Preferred Language
Articles
/
0xcUPo8BVTCNdQwCqWTl
Strong Triple Data Encryption Standard Algorithm using Nth Degree Truncated Polynomial Ring Unit
...Show More Authors

Cryptography is the process of transforming message to avoid an unauthorized access of data. One of the main problems and an important part in cryptography with secret key algorithms is key. For higher level of secure communication key plays an important role. For increasing the level of security in any communication, both parties must have a copy of the secret key which, unfortunately, is not that easy to achieve. Triple Data Encryption Standard algorithm is weak due to its weak key generation, so that key must be reconfigured to make this algorithm more secure, effective, and strong. Encryption key enhances the Triple Data Encryption Standard algorithm securities. This paper proposed a combination of two efficient encryption algorithms to satisfy the purpose of information security by adding a new level of security to Triple Data Encryption Standard algorithm using Nth Degree Truncated Polynomial Ring Unit algorithm. This aim achieved by adding two new key functions, the first one is Enckey(), and the second one is Deckey() for encryption and decryption key of Triple Data Encryption Standard to make this algorithm more stronger. The obtained results of this paper also have good resistance against brute-force attack which makes the system more effective by applying Nth Degree Truncated Polynomial Ring Unit algorithm to encrypt and decrypt key of Triple Data Encryption Standard. Also, these modifications enhance the degree of complexity, increase key search space, and make the ciphered message difficult to be cracked by the attacker.

Publication Date
Sun Aug 21 2022
Journal Name
International Journal Of Health Sciences
Molecular detection of fimH& mrkDgenes of strong biofilm producers & MDR Klebsiella pneumoniae
...Show More Authors

Klebsiella pneumoniae is an adaptable pathogen that forms biofilms on a variety of surfaces. This study's objective was to identify the presence of fimbrial genes (types 1 and 3) in K. pneumoniae strains isolated from various clinical sources based on their antibiotic resistance and ability to form biofilms. According to identification utilizing the vitek 2 technology and confirmation by molecular identification targeting the 16S rRNA gene with a particular primer, forty isolates were identified from clinical specimens. The vitek 2 compact system was utilized to evaluate the antibiotic susceptibility of all the isolates. The findings revealed a range of resistance percentages, including 52.5% for Penicillin, 40.5% for Trimethoprim/S

... Show More
View Publication
Crossref
Publication Date
Wed Mar 01 2023
Journal Name
Baghdad Science Journal
Existence of Fixed Points for Expansive Mappings in Complete Strong Altering JS-metric space
...Show More Authors

The paper aims at initiating and exploring the concept of extended metric known as the Strong Altering JS-metric, a stronger version of the Altering JS-metric. The interrelation of Strong Altering JS-metric with the b-metric and dislocated metric has been analyzed and some examples have been provided. Certain theorems on fixed points for expansive self-mappings in the setting of complete Strong Altering JS-metric space have also been discussed.

View Publication Preview PDF
Scopus (1)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Thu Apr 18 2019
Journal Name
Al-kindy College Medical Journal
Prevalence of H pylori in obese attending Obesity therapy Unit
...Show More Authors

Background: Obesity is an increasing health problem in developed countries and has grown into a major global epidemic. Recent studies suggested colonization of the stomach by Hpylori might affect gastric expression of appetite- and satiety-related hormone and patients cured of H pylori infection gained weight. Obesity and Helicobacter pylori (H. pylori) are important because of the problems they lead and their frequency of occurrence.

Objectives: To find out the prevalence of H. pylori infection in obese.

Type of the study:A cross-sectional study

Methods: A total of 32 obese female admitted to the study. Body mass indices (BMI) of all subjects wer

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Wed Sep 30 2009
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Recovery of Catalyst from Tar Formed in Phenol Production Unit
...Show More Authors

This work was conducted to study the recovery of catalyst and desirable components from tar formed in phenol production unit and more particularly relates to such a method whereby better recovery of copper salts, phenol, benzoic acid and benzoate salts from tar by aqueous acid solution was accomplished.
The effect of solvent type, solvent concentration (5, 10, 15, 20, 25 and 30 wt%), agitation speed (100, 200, 300 and 400 rpm), agitation time (5, 10, 15, 20 and 25 min), temperature (90, 100, 110, 120, 130 and 140 oC) , phase ratio (1/1, 2/1, 3/1, 4/1 and 5/1) and number of extraction (1, 2, 3, 4, and 5) were examined in order to increase the catalyst and desirable components extraction.
Four types of solvent were used; hydrochloric

