Cryptography is the process of transforming message to avoid an unauthorized access of data. One of the main problems and an important part in cryptography with secret key algorithms is key. For higher level of secure communication key plays an important role. For increasing the level of security in any communication, both parties must have a copy of the secret key which, unfortunately, is not that easy to achieve. Triple Data Encryption Standard algorithm is weak due to its weak key generation, so that key must be reconfigured to make this algorithm more secure, effective, and strong. Encryption key enhances the Triple Data Encryption Standard algorithm securities. This paper proposed a combination of two efficient encryption algorithms to
... Show MoreThis paper including a gravitational lens time delays study for a general family of lensing potentials, the popular singular isothermal elliptical potential (SIEP), and singular isothermal elliptical density distribution (SIED) but allows general angular structure. At first section there is an introduction for the selected observations from the gravitationally lensed systems. Then section two shows that the time delays for singular isothermal elliptical potential (SIEP) and singular isothermal elliptical density distributions (SIED) have a remarkably simple and elegant form, and that the result for Hubble constant estimations actually holds for a general family of potentials by combining the analytic results with data for the time dela
... Show MoreIn this paper reliable computational methods (RCMs) based on the monomial stan-dard polynomials have been executed to solve the problem of Jeffery-Hamel flow (JHF). In addition, convenient base functions, namely Bernoulli, Euler and Laguerre polynomials, have been used to enhance the reliability of the computational methods. Using such functions turns the problem into a set of solvable nonlinear algebraic system that MathematicaⓇ12 can solve. The JHF problem has been solved with the help of Improved Reliable Computational Methods (I-RCMs), and a review of the methods has been given. Also, published facts are used to make comparisons. As further evidence of the accuracy and dependability of the proposed methods, the maximum error remainder
... Show MoreThe research demonstrates new species of the games by applying separation axioms via sets, where the relationships between the various species that were specified and the strategy of winning and losing to any one of the players, and their relationship with the concepts of separation axioms via sets have been studied.
"In this article, "we introduce the concept of a WE-Prime submodule", as a stronger form of a weakly prime submodule". "And as a "generalization of WE-Prime submodule", we introduce the concept of WE-Semi-Prime submodule, which is also a stronger form of a weakly semi-prime submodule". "Various basic properties of these two concepts are discussed. Furthermore, the relationships between "WE-Prime submodules and weakly prime submodules" and studied". "On the other hand the relation between "WE-Prime submodules and WE-Semi-Prime submodules" are consider". "Also" the relation of "WE-Sime-Prime submodules and weakly semi-prime submodules" are explained. Behind that, some characterizations of these concepts are investigated".
... Show MoreThe x-ray fluorescence (XRF) of Znpc molecule with (flow of Ar) and Znpc molecule with (grow in N2) showed two peaks at (8.5and 9.5 Kv) referring to orbital transition ) K?-shell & K?-shell) respectively. The study of x-ray diffraction (XRD) where it was observed good growth of the crystal structure as a needle by the sublimation technique with a ?-phase of (monoclinic structure ) . Using Bragg equation the value of the interdistance of the crystalline plane (d-value) were calculated. We noticed good similarity with like once in the American Standards for Testing Material (ASTM) .Powder Diffraction File (PDF) Program was used to ensure the information obtained from (ASTM) . The output of (PDF) was compared with celn program, where the val
... Show MoreWe introduce in this paper the concept of approximaitly semi-prime submodules of unitary left -module over a commutative ring with identity as a generalization of a prime submodules and semi-prime submodules, also generalization of quasi-prime submodules and approximaitly prime submodules. Various basic properties of an approximaitly semi-prime submodules are discussed, where a proper submodule of an -module is called an approximaitly semi-prime submodule of , if whenever , where , and , implies that . Furthermore the behaviors of approximaitly semi-prime submodule in some classes of modules are studied. On the other hand several characterizations of this concept are
... Show MoreIn this paper, some basic notions and facts in the b-modular space similar to those in the modular spaces as a type of generalization are given. For example, concepts of convergence, best approximate, uniformly convexity etc. And then, two results about relation between semi compactness and approximation are proved which are used to prove a theorem on the existence of best approximation for a semi-compact subset of b-modular space.