Cryptography is the process of transforming message to avoid an unauthorized access of data. One of the main problems and an important part in cryptography with secret key algorithms is key. For higher level of secure communication key plays an important role. For increasing the level of security in any communication, both parties must have a copy of the secret key which, unfortunately, is not that easy to achieve. Triple Data Encryption Standard algorithm is weak due to its weak key generation, so that key must be reconfigured to make this algorithm more secure, effective, and strong. Encryption key enhances the Triple Data Encryption Standard algorithm securities. This paper proposed a combination of two efficient encryption algorithms to
... Show MoreIn this research, the semiparametric Bayesian method is compared with the classical method to estimate reliability function of three systems : k-out of-n system, series system, and parallel system. Each system consists of three components, the first one represents the composite parametric in which failure times distributed as exponential, whereas the second and the third components are nonparametric ones in which reliability estimations depend on Kernel method using two methods to estimate bandwidth parameter h method and Kaplan-Meier method. To indicate a better method for system reliability function estimation, it has be
... Show MoreThe fluctuation properties of energy spectrum, electromagnetic transition intensities and electromagnetic moments in nucleus are investigated with realistic shell model calculations. We find that the spectral fluctuations of are consistent with the Gaussian orthogonal ensemble of random matrices. Besides, we observe a transition from an order to chaos when the excitation energy is increased and a clear quantum signature of the breaking of chaoticity when the single-particle energies are increased. The distributions of the transition intensities and of the electromagnetic moments are well described by a Porter-Thomas distribution. The statistics of electromagnetic transition intensities clearly deviate from a Porter-Thomas distribution (i
... Show MoreInelastic longitudinal electron scattering form factors to 2+ and 4+ states in 65Cu nucleus has been calculated in the (2p3/2 1f 5/2 2p1/2) shell model space with the F5PVH effective interaction. The harmonic oscillator potential has been applied to calculate the wave functions of radial single-particle matrix elements. Two shell model codes, CP and NUSHELL are used to obtain results. The form factor of inelastic electron scattering to 1/21−, 1/22−, 3/22−, 3/23−, 5/21−, 5/22− and 7/2- states and finding the transition probabilities B (C2) (in units of e2 fm4) for these transitions and B (C4) (in units of e2 fm8) for the transition 7/2-, and comparing them with experimental data. Both the form factors and reduced transition pr
... Show Moreيشهد المسرح الدولي قضايا مستجدة ومستحدثة مثل تعدد الفاعلين من الدول ومن غير الدول وتزايد مساحات نفوذهم وتأثيرهم ،ومن جانب اخر أثرت جائحة كورونا على البيئة والمناخ بشكل ملموس على جوانب عدة. فضلا عن ذلك تأثرت جميع المجتمعات البشرية بالإرهاب والهجمات الالكترونية وغيرها ومن بينها دول والمجتمع الدولي بإفراده مؤسسات وكيان اقتصادي وسياسي وقانوني وأمني وامتداد اثاره واسبابه الكثيرة والمتداخلة وما يثيره من خلق حا
... Show MoreThe behavior and shear strength of full-scale (T-section) reinforced concrete deep beams, designed according to the strut-and-tie approach of ACI Code-19 specifications, with various large web openings were investigated in this paper. A total of 7 deep beam specimens with identical shear span-to-depth ratios have been tested under mid-span concentrated load applied monotonically until beam failure. The main variables studied were the effects of width and depth of the web openings on deep beam performance. Experimental data results were calibrated with the strut-and-tie approach, adopted by ACI 318-19 code for the design of deep beams. The provided strut-and-tie design model in ACI 318-19 code provision was assessed and found to be u
... Show Morein this paper the collocation method will be solve ordinary differential equations of retarted arguments also some examples are presented in order to illustrate this approach
In this paper, we introduce the concepts of Large-lifting and Large-supplemented modules as a generalization of lifting and supplemented modules. We also give some results and properties of this new kind of modules.