×
The submission system is temporarily under maintenance. Please send your manuscripts to
Go to Editorial ManagerThe goal of the present paper is to study the adequacy of torsional provisions in the international buildings code (IBC) for irregular building taken into account effect of the angles of seismic attacks. The responses of the frame-shear-wall twelve- story asymmetric building under earthquake loading by using equivalent lateral force procedure and dynamic response spectrum analysis have been studied intensively in this present research paper. This study performs static and dynamic response analyses of building models under earthquake ground motions compatible with the design response spectrum defined in the international buildings code. The dynamic response spectrum was scaled according to the code static base shear. The static and dynamic base shear with different angles of seismic attacks has been calculated. The scaling factors, angles of seismic attacks, accidental storey torsions, storey shear, dynamic and static base shear have been evaluated here. The torsional moment at different storey levels for dynamic analysis has been estimated and compared with the static values.
Today, with the continuous increase in the use of computer networks and the rapid evolution of information technologies. The secure transmission of data over the Internet has become an urgent necessity to preserve the privacy of users and protect sensitive information from theft and distortion. images are most of this transferred data, so it was necessary to protect it by encrypting them using algorithms that ensure the protection of information access to the receiver. Color images contain sensitive information and details that must be secured and protected. This paper produces a comprehensive review of image encryption methods and classifies them based on various concepts such as chaotic maps, DNA, etc. with comparisons between existing approaches to accessing different security parameters. Additionally, the types of encryption keys were reviewed along with some common types of attacks and the most important methods for measuring encryption efficiency.
In the realm of cryptography, the Substitution-box (S-box) is a critical component for enhancing the security of encryption algorithms. The inherent characteristics of Chaos, such as sensitivity to beginning conditions and unpredictability, make it a highly suitable choice for encryption applications. In this paper, proposed a method for generating S-Boxes using 3D chaotic maps algorithms including (Cat map, Henon map, Sine map, and Cosine map). The primary focus is on enhancing the security and efficiency of cryptographic systems by leveraging the inherent complexity and unpredictability of chaotic maps. The design methodology focuses on achieving high non-linearity, optimal avalanche effect, and Strict Avalanche Criterion ( SAC ), ensuring that minor changes in plaintext result in significant alterations in the ciphertext. Our study presents a detailed analysis of the generated S-Boxes, demonstrating their robustness against common cryptographic attacks. Key findings include significant improvements in nonlinearity, differential uniformity, and bijectivity compared to traditional methods. The test findings and performance analysis indicate that our proposed S-Box exhibits much lower values of Linear Probability ( LP ) and Differential Probability ( DP ), while maintaining a suitable average value of nonlinearity. Additionally, discussed the broader implications of our findings, emphasizing how the proposed method can be employed to produce high-quality analytical results that enhance the security measures of cryptographic applications. This work adds valuable context to existing research and highlights the potential for our model to outperform conventional S-Box generation techniques.