Cipher security is becoming an important step when transmitting important information through networks. The algorithms of cryptography play major roles in providing security and avoiding hacker attacks. In this work two hybrid cryptosystems have been proposed, that combine a modification of the symmetric cryptosystem Playfair cipher called the modified Playfair cipher and two modifications of the asymmetric cryptosystem RSA called the square of RSA technique and the square RSA with Chinese remainder theorem technique. The proposed hybrid cryptosystems have two layers of encryption and decryption. In the first layer the plaintext is encrypted using modified Playfair to get the cipher text, this cipher text will be encrypted using squared RSA to get the final cipher text. This algorithm achieved higher security to data but suffers from a long computational time. So Chinese remainder theorem has been used in the second hybrid cryptosystem to obtain less encryption and decryption time. The simulation results indicated that using the modified Playfair with the proposed square RSA has improved security. Moreover, using the Chinese remainder theorem achieved less encryption and decryption time in comparison to our first proposed and the standard algorithms.
In a connected graph , the distance function between each pair of two vertices from a set vertex is the shortest distance between them and the vertex degree denoted by is the number of edges which are incident to the vertex The Schultz and modified Schultz polynomials of are have defined as:
respectively, where the summations are taken over all unordered pairs of distinct vertices in and is the distance between and in The general forms of Schultz and modified Schultz polynomials shall be found and indices of the edge – identification chain and ring – square graphs in the present work.
The research focused on (balanced performance and structural mechanisms in industrial product design systems) by focusing on product development in a manner that is able to meet the human requirements through the effect of smart technology on the systems of product designs and its effectiveness in achieving the design and functional variables that have an effective effect in User and industrial products, correspond to the requirements of the user life at the level of daily interaction. The first chapter ensures the problem of research is the following question: What are the mechanisms to achieve balanced performance in some systems design to fit with the variables B N User and industrial products? The objective of the research was to ide
... Show MoreThis paper presents the design of a longitudinal controller for an autonomous unmanned aerial vehicle (UAV). This paper proposed the dual loop (inner-outer loop) control based on the intelligent algorithm. The inner feedback loop controller is a Linear Quadratic Regulator (LQR) to provide robust (adaptive) stability. In contrast, the outer loop controller is based on Fuzzy-PID (Proportional, Integral, and Derivative) algorithm to provide reference signal tracking. The proposed dual controller is to control the position (altitude) and velocity (airspeed) of an aircraft. An adaptive Unscented Kalman Filter (AUKF) is employed to track the reference signal and is decreased the Gaussian noise. The mathematical model of aircraft
... Show MoreThe photooxidative degradation process of plastics caused by ultraviolet irradiation leads to bond breaking, crosslinking, the elimination of volatiles, formation of free radicals, and decreases in weight and molecular weight. Photodegradation deteriorates both the mechanical and physical properties of plastics and affects their predicted life use, in particular for applications in harsh environments. Plastics have many benefits, while on the other hand, they have numerous disadvantages, such as photodegradation and photooxidation in harsh environments and the release of toxic substances due to the leaching of some components, which have a negative effect on living organisms. Therefore, attention is paid to the design and use of saf
... Show MoreA novel median filter based on crow optimization algorithms (OMF) is suggested to reduce the random salt and pepper noise and improve the quality of the RGB-colored and gray images. The fundamental idea of the approach is that first, the crow optimization algorithm detects noise pixels, and that replacing them with an optimum median value depending on a criterion of maximization fitness function. Finally, the standard measure peak signal-to-noise ratio (PSNR), Structural Similarity, absolute square error and mean square error have been used to test the performance of suggested filters (original and improved median filter) used to removed noise from images. It achieves the simulation based on MATLAB R2019b and the resul
... Show MoreBarhi dates fruit are one of the most important date palm cultivars which are some of their properties they are mostly eaten and sold at the khalal stage when it has become yellow compared with rutab stage. At this stage the fruit loses its astringency and becomes sweet and best texture, therefore. High moisture content and rapid ripening of Barhi dates shorten their shelf life, as well the Khalal stage lasts for about 4 weeks until the ripening of the fruits begins and transfer to rutab stage. In the present study, Barhi dates packaging in the first by common air - packaging and
second by Modified atmosphere packaging, MAP A (5% O2 + 20% CO2) and MAP B (40%O2+20%CO2) and stored for 30 days at different temperatures 5 and 20 °C, re
Crime is considered as an unlawful activity of all kinds and it is punished by law. Crimes have an impact on a society's quality of life and economic development. With a large rise in crime globally, there is a necessity to analyze crime data to bring down the rate of crime. This encourages the police and people to occupy the required measures and more effectively restricting the crimes. The purpose of this research is to develop predictive models that can aid in crime pattern analysis and thus support the Boston department's crime prevention efforts. The geographical location factor has been adopted in our model, and this is due to its being an influential factor in several situations, whether it is traveling to a specific area or livin
... Show MoreSecure information transmission over the internet is becoming an important requirement in data communication. These days, authenticity, secrecy, and confidentiality are the most important concerns in securing data communication. For that reason, information hiding methods are used, such as Cryptography, Steganography and Watermarking methods, to secure data transmission, where cryptography method is used to encrypt the information in an unreadable form. At the same time, steganography covers the information within images, audio or video. Finally, watermarking is used to protect information from intruders. This paper proposed a new cryptography method by using thre
... Show More