As s widely use of exchanging private information in various communication applications, the issue to secure it became top urgent. In this research, a new approach to encrypt text message based on genetic algorithm operators has been proposed. The proposed approach follows a new algorithm of generating 8 bit chromosome to encrypt plain text after selecting randomly crossover point. The resulted child code is flipped by one bit using mutation operation. Two simulations are conducted to evaluate the performance of the proposed approach including execution time of encryption/decryption and throughput computations. Simulations results prove the robustness of the proposed approach to produce better performance for all evaluation metrics with res
... Show MoreThe problem motivation of this work deals with how to control the network overhead and reduce the network latency that may cause many unwanted loops resulting from using standard routing. This work proposes three different wireless routing protocols which they are originally using some advantages for famous wireless ad-hoc routing protocols such as dynamic source routing (DSR), optimized link state routing (OLSR), destination sequenced distance vector (DSDV) and zone routing protocol (ZRP). The first proposed routing protocol is presented an enhanced destination sequenced distance vector (E-DSDV) routing protocol, while the second proposed routing protocol is designed based on using the advantages of DSDV and ZRP and we named it as
... Show MoreMany numerical approaches have been suggested to solve nonlinear problems. In this paper, we suggest a new two-step iterative method for solving nonlinear equations. This iterative method has cubic convergence. Several numerical examples to illustrate the efficiency of this method by Comparison with other similar methods is given.
Dora petroleum refinery waste water is the one of the important source of pollution by priority pollutant aromatic compound discharged to Tigris river in Iraq. the station has waste water treatment unit contains many treatment subunits The most important sub units is :skimmer units ,physiochemical unit ,daf unit, biological unit. The aim of research project is to study the ability of unit to remove the priority pollutant aromatic compound and follow up these compounds in river to study ability of river to self removal. A solid phase extraction (SPE) followed by high performance liquid chromatography-ultra violet (HPLC-UV) technique is depicted for the quantitative estimation of benzidines and phenols. Experimental studies were performed to
... Show MoreThe process of discovering pharmaceuticals is of great importance in our contemporary life, in a way that without life becomes almost impossible, as this process is the first building block in the field of pharmaceutical industries to search for new methods and means of treatment and treatment. But in fact, the fact that talking about this process is not that simple and easy, because this process is complicated and difficult in a way that makes it take a time range that in some cases reaches what is permissible ten years to reach a chemical formula that can be used later in the manufacturing process Pharmacokinetics, and during this long period of time, this process will have a set of effects, some of which are specific to the researcher di
... Show MoreThis work is a trial to ensure the absolute security in any quantum cryptography (QC) protocol via building an effective hardware for satisfying the single-photon must requirement by controlling the value of mean photon number. This was approximately achieved by building a driving circuit that provide very short pulses (≈ 10 ns) for laser diode -LD- with output power of (0.7-0.99mW) using the available electronic components in local markets. These short pulses enable getting faint laser pulses that were further attenuated to reach mean photon number equal to 0.08 or less.
Silver-bismuth iodide (ABI) ternary semiconductors, such as AgBi2I7, AgBiI4, Ag2BiI5, and Ag3BiI6, have emerged as promising lead-free light absorbers for photovoltaic applications due to their favorable optoelectronic properties. Despite recent advances that have improved power conversion efficiencies from ∼1% to over 5%, ABI-based solar cells still show substantial open-circuit voltage (VOC) losses of up to ∼1 V, which significantly hinder the device performance. These losses have been experimentally attributed to the non-radiative recombination originating from intrinsic defects, however, theoretical understanding of these defect mechanisms remains limited. Here, using density functional theory calculations, we systematical
... Show MoreThis study aimed to develop a stable nanosuspension of repaglinide and improve its dissolution, using the Nano-precipitation method, involving a different concentration of a stabilizer, different co-stabilizers and different solvents. Employment of a systemic approach to optimize the formulation parameters, including stabilizer concentration, solvent choice and co-stabilizer election. Soluplus® (SOL) was used as the primary stabilizer for this research, polyvinyl alcohol (PVA), poloxamer 188 (PXM 188), tween 80 (TW80), and polyvinyl pyrrolidine (PVP k30) were investigated as co-stabilizers to prevent particle agglomeration and ensure long-term stability. In addition to ethanol as a primary solvent, acetone and chloroform were used
... Show MoreMicrobial water disinfection with UV rays is a universal technology. Disinfection is a method used to treat drinking water. This can be accomplished using physical and/or chemical processes. Physical Methods: Heating and UV rays are two main methods - UV rays to destroy cells and kill bacteria. The physical process generally gives drinking water an instant purification without producing harmful substances. However, there is no pollution in the water to ensure continuous cleaning. This study’s primary goal is to obtain environmentally safe drinking water in situations of water shortages and homes that lack clean water. Therefore, resort to appropriate home treatment. Therefore, an ex
Graph is a tool that can be used to simplify and solve network problems. Domination is a typical network problem that graph theory is well suited for. A subset of nodes in any network is called dominating if every node is contained in this subset, or is connected to a node in it via an edge. Because of the importance of domination in different areas, variant types of domination have been introduced according to the purpose they are used for. In this paper, two domination parameters the first is the restrained and the second is secure domination have been chosn. The secure domination, and some types of restrained domination in one type of trees is called complete ary tree are determined.