With the revolutionized expansion of the Internet, worldwide information increases the application of communication technology, and the rapid growth of significant data volume boosts the requirement to accomplish secure, robust, and confident techniques using various effective algorithms. Lots of algorithms and techniques are available for data security. This paper presents a cryptosystem that combines several Substitution Cipher Algorithms along with the Circular queue data structure. The two different substitution techniques are; Homophonic Substitution Cipher and Polyalphabetic Substitution Cipher in which they merged in a single circular queue with four different keys for each of them, which produces eight different outputs for every single incoming letter. The present work can be applied efficiently for personal information security and network communication security as well, and the time required for ciphering and deciphering a message is less than 0.1 sec.
This work introduces a new electrode geometry for making holes with high aspect ratios on AISI 304 using an electrical discharge drilling (EDD) process. In addition to commercially available cylindrical hollow electrodes, an elliptical electrode geometry has been designed, manufactured, and implemented. The principal aim was to improve the removal of debris formed during the erosion process that adversely affects the aspect ratio, dimensional accuracy, and surface integrity. The results were compared and discussed to evaluate the effectiveness of electrode geometry on the machining performance of EDD process with respect to the material removal rate (MRR,) the electrode wear rate (EWR), and the tool wear ratio (TWR). Dimensional features an
... Show MoreThe expanding use of multi-processor supercomputers has made a significant impact on the speed and size of many problems. The adaptation of standard Message Passing Interface protocol (MPI) has enabled programmers to write portable and efficient codes across a wide variety of parallel architectures. Sorting is one of the most common operations performed by a computer. Because sorted data are easier to manipulate than randomly ordered data, many algorithms require sorted data. Sorting is of additional importance to parallel computing because of its close relation to the task of routing data among processes, which is an essential part of many parallel algorithms. In this paper, sequential sorting algorithms, the parallel implementation of man
... Show MoreShallow foundations are usually used for structures with light to moderate loads where the soil underneath can carry them. In some cases, soil strength and/or other properties are not adequate and require improvement using one of the ground improvement techniques. Stone column is one of the common improvement techniques in which a column of stone is installed vertically in clayey soils. Stone columns are usually used to increase soil strength and to accelerate soil consolidation by acting as vertical drains. Many researches have been done to estimate the behavior of the improved soil. However, none of them considered the effect of stone column geometry on the behavior of the circular footing. In this research, finite ele
... Show MoreIn this contribution, density functional theory-based calculations have been carried out to assess the electronic, photocatalytic and optical properties of Ce1-xTixO2 system. Ti incorporation leads to a decrease of Ce 4f states and enhancement of Ti 3d states in the bottom of conduction band. Furthermore, it was found that doping ceria with Ti-like transition metals could evidently shift the absorption of pure CeO2 towards higher wavelength range. These findings can provide some new insights for designing CeO2-based photocatalysts with high photocatalytic performance. To the best of our knowledge, this investigation calculates Mullikan’s charge transfer of Ce1-xTixO2 system for the first time. Charge transfer reveals an ionic bond between
... Show MoreThe confirming of security and confidentiality of multimedia data is a serious challenge through the growing dependence on digital communication. This paper offers a new image cryptography based on the Chebyshev chaos polynomials map, via employing the randomness characteristic of chaos concept to improve security. The suggested method includes block shuffling, dynamic offset chaos key production, inter-layer XOR, and block 90 degree rotations to disorder the correlations intrinsic in image. The method is aimed for efficiency and scalability, accomplishing complexity order for n-pixels over specific cipher rounds. The experiment outcomes depict great resistant to cryptanalysis attacks, containing statistical, differential and brut
... Show MoreA total of 533 specimens were collected in survey of Brachyceran species from different regions of Iraq during February to November 2014 .This study was reported 16 species belonging to 13 genera and 7 families, the results showed that Dicranosepsis Duda, 1926 (Family; Sepsidae) is recorded the genus for the first time in Iraq.
A free convective heat transfer from the inside surface of a uniformly heated vertical circular tube has been experimentally investigated under a constant wall heat flux boundary condition for laminar air flow in the ranges of RaL from 6.9108 to 5109. The effect of the different sections (restrictions) lengths placed at the exit of the heated tube on the surface temperature distribution, the local and average heat transfer coefficients were examined. The experimental apparatus consists of aluminum circular tube with 900 mm length and 30 mm inside diameter (L/D=30). The exit sections (restrictions) were included circular tubes having the same inside diameter as the heated tube but with different lengths of
... Show MoreThis study investigates the elimination of chemical oxygen demand (COD) from an Iraqi petroleum refinery effluent through a combined electro‐Fenton and adsorption process (EF+AC). Response surface methodology (RSM) with a Box–Behnken design (BBD) was employed to investigate the effects of FeSO 4 concentration, current density, and electrolysis time on the reduction of COD using the EF technique. According to the results of the analysis of variance (ANOVA) for the EF technique, FeSO 4 concentrations, with a contribution of 40.06%, and cur
Sentiment analysis refers to the task of identifying polarity of positive and negative for particular text that yield an opinion. Arabic language has been expanded dramatically in the last decade especially with the emergence of social websites (e.g. Twitter, Facebook, etc.). Several studies addressed sentiment analysis for Arabic language using various techniques. The most efficient techniques according to the literature were the machine learning due to their capabilities to build a training model. Yet, there is still issues facing the Arabic sentiment analysis using machine learning techniques. Such issues are related to employing robust features that have the ability to discrimina
... Show MoreIn this paper a WLAN network that accesses the Internet through a GPRS network was implemented and tested. The proposed network is managed by the Linux based server. Because of the limited facilities of GPRS such as dynamic IP addressing besides to its limited bandwidth a number of techniques are implemented to overcome these limitations.
Dynamic Host Configuration Protocol (DHCP) server was added to provide a single central control for all TCP/IP resources. Squid Proxy was added to provide caching of the redundant accessed Web content to reduce the Internet bandwidth usage and speeding up the client’s download time. Network Address Translation (NAT) service was configured to share one IP ad
... Show More