... Show More
View Publication Preview PDF
Publication Date
Sun Sep 24 2023
Journal Name
Journal Of Al-qadisiyah For Computer Science And Mathematics
Iris Data Compression Based on Hexa-Data Coding
...Show More Authors

Iris research is focused on developing techniques for identifying and locating relevant biometric features, accurate segmentation and efficient computation while lending themselves to compression methods. Most iris segmentation methods are based on complex modelling of traits and characteristics which, in turn, reduce the effectiveness of the system being used as a real time system. This paper introduces a novel parameterized technique for iris segmentation. The method is based on a number of steps starting from converting grayscale eye image to a bit plane representation, selection of the most significant bit planes followed by a parameterization of the iris location resulting in an accurate segmentation of the iris from the origin

... Show More
View Publication
Crossref
Publication Date
Mon Feb 13 2023
Journal Name
Journal Of Educational And Psychological Researches
The Degree of Practicing Citizenship Values by Bisha University Students
...Show More Authors

 

Abstract

 

The study aims to identify the degree of citizenship values practiced by Bisha University students and identify the impact of gender, college, and academic level, on the degree of the practice of University students for citizenship values. The researcher used the descriptive-analytical method including a questionnaire of (44) items. To process the data, the researcher applied the computational averages, standard deviations, percentages, and T-test. The questionnaire was implemented on a sample of (600) of the 2 and 8 levels during the second semester of the academic year (2020-2019) at Bisha University. The study findings revealed that the degree of the pra

... Show More
View Publication Preview PDF
Publication Date
Mon Jan 02 2017
Journal Name
Journal Of Educational And Psychological Researches
Frustration degree and guilt among drug addicts harmful to themselves
...Show More Authors

This study aimed to identify the degree of frustration and guilt among addicts who hurt themselves with drug,  and to know the addicts perspective  who are in treatment clinics and rehabilitation centers  in Palestine, in order to achieve this goal aDeterminationThe study population has been identified , this study population consisted of ' (82) addict, the researcher used the descriptive analytical method which is appropriate for  this  study, so the researcher questioned the addicts who are in treatment clinics and rehabilitation centers  in Palestine and analyze their  responses  in light of some of the variables.

The study results showed that drug addicts who ar

... Show More
View Publication Preview PDF
Publication Date
Sat Feb 09 2019
Journal Name
Journal Of The College Of Education For Women
A comparative Study to calculate the Runs Property in the encryption systems
...Show More Authors

Cryptographic applications demand much more of a pseudo-random-sequence
generator than do most other applications. Cryptographic randomness does not mean just
statistical randomness, although that is part of it. For a sequence to be cryptographically
secure pseudo-random, it must be unpredictable.
The random sequences should satisfy the basic randomness postulates; one of them is
the run postulate (sequences of the same bit). These sequences should have about the same
number of ones and zeros, about half the runs should be of length one, one quarter of length
two, one eighth of length three, and so on.The distribution of run lengths for zeros and ones
should be the same. These properties can be measured determinis

... Show More
View Publication Preview PDF
Publication Date
Sun Apr 30 2023
Journal Name
Iraqi Geological Journal
Evaluating Machine Learning Techniques for Carbonate Formation Permeability Prediction Using Well Log Data
...Show More Authors

Machine learning has a significant advantage for many difficulties in the oil and gas industry, especially when it comes to resolving complex challenges in reservoir characterization. Permeability is one of the most difficult petrophysical parameters to predict using conventional logging techniques. Clarifications of the work flow methodology are presented alongside comprehensive models in this study. The purpose of this study is to provide a more robust technique for predicting permeability; previous studies on the Bazirgan field have attempted to do so, but their estimates have been vague, and the methods they give are obsolete and do not make any concessions to the real or rigid in order to solve the permeability computation. To

... Show More
View Publication
Scopus (11)
Crossref (6)
Scopus Crossref
Publication Date
Tue Jan 01 2019
Journal Name
Journal Of Southwest Jiaotong University
Recognizing Job Apathy Patterns of Iraqi Higher Education Employees Using Data Mining Techniques
...Show More Authors

Psychological research centers help indirectly contact professionals from the fields of human life, job environment, family life, and psychological infrastructure for psychiatric patients. This research aims to detect job apathy patterns from the behavior of employee groups in the University of Baghdad and the Iraqi Ministry of Higher Education and Scientific Research. This investigation presents an approach using data mining techniques to acquire new knowledge and differs from statistical studies in terms of supporting the researchers’ evolving needs. These techniques manipulate redundant or irrelevant attributes to discover interesting patterns. The principal issue identifies several important and affective questions taken from

... Show More
View Publication
Crossref (1)
Crossref