Cryptography is the process of transforming message to avoid an unauthorized access of data. One of the main problems and an important part in cryptography with secret key algorithms is key. For higher level of secure communication key plays an important role. For increasing the level of security in any communication, both parties must have a copy of the secret key which, unfortunately, is not that easy to achieve. Triple Data Encryption Standard algorithm is weak due to its weak key generation, so that key must be reconfigured to make this algorithm more secure, effective, and strong. Encryption key enhances the Triple Data Encryption Standard algorithm securities. This paper proposed a combination of two efficient encryption algorithms to satisfy the purpose of information security by adding a new level of security to Triple Data Encryption Standard algorithm using Nth Degree Truncated Polynomial Ring Unit algorithm. This aim achieved by adding two new key functions, the first one is Enckey(), and the second one is Deckey() for encryption and decryption key of Triple Data Encryption Standard to make this algorithm more stronger. The obtained results of this paper also have good resistance against brute-force attack which makes the system more effective by applying Nth Degree Truncated Polynomial Ring Unit algorithm to encrypt and decrypt key of Triple Data Encryption Standard. Also, these modifications enhance the degree of complexity, increase key search space, and make the ciphered message difficult to be cracked by the attacker.
Autorías: Mustafa Abdulamir Hussain, Ahmed Sebeaatea Almujamay, Riyadh khaleel khammas. Localización: Revista iberoamericana de psicología del ejercicio y el deporte. Nº. 5, 2022. Artículo de Revista en Dialnet.
My research to study the processes of the creation of shapes and encrypt any encryption in design forms and contents of computer technology as the creative property of definable and renewal, change and transformation process of transformative theme of shape, form and content encryption process in textile designs lets us know the meaning or substance which may be invisible to the encryption in the digital design of fabrics is a recruitment ideas modern and refined through a technique to accomplish the work of a beautiful audiences with novelty and innovation. The search includes four chapters:1Chapter I deal with the problem of research and its current research (form and content encryption with digital designs in women's contemporary fabr
... Show MoreBig data of different types, such as texts and images, are rapidly generated from the internet and other applications. Dealing with this data using traditional methods is not practical since it is available in various sizes, types, and processing speed requirements. Therefore, data analytics has become an important tool because only meaningful information is analyzed and extracted, which makes it essential for big data applications to analyze and extract useful information. This paper presents several innovative methods that use data analytics techniques to improve the analysis process and data management. Furthermore, this paper discusses how the revolution of data analytics based on artificial intelligence algorithms might provide
... Show MoreIn practical engineering problems, uncertainty exists not only in external excitations but also in structural parameters. This study investigates the influence of structural geometry, elastic modulus, mass density, and section dimension uncertainty on the stochastic earthquake response of portal frames subjected to random ground motions. The North-South component of the El Centro earthquake in 1940 in California is selected as the ground excitation. Using the power spectral density function, the two-dimensional finite element model of the portal frame’s base motion is modified to account for random ground motions. A probabilistic study of the portal frame structure using stochastic finite elements utilizing Monte Carlo simulation
... Show MoreThe goal of health awareness is to familiarize people with health information and facts, and make them realize their sense of responsibility towards their health and the health of others. And translate that goal in practice through applying healthy and sound behaviors spontaneously. This, the goal, is pursued by health awareness announcements through employing announcement persuasion of health as one of the methods of influencing the masses to adopt ideas, behaviors, and adherence to health advice and guidelines; The study aims to analyze the content of the Ministry of Health and Environment announcements regarding health awareness and to reveal the most employable persuasions in health awareness announcements
... Show MoreMedication safety and effectiveness can be improved through interprofessional collaboration. The goals of this study were to measure the degree of physician–pharmacist collaboration within Iraqi governmental healthcare settings and to investigate factors influencing this collaboration.
This cross-sectional study was conducted in Al-Najaf Province using the Collaborative Working Relationship Model and Physician–Pharmacist Collaborative Instrument (PPCI). Four phar
An edge dominating set of a graph is said to be an odd (even) sum degree edge dominating set (osded (esded) - set) of G if the sum of the degree of all edges in X is an odd (even) number. The odd (even) sum degree edge domination number is the minimum cardinality taken over all odd (even) sum degree edge dominating sets of G and is defined as zero if no such odd (even) sum degree edge dominating set exists in G. In this paper, the odd (even) sum degree domination concept is extended on the co-dominating set E-T of a graph G, where T is an edge dominating set of G. The corresponding parameters co-odd (even) sum degree edge dominating set, co-odd (even) sum degree edge domination number and co-odd (even) sum degree edge domin
... Show MoreBig data analysis is essential for modern applications in areas such as healthcare, assistive technology, intelligent transportation, environment and climate monitoring. Traditional algorithms in data mining and machine learning do not scale well with data size. Mining and learning from big data need time and memory efficient techniques, albeit the cost of possible loss in accuracy. We have developed a data aggregation structure to summarize data with large number of instances and data generated from multiple data sources. Data are aggregated at multiