With the revolutionized expansion of the Internet, worldwide information increases the application of communication technology, and the rapid growth of significant data volume boosts the requirement to accomplish secure, robust, and confident techniques using various effective algorithms. Lots of algorithms and techniques are available for data security. This paper presents a cryptosystem that combines several Substitution Cipher Algorithms along with the Circular queue data structure. The two different substitution techniques are; Homophonic Substitution Cipher and Polyalphabetic Substitution Cipher in which they merged in a single circular queue with four different keys for each of them, which produces eight different outputs for every single incoming letter. The present work can be applied efficiently for personal information security and network communication security as well, and the time required for ciphering and deciphering a message is less than 0.1 sec.
With the proliferation of both Internet access and data traffic, recent breaches have brought into sharp focus the need for Network Intrusion Detection Systems (NIDS) to protect networks from more complex cyberattacks. To differentiate between normal network processes and possible attacks, Intrusion Detection Systems (IDS) often employ pattern recognition and data mining techniques. Network and host system intrusions, assaults, and policy violations can be automatically detected and classified by an Intrusion Detection System (IDS). Using Python Scikit-Learn the results of this study show that Machine Learning (ML) techniques like Decision Tree (DT), Naïve Bayes (NB), and K-Nearest Neighbor (KNN) can enhance the effectiveness of an Intrusi
... Show MoreIn general, path-planning problem is one of most important task in the field of robotics. This paper describes the path-planning problem of mobile robot based on various metaheuristic algorithms. The suitable collision free path of a robot must satisfies certain optimization criteria such as feasibility, minimum path length, safety and smoothness and so on. In this research, various three approaches namely, PSO, Firefly and proposed hybrid FFCPSO are applied in static, known environment to solve the global path-planning problem in three cases. The first case used single mobile robot, the second case used three independent mobile robots and the third case applied three follow up mobile robot. Simulation results, whi
... Show MoreAbstract
Black paint laser peening (bPLP) technique is currently applied for many engineering materials , especially for aluminum alloys due to high improvement in fatigue life and strength . Constant and variable bending fatigue tests have been performed at RT and stress ratio R= -1 . The results of the present work observed that the significance of the surface work hardening which generated high negative residual stresses in bPLP specimens .The fatigue life improvement factor (FLIF) for bPLP constant fatigue behavior was from 2.543 to 3.3 compared to untreated fatigue and the increase in fatigue strength at 107 cycle was 21% . The bPLP cumulative fatigue life behav
... Show MoreThe general health of palm trees, encompassing the roots, stems, and leaves, significantly impacts palm oil production, therefore, meticulous attention is needed to achieve optimal yield. One of the challenges encountered in sustaining productive crops is the prevalence of pests and diseases afflicting oil palm plants. These diseases can detrimentally influence growth and development, leading to decreased productivity. Oil palm productivity is closely related to the conditions of its leaves, which play a vital role in photosynthesis. This research employed a comprehensive dataset of 1,230 images, consisting of 410 showing leaves, another 410 depicting bagworm infestations, and an additional 410 displaying caterpillar infestations. Furthe
... Show MoreThis paper studies the oscillation properties and asymptotic behavior of all solutions of the 2×2 system of second-order half-linear neutral differential equations. Four results are obtained in this research. The first and second results are auxiliary results while the third and fourth results are main results. All possible cases of non-oscillating bounded solutions for this system are estimated and analyzed. It is noted that the parameters that affect the volatility of the solutions are Qi,Ri on the one hand and r1 and r2 on the other hand. For this purpose, and through investigation, it is shown that there are only fourteen possible cases of non-oscillating bounded solutions for this system, so all these cases must be treated, in the fir
... Show More4-Amino-N-(5-methyl-isaxazol-3-yl)-benzenesulfonamide was synthesized by reacting the diazonium salt of sulfamethoxazole with 3-amino phenol. Complexes of Ni(II), Pd(II), Au(III), and Pt(IV) were produced and characterized by atomic absorption, elemental microanalysis, infrared spectroscopy, liquid chromatography–mass spectroscopy, thermogravimetric analysis, different scanning calorimetry, and ultraviolet–visible spectroscopy. Furthermore, the conductivity and magnetic properties were quantified. According to the analytical studies, all complexes were found to possess a 1:2 metal–ligand ratio and were non-electrolytes, except the Au(III) complex electrolyte, which had a 1:1 metal:ligand ratio. The biological activities of some of the
... Show MoreAbstract:
Research Topic: Ruling on the sale of big data
Its objectives: a statement of what it is, importance, source and governance.
The methodology of the curriculum is inductive, comparative and critical
One of the most important results: it is not permissible to attack it and it is a valuable money, and it is permissible to sell big data as long as it does not contain data to users who are not satisfied with selling it
Recommendation: Follow-up of studies dealing with the provisions of the issue
Subject Terms
Judgment, Sale, Data, Mega, Sayings, Jurists
The research is a contemporary stylistic study of the text that expresses the psychological
meanings in Nahj Al-Balaghah.
The research is divided to three chapters.
The first chapter : characteristics of psychological text.
It is about the power to influence the addressee ,that is to say ,the text influence power
connects with vulnerability and emotions inside the addressee spirit and his response to
violent effects shaking his feelings and that is represented in outbreaking of words vitality and
homogeneously. The Imam's wrath , grief , love to rightness , hatred of falsehood and
deviation from Islam arouses the words and emotions through :
1. Reduction in words and expansion in meaning by means of inspiration