This paper present the fast and robust approach of English text encryption and decryption based on Pascal matrix. The technique of encryption the Arabic or English text or both and show the result when apply this method on plain text (original message) and how will form the intelligible plain text to be unintelligible plain text in order to secure information from unauthorized access and from steel information, an encryption scheme usually uses a pseudo-random enecryption key generated by an algorithm. All this done by using Pascal matrix. Encryption and decryption are done by using MATLAB as programming language and notepad ++to write the input text.This paper present the fast and robust approach of English text encryption and decryption based on Pascal matrix. The technique of encryption the Arabic or English text or both and show the result when apply this method on plain text (original message) and how will form the intelligible plain text to be unintelligible plain text in order to secure information from unauthorized access and from steel information, an encryption scheme usually uses a pseudo-random encryption key generated by an algorithm. All this done by using Pascal matrix. Encryption and decryption are done by using MATLAB as programming language and notepad ++to write the input text.
Many consumers of electric power have excesses in their electric power consumptions that exceed the permissible limit by the electrical power distribution stations, and then we proposed a validation approach that works intelligently by applying machine learning (ML) technology to teach electrical consumers how to properly consume without wasting energy expended. The validation approach is one of a large combination of intelligent processes related to energy consumption which is called the efficient energy consumption management (EECM) approaches, and it connected with the internet of things (IoT) technology to be linked to Google Firebase Cloud where a utility center used to check whether the consumption of the efficient energy is s
... Show MoreMedium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the
Most of the medical datasets suffer from missing data, due to the expense of some tests or human faults while recording these tests. This issue affects the performance of the machine learning models because the values of some features will be missing. Therefore, there is a need for a specific type of methods for imputing these missing data. In this research, the salp swarm algorithm (SSA) is used for generating and imputing the missing values in the pain in my ass (also known Pima) Indian diabetes disease (PIDD) dataset, the proposed algorithm is called (ISSA). The obtained results showed that the classification performance of three different classifiers which are support vector machine (SVM), K-nearest neighbour (KNN), and Naïve B
... Show MoreSince the Internet has been more widely used and more people have access to multimedia content, copyright hacking, and piracy have risen. By the use of watermarking techniques, security, asset protection, and authentication have all been made possible. In this paper, a comparison between fragile and robust watermarking techniques has been presented to benefit them in recent studies to increase the level of security of critical media. A new technique has been suggested when adding an embedded value (129) to each pixel of the cover image and representing it as a key to thwart the attacker, increase security, rise imperceptibility, and make the system faster in detecting the tamper from unauthorized users. Using the two watermarking ty
... Show MoreThis article discusses the change of values in urban family, because of various communication media and modern technologies as one of the most important factors affecting the changing family values in urban areas, this means becoming part of urban life. And focuses on the family in urban areas, for the privacy of the social, economic, demographic and cultural help to this effect, and because cities are the most friction and interaction with modern technologies.
The present research had dealt with preparing bars with the length of about (13 cm) and adiametar of (1.5 cm) of composite materials with metal matrix represented by (Al-Cu-Mg) alloy cast enforced by (ZrO2) particles with chosen weight percentages (1.5, 2.5 ,3.5, 5.5 %). The base cast and the composite materials were prepared by casting method by uses vortex Technique inorder to fix up (ZrO2) particles in homogeneous way on the base cast. In addition to that, two main groups of composite materials were prepared depending on the particles size of (ZrO2) , respectively. &n
... Show MoreIn this study, the mechanical properties of an epoxy and unidirectional woven carbon with fiberglass composite were experimentally investigated. When preparing the composite samples, American Society for Testing and Materials (ASTM)standard was used. Tensile, impact and flexural test were conducted to investigate the mechanical properties of the new produced epoxy Unidirectional Woven Carbon and Epoxy Fiberglass composites. The outcome showed that the strength of the produced samples increased with the increase in the number of unidirectional woven carbon layers added. Two methods were utilized: (1) woven carbon composite with glass fiber (2) woven carbon composite). The two methods of composite were compared with each other. The resul
... Show MoreThe wear behavior of alumina particulate reinforced A332 aluminium alloy composites produced by a stir casting process technique were investigated. A pin-on-disc type apparatus was employed for determining the sliding wear rate in composite samples at different grain size (1 µm, 12µm, 50 nm) and different weight percentage (0.05-0.1-0.5-1) wt% of alumina respectively. Mechanical properties characterization which strongly depends on microstructure properties of reinforcement revealed that the presence of ( nano , micro) alumina particulates lead to simultaneous increase in hardness, ultimate tensile stress (UTS), wear resistances. The results revealed that UTS, Hardness, Wear resistances increases with the increase in the percentage of
... Show MoreThe purpose of this research highlight the achievement of the effectiveness of small and medium enterprises dimensions and conformable to analyze the relationship between business strategies and human resources management strategies , and launched search of a dilemma thought provoking fundamental questions revolve around the search is the lack of appropriate strategies in these enterprises to help them continuity and permanence in business and markets , as these enterprises lack the human resources management strategies appropriate , as well as business strategies that make them withstand the changes in the market environment is changing and volatile . It was to
... Show More