Implementation of TSFS (Transposition, Substitution, Folding, and Shifting) algorithm as an encryption algorithm in database security had limitations in character set and the number of keys used. The proposed cryptosystem is based on making some enhancements on the phases of TSFS encryption algorithm by computing the determinant of the keys matrices which affects the implementation of the algorithm phases. These changes showed high security to the database against different types of security attacks by achieving both goals of confusion and diffusion.
The unpredictable and huge data generation nowadays by smart computing devices like (Sensors, Actuators, Wi-Fi routers), to handle and maintain their computational processing power in real time environment by centralized cloud platform is difficult because of its limitations, issues and challenges, to overcome these, Cisco introduced the Fog computing paradigm as an alternative for cloud-based computing. This recent IT trend is taking the computing experience to the next level. It is an extended and advantageous extension of the centralized cloud computing technology. In this article, we tried to highlight the various issues that currently cloud computing is facing. Here
... Show MoreInterest in belowground plant growth is increasing, especially in relation to arguments that shallow‐rooted cultivars are efficient at exploiting soil phosphorus while deep‐rooted ones will access water at depth. However, methods for assessing roots in large numbers of plants are diverse and direct comparisons of methods are rare. Three methods for measuring root growth traits were evaluated for utility in discriminating rice cultivars: soil‐filled rhizotrons, hydroponics and soil‐filled pots whose bottom was sealed with a non‐woven fabric (a potential method for assessing root penetration ability). A set of 38 rice genotypes including the Oryza
The simulation study has been conducted for the harmonics of Nd: YAG laser, namely the second harmonic generation SHG, the third harmonic generation THG, and the fourth harmonic generation FHG. Determination of beam expander's expansion ratio for specific wavelength and given detection range is the key in beam expander design for determining minimum laser spot size at the target. Knowing optimum expansion ratio decreases receiving unit dimensions and increases its performance efficiency. Simulation of the above mentioned parameters is conducted for the two types of refractive beam expander, Keplerian and Galilean. Ideal refractive indices for the lenses are chosen adequately for Nd: YAG laser harmonics wavelengths, so that increasing transm
... Show MoreWitnessing the global arena many changes in the political, economic, social, scientific and technological have left their mark on the world as a whole, these changes require necessarily Advancement of the profession of auditing, and improve their performance, especially after the mixer skepticism the health of approach and the method followed by a check in the major audit firms global view as for the external audit of an active role in providing services to members of the community in various sectors, were to be provide these services to the highest level of quality.To ensure the quality of the audit process to be a proper planning is based on a scientific basis to be the substrate a strong underlying different audit works, and if planni
... Show MoreSimplification of new fashion design methods
المستخلـص
تم في هذا البحث دراسة الطرائق اللامعلمية الرتيبة لتقدير دالة الأنحدار اللامعلمي، ومعالجة القيم الشاذة الموجودة في دالة الأنحدار اللامعلمي لجعل الدالة رتيبة (متزايدة أو متناقصة).
لذا سنقوم أولاً بتقدير دالة الأنحدار اللامعلمي بإستخدام ممهد Kernel ومن ثم تطبيق الطرائق الرتيبة لجعل الدالة متزايدة إذ سنتناول ثلاث طرائق للتقدير:-
1- طريقة ste
... Show MoreThe simulation of passively Q-switching is four non – linear first order differential equations. The optimization of passively Q-switching simulation was carried out using the constrained Rosenbrock technique. The maximization option in this technique was utilized to the fourth equation as an objective function; the parameters, γa, γc and β as were dealt with as decision variables. A FORTRAN program was written to determine the optimum values of the decision variables through the simulation of the four coupled equations, for ruby laser Q–switched by Dy +2: CaF2.For different Dy +2:CaF2 molecules number, the values of decision variables was predicted using our written program. The relaxation time of Dy +2: CaF2, used with ruby was
... Show MoreThe problem of independent motion control of mobile robot (МR) in conditions when unforeseen changes of conditions of interaction of wheels with a surface are considered. An example of such changes can be sudden entrance МR a slippery surface. The deployment of an autonomous unmanned ground vehicle for field applications provides the means by which the risk to personnel can be minimized and operational capabilities improved. In rough terrain, it is critical for mobile robots to maintain good wheel traction. Wheel slip could cause the rover to lose control and become trapped. This paper describes the application of fuzzy control to a feedback system within slippery environment. The study is conducted on an example of М
... Show MoreThe importance of knowledge is represented in the use of various sources of information, the corresponding to the same level of importance is the use of modern means and technologies in the delivery and investment of these sources to the beneficiaries, among these means and technologies are the multimedia that deal with most of the human senses, but the most important of which is sight and hearing, if these are invested the means in the field of education will give many positive results, such as the speed of receiving information, its clarity, and its freedom from impurities and influences, as well as its stability in memory as it is based on nderstanding, not memorization. On this basis, the experience of supporting the education process
... Show MoreThe proliferation of cellular network enabled users through various positioning tools to track locations, location information is being continuously captured from mobile phones, created a prototype that enables detected location based on using the two invariant models for Global Systems for Mobile (GSM) and Universal Mobile Telecommunications System (UMTS). The smartphone application on an Android platform applies the location sensing run as a background process and the localization method is based on cell phones. The proposed application is associated with remote server and used to track a smartphone without permissions and internet. Mobile stored data location information in the database (SQLite), then transfer it into location AP
... Show More