Cryptography is the process of transforming message to avoid an unauthorized access of data. One of the main problems and an important part in cryptography with secret key algorithms is key. For higher level of secure communication key plays an important role. For increasing the level of security in any communication, both parties must have a copy of the secret key which, unfortunately, is not that easy to achieve. Triple Data Encryption Standard algorithm is weak due to its weak key generation, so that key must be reconfigured to make this algorithm more secure, effective, and strong. Encryption key enhances the Triple Data Encryption Standard algorithm securities. This paper proposed a combination of two efficient encryption algorithms to satisfy the purpose of information security by adding a new level of security to Triple Data Encryption Standard algorithm using Nth Degree Truncated Polynomial Ring Unit algorithm. This aim achieved by adding two new key functions, the first one is Enckey(), and the second one is Deckey() for encryption and decryption key of Triple Data Encryption Standard to make this algorithm more stronger. The obtained results of this paper also have good resistance against brute-force attack which makes the system more effective by applying Nth Degree Truncated Polynomial Ring Unit algorithm to encrypt and decrypt key of Triple Data Encryption Standard. Also, these modifications enhance the degree of complexity, increase key search space, and make the ciphered message difficult to be cracked by the attacker.
Spraying pesticides is one of the most common procedures that is conducted to control pests. However, excessive use of these chemicals inversely affects the surrounding environments including the soil, plants, animals, and the operator itself. Therefore, researchers have been encouraged to...
Background: Breast cancer is the most common malignancy affecting the Iraqi population and the leading cause of cancer related mortality among Iraqi women. It has been well documented that prognosis of patients depends largely upon the hormone receptor contents and HER-2 over expression of their neoplasm. Recent studies suggest that Triple Positive (TP) tumors, bearing the three markers, tend to exhibit a relatively favorable clinical behavior in which overtreatment is not recommended. Aim: To document the different frequencies of ER/PR/HER2 breast cancer molecular subtypes focusing on the Triple Positive pattern; correlating those with the corresponding clinico-pathological characteristics among a sample of Iraqi patients diagnosed with th
... Show MoreThe inhibitive action of Phenyl Thiourea (PTU) on the corrosion of mild steel in strong Hydrochloric acid, HCl, has been investigated by weight loss and potentiostatic polarization. The effect of PTU concentration, HCl concentration, and temperature on corrosion rate of mild steel were verified using 2 levels factorial design and surface response analysis through weight loss approach, while the electrochemical measurements were used to study the behavior of mild steel in 5-7N HCl at temperatures 30, 40 and 50 °C, in absence and presence of PTU. It was verified that all variables and their interaction were statistically significant. The adsorption of (PTU) is found to obey the Langmuir adsorption isotherm. The effect of temperature on th
... Show MoreSome relations of inclusion and their properties are investigated for functions of type " -valent that involves the generalized operator of Srivastava-Attiya by using the principle of strong differential subordination.
In this paper, a Sokol-Howell prey-predator model involving strong Allee effect is proposed and analyzed. The existence, uniqueness, and boundedness are studied. All the five possible equilibria have been are obtained and their local stability conditions are established. Using Sotomayor's theorem, the conditions of local saddle-node and transcritical and pitchfork bifurcation are derived and drawn. Numerical simulations are performed to clarify the analytical results
In many scientific fields, Bayesian models are commonly used in recent research. This research presents a new Bayesian model for estimating parameters and forecasting using the Gibbs sampler algorithm. Posterior distributions are generated using the inverse gamma distribution and the multivariate normal distribution as prior distributions. The new method was used to investigate and summaries Bayesian statistics' posterior distribution. The theory and derivation of the posterior distribution are explained in detail in this paper. The proposed approach is applied to three simulation datasets of 100, 300, and 500 sample sizes. Also, the procedure was extended to the real dataset called the rock intensity dataset. The actual dataset is collecte
... Show MoreImpressed current cathodic protection controlled by computer gives the ideal solution to the changes in environmental factors and long term coating degradation. The protection potential distribution achieved and the current demand on the anode can be regulated to protection criteria, to achieve the effective protection for the system.
In this paper, cathodic protection problem of above ground steel storage tank was investigated by an impressed current of cathodic protection with controlled potential of electrical system to manage the variation in soil resistivity. Corrosion controller has been implemented for above ground tank in LabView where tank's bottom potential to soil was manipulated to the desired set poi
... Show MoreCloud storage provides scalable and low cost resources featuring economies of scale based on cross-user architecture. As the amount of data outsourced grows explosively, data deduplication, a technique that eliminates data redundancy, becomes essential. The most important cloud service is data storage. In order to protect the privacy of data owner, data are stored in cloud in an encrypted form. However, encrypted data introduce new challenges for cloud data deduplication, which becomes crucial for data storage. Traditional deduplication schemes cannot work on encrypted data. Existing solutions of encrypted data deduplication suffer from security weakness. This paper proposes a combined compressive sensing and video deduplication to maximize
... Show More 
        