With the wide developments of computer applications and networks, the security of information has high attention in our common fields of life. The most important issues is how to control and prevent unauthorized access to secure information, therefore this paper presents a combination of two efficient encryption algorithms to satisfy the purpose of information security by adding a new level of encryption in Rijndael-AES algorithm. This paper presents a proposed Rijndael encryption and decryption process with NTRU algorithm, Rijndael algorithm is widely accepted due to its strong encryption, and complex processing as well as its resistance to brute force attack. The proposed modifications are implemented by encryption and decryption Rijndael S-Box using NTRU algorithm. These modifications enhance the degree of complexity, increase key search space, and make the ciphered message difficult to be cracked by the attacker.
تعد صناعة السمنت في العراق من اقدم الصناعات الحديثة واكثرها تطورا وتقدما ومن اقواها تاثيرا في الاقتصاد القومي. واذ توفر في صناعة السمنت العراقي كافة المستلزمات الناجحة من حيث توفر المواد الاولية والخبرات الفنية والتقنية واسواق ثابتة وراسخة محليا وعالميا فقد كان من المفروض ان يتم التوسع في هذه الصناعة، وان التخطيط لهذه الصناعة امرا ضروريا خاصة وان مادة السمنت هي احدى اهم المواد الرئيسة التي يؤثر توفره
... Show MoreThe alternating direction implicit method (ADI) is a common classical numerical method that was first introduced to solve the heat equation in two or more spatial dimensions and can also be used to solve parabolic and elliptic partial differential equations as well. In this paper, We introduce an improvement to the alternating direction implicit (ADI) method to get an equivalent scheme to Crank-Nicolson differences scheme in two dimensions with the main feature of ADI method. The new scheme can be solved by similar ADI algorithm with some modifications. A numerical example was provided to support the theoretical results in the research.
This paper studies the effects of stiffeners on shear lag in steel box girders with stiffened flanges. A three-dimensional linear finite element analysis using STAAD.Pro V8i program has been employed to evaluate and determine the actual top flange stress distribution and effective width in steel box girders. The steel plates of the flanges and webs have been modeled by four-node isoparametric shell elements, while the stiffeners have been modeled as beam elements. Different numbers (4, 8, and 15) for the steel stiffeners have been used in this study to establish their effects on the shear lag and longitudinal stresses in the flange. Using stiffeners reduced the magnitude of the top flange longitudinal stresses about 40%, but did
... Show MoreThis study involved the treatment of textile wastewater contaminated with direct blue 15 dye (DB15) using a heterogeneous photo-Fenton-like process. Bimetallic iron/copper nanoparticles loaded on bentonite clay were used as heterogeneous catalysts and prepared via liquid-phase reduction method using eucalyptus leaves extract (E-Fe/Cu@BNPs). Characterization methods were applied to resultant particles (NPs), including SEM, BET, and FTIR techniques. The prepared NPs were found with porous and spherical shapes with a specific surface area of particles was 28.589 m2/g. The effect of main parameters on the photo-Fenton-like degradation of DB15 was investigated through batch and continuous fixed-bed systems. In batch mode, pH, H2O2 dosage, DB15 c
... Show MoreThe consensus algorithm is the core mechanism of blockchain and is used to ensure data consistency among blockchain nodes. The PBFT consensus algorithm is widely used in alliance chains because it is resistant to Byzantine errors. However, the present PBFT (Practical Byzantine Fault Tolerance) still has issues with master node selection that is random and complicated communication. The IBFT consensus technique, which is enhanced, is proposed in this study and is based on node trust value and BLS (Boneh-Lynn-Shacham) aggregate signature. In IBFT, multi-level indicators are used to calculate the trust value of each node, and some nodes are selected to take part in network consensus as a result of this calculation. The master node is chosen
... Show More