small about to 9.23 nm with
nano fiber configuration.
The inhibitory action of four lactobacilli isolates Lactobacillus bulgaricus, L. acidophilus, L. plantarum and L. fermentum, isolated from four different samples; yoghurt, vinegar, saliva and vagina respectively, on Escherichia coli and Staphylococcus aureus adhesion to uroepithelial cells were investigated. Results showed that all Lactobacillus isolates or their supernatant were able to reduce the number of the uropathogens attached to uroepithelial cells. However, inhibition level of lactobacilli cells was higher than their supernatant. Nevertheless, the human indigenous lactobacilli (L. fermentum and L. plantarum) were more competitive than food lactobacilli (L. acidophilus and L. bulgaricus).
This study analyzes the features of historical and modern mosques in Jordan compared to that of Amman. The architecture of the Jordanian mosques reflects the images of great ancient empires and kingdoms of Europe and the Middle East. This has happened due to the geographical position of the country. From the studies of historians and archaeologists, comparative analysis of planning solutions, the use of plastics and decor of the facades of mosques, and the literature on the construction methods of the mosques allow us to conclude that age-old traditions have been preserved through the establishment of mosques in both the countries. Besides, the emergence of new features in constructing mosques has been observed. We find the influence of
... Show MoreAt the level of both individuals and companies, Wireless Sensor Networks (WSNs) get a wide range of applications and uses. Sensors are used in a wide range of industries, including agriculture, transportation, health, and many more. Many technologies, such as wireless communication protocols, the Internet of Things, cloud computing, mobile computing, and other emerging technologies, are connected to the usage of sensors. In many circumstances, this contact necessitates the transmission of crucial data, necessitating the need to protect that data from potential threats. However, as the WSN components often have constrained computation and power capabilities, protecting the communication in WSNs comes at a significant performance pena
... Show MoreData compression offers an attractive approach to reducing communication costs using available bandwidth effectively. It makes sense to pursue research on developing algorithms that can most effectively use available network. It is also important to consider the security aspect of the data being transmitted is vulnerable to attacks. The basic aim of this work is to develop a module for combining the operation of compression and encryption on the same set of data to perform these two operations simultaneously. This is achieved through embedding encryption into compression algorithms since both cryptographic ciphers and entropy coders bear certain resemblance in the sense of secrecy. First in the secure compression module, the given text is p
... Show MoreGiven a matrix, the Consecutive Ones Submatrix (C1S) problem which aims to find the permutation of columns that maximizes the number of columns having together only one block of consecutive ones in each row is considered here. A heuristic approach will be suggested to solve the problem. Also, the Consecutive Blocks Minimization (CBM) problem which is related to the consecutive ones submatrix will be considered. The new procedure is proposed to improve the column insertion approach. Then real world and random matrices from the set covering problem will be evaluated and computational results will be highlighted.
This paper concerned with estimation reliability ( for K components parallel system of the stress-strength model with non-identical components which is subjected to a common stress, when the stress and strength follow the Generalized Exponential Distribution (GED) with unknown shape parameter α and the known scale parameter θ (θ=1) to be common. Different shrinkage estimation methods will be considered to estimate  depending on maximum likelihood estimator and prior estimates based on simulation using mean squared error (MSE) criteria. The study approved that the shrinkage estimation using shrinkage weight function was the best.
Pregnancy- including hypertension(PIH), also known as preeclampsia, is one of the major causes of maternal and fetal death. This study was carried out on 30 pregnant women with preeclampsia and 30 healthy pregnant women as control ranging in age mean ±SD (28.84±3.55) years , BMI (76.80±9.78) Kg/m2 and gestation age(30.82±0.75)week. The aim of this research was studied the plasma Metanephrine level and other biochemical parameters such as Hemoglobin(Hb), serum Protein, S. Albumin, Globulin, Albumin/Globulin ratio (Alb/Glu. ratio), S.Glutamate Pyruvate aminotransferase (GPT), S.Glutamate Oxaloacetate aminotransferase(GOT). The obtained results have been compared with 30 healthy pregnant women as control group. The result showed that ther
... Show MorePregnancy- including hypertension(PIH), also known as preeclampsia, is one of the major causes of maternal and fetal death. This study was carried out on 30 pregnant women with preeclampsia and 30 healthy pregnant women as control ranging in age mean ±SD (28.84±3.55) years , BMI (76.80±9.78) Kg/m2 and gestation age(30.82±0.75)week. The aim of this research was studied the plasma Metanephrine level and other biochemical parameters such as Hemoglobin(Hb), serum Protein, S. Albumin, Globulin, Albumin/Globulin ratio (Alb/Glu. ratio), S.Glutamate Pyruvate aminotransferase (GPT), S.Glutamate Oxaloacetate aminotransferase(GOT). The obtained results have been compared with 30 healthy pregnant women as control group. The result showed
... Show More