With the revolutionized expansion of the Internet, worldwide information increases the application of communication technology, and the rapid growth of significant data volume boosts the requirement to accomplish secure, robust, and confident techniques using various effective algorithms. Lots of algorithms and techniques are available for data security. This paper presents a cryptosystem that combines several Substitution Cipher Algorithms along with the Circular queue data structure. The two different substitution techniques are; Homophonic Substitution Cipher and Polyalphabetic Substitution Cipher in which they merged in a single circular queue with four different keys for each of them, which produces eight different outputs for every single incoming letter. The present work can be applied efficiently for personal information security and network communication security as well, and the time required for ciphering and deciphering a message is less than 0.1 sec.
Blockchain technology relies on cryptographic techniques that provide various advantages, such as trustworthiness, collaboration, organization, identification, integrity, and transparency. Meanwhile, data analytics refers to the process of utilizing techniques to analyze big data and comprehend the relationships between data points to draw meaningful conclusions. The field of data analytics in Blockchain is relatively new, and few studies have been conducted to examine the challenges involved in Blockchain data analytics. This article presents a systematic analysis of how data analytics affects Blockchain performance, with the aim of investigating the current state of Blockchain-based data analytics techniques in research fields and
... Show MoreDifferent ANN architectures of MLP have been trained by BP and used to analyze Landsat TM images. Two different approaches have been applied for training: an ordinary approach (for one hidden layer M-H1-L & two hidden layers M-H1-H2-L) and one-against-all strategy (for one hidden layer (M-H1-1)xL, & two hidden layers (M-H1-H2-1)xL). Classification accuracy up to 90% has been achieved using one-against-all strategy with two hidden layers architecture. The performance of one-against-all approach is slightly better than the ordinary approach
Data compression offers an attractive approach to reducing communication costs using available bandwidth effectively. It makes sense to pursue research on developing algorithms that can most effectively use available network. It is also important to consider the security aspect of the data being transmitted is vulnerable to attacks. The basic aim of this work is to develop a module for combining the operation of compression and encryption on the same set of data to perform these two operations simultaneously. This is achieved through embedding encryption into compression algorithms since both cryptographic ciphers and entropy coders bear certain resemblance in the sense of secrecy. First in the secure compression module, the given text is p
... Show MoreLabrotary experiment was conducted to study the effect of different levels of nematode population densities of Meloidogyne spp on seed germination percentage and seedling characteristics of Vigna sinensis, Ahelmoschus esculentus, Cicer arietinum, Helianthus annuus and Rap-hanus sativus. Four different levels of nematode populat-ion densities ranged from 1 to 4 prepared from radish in-fected roots and used as inoculating agent to infect all seed types in the experiment Seed germination percentage of Vigna sinensis and Ablemoschus eseulentus were highly reduced (at 0.01 level of significance) with increased nematode population level from 1 to 4. Seedling length of the remaining seed types were significantly reduced (at 0.01 level of signif
... Show MoreFour local hemolysin producer bacterial isolates were selected, tow of them gram negative bacteria (Escherichia coli ,Pseudomonas aeruginosa ) and the other two were gram positive bacteria (Staphylococcus aureus , Bacillus cereus ). Minimum inhibitory concentration of the aqueous and alcoholic extracts of Punica granatum L. pericarp were determined towards the four bacterial isolates ,results obtaind showed that MICs of the aqueous extract were 200 mg/ml for E .coli and P. aeruginosa isolates while were 5 mg/ml and 2 mg/ml for B. cereus, S. aureus , respectively The MICs for the ethanolic extract were 50 mg/ml , 20 mg/ml ,1 mg/ml ,0.5 mg/ml for E. coli ,P. aeruginosa ,B. cereus ,S. aureus , respectively. The effect of Sub-MICs o
... Show MoreThe study was carried out in plant tissue culture laboratory, University of Baghdad during the period 2017-2019, as factorial experiment in complete randomized design, to study the effect of PEG at (0, 2, 4, 6 and 8%) on physiological and chemical changes in callus of three sunflower (Ishaqi 1, Aqmar and Al-haga) induced by the cultivation of the young stem in vitro under water stress. The content of callus cells of SOD, POD, CAT and APX enzymes as well as total dissolved carbohydrate were determined as indicators to determine the effect of PEG in callus tissue cells cultivated on medium equipped with the PEG concentrations. The results showed that cultivars were differs significantly, and A-haja variety was superior in increasing SOD to 12
... Show MoreOne of the common geotechnical problems is the construction on soft soil and the improvement of its geotechnical properties to meet the design requirements. A stone column is one of the well-known techniques used to improve the geotechnical properties of soft soils. Sometimes thick layers of soft soil imposed the designer to use floating stone columns for improvement of such soil; in this case, the designer will be lost the end bearing of the stone column. In this study, the effects of several patterns of floating stone columns distribution under footing on the bearing capacity of soil and the distribution of excess porewater pressure are investigated. The soft soil used in this study has a very low undrained shear strength (cu) of
... Show MoreThe main objective of this paper is to designed algorithms and implemented in the construction of the main program designated for the determination the tenser product of representation for the special linear group.