The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Play Fairal gorithm has been enhanced in various ways. One of the methods is to increase the confusion rates by transforming the algorithm into 3D-playfair which has four tables of 4×4 and accepts trigraph rather than digraph. This paper further enhances the 3D-playfair algorithm by extending its tables and hereby increasing the security level as well as supporting the characters of all the world's...
With the fast developing of computer hardware, many problems which are previously considered hard, will be solved practically. Number of theoretical problems that form the core of many public key cryptosystems are such of them. Therefore, new cryptosystems which are designed based on other mathematical techniques are of great demands. NTRU which is based on the hardness of lattice problems is one...
Recently, the intelligent networks have been used widely for information transfer. Therefore, attention has been paid to combine “intelligent networks (IN)” with “Command and Control (C2) System”. This paper provides a proposal for the evaluation of using the (IN) in the design and implementation of command, control and information system (C2I system). The integrityand security of the information...
The purpose of this paper is the simulation development of A5/3 algorithms used by GSM networks security, one of the elements of the GSM networks security is A5/3 algorithm. the simulation facilities of the MATLAB, specifically by the used SIMULINK environment. According to knowledge, this is the first time to develop a SIMULINK approach for realization the proposed developments of A5/3, and testing...
In remote sensing applications, a solid angle has a wide appearing, therefore it's important to know what it means. The solid angle subtended by a surface S is characterized as the surface range of a unit circle secured by the surface's projection onto the circle. Solid angle is effectively, an observer that can be used as a measure of how big an object looks to be. The paper is aimed to find the...
The security aspect is considered as the most important challenge in communication and computer networks. Therefore the “security level evaluation” of cryptosystem, is very necessary research topic. This paper introduce the evaluation of RSA cryptosystem using (Adaptive Neural Fuzzy Inference System) ANFIS editor in MATLAB. The ANFIS technique include hybrid between ANN (Artificial Neural Network)...
Blood cell classification is the initial process for detecting diseases; the diseases can be carried if it is detected at early stage. For solving such problems. Quantitative processing of digital images based on fuzzy technique is applied for classification of red blood cells. There are various features consist of shape, size and colour based features that based on statistical analysis (i.e. Mean,...
This paper was primarily conducted to develop an Online Booking System where users can search for different varieties of hotels and are able to sort them according to their price, number of stars or their location distance to any particular place in the city. Once the hotel is selected, Users are able to guess the fastest routes to all the tourist attraction places and restaurants nearby each hotel...
This paper proposed a new secret key random block cipher as a candidate for Reaction Automata Direct Graph (RADG method). A new secret key consists of a 64-bit block size and a 128-bit key length. A new algorithm based in design on Generalized Unbalanced Feistel Network and uses a new S-boxes generated from a DES S-boxes, a bijective F function, bitwise operations and a carefully key schedule design...
This paper proposes two new approaches of robot path planning in dynamic environments based on D∗ algorithm and particle swarm optimization. Generally speaking, the grid method is used to decompose two-dimensional space to build class node which contains the information of the space environment. D∗ algorithm analyze the environment from the goal node and computes the cost for each node to the start...
Image processing is a technique that can be applied on medical images for detecting abnormalities such as tumors. Due to risk of malignancy, detecting and diagnosing of cold nodules in thyroid gland are important. We applied Image Enhancement (circular averaging filter, morphological opening by diamond structure element, division of results, transforming colorful image in to gray image), Image segmentation...
The fuzzy T — norms and T — conorms offer alternatives to compute the classical structural polynomial of a complex circuit. The reliability of a special complex 4-node circuit were evaluated, and it is show that, among a certain family of classic T — norms, the Frank T-norm provides a T — map emerging from the structural polynomial, which proves to be the best estimate for this reliability. Illustrative...
Internet of Thing (IoT) security has become a very important and will take a significant effect on industry of Internet of Things, due to is used in many fields. Data security issues become most important and are a difficult task for protecting the information transmitted over the IoT from intrusions. Currently, the traditional cryptography has several types of algorithms that give High Security,...
The common in use for remote control tasks achieved via specific mobile (e.g. Android or iOS) and this control done only by radio remote control systems, infrared (IR) devices, etc.and limited in the edges of office/house, but not remote control automated for electric/ electronic devices from anywhere (outside of office/house). This paper proposed an Internet of Things (IoT) home automated system...
Many techniques are implemented to perform fingerprint recognition approach, and each technique based on specific criteria. The aim of this work is to find an efficient fingerprint recognition technique. This paper tries to offer a simple high performance approach to perform fingerprint recognition. This approach based on two main stages; the first one is the real data collection of human fingerprint...
In this paper, a new model of focal and non-focal electroencephalography classification is carried out using a deep neural network (DNN). The Convolution Architecture For Feature Extraction (Caffe) framework with three different models (LeNet, AlexNet, and GoogLeNet) are applied, where the DNN is trained with different training epoch values (TEs). The performance of discriminating the focal and non-focal...
The elliptic ElGamal digital signature algorithm (EEDSA) has been created based on the ElGamal public key cryptosystem (EPKC) and the algorithm of the digital signature (DSA), defined on the elliptic curves, which was accepted in several (ANSI, IEEE, NIST and ISO) standards. The processes to generate keys, compute a signature and verify this signature in EEDSA require computing the elliptic curve...
Applying security to the transmitted image is very important issues, because the transmission channel is open and can be compromised by attackers. To secure this channel from the eavesdropping attack, man in the middle attack, and so on. A new hybrid encryption image mechanism that utilize triangular scrambling, DNA encoding and chaotic map is implemented. The scheme takes a master key with a length...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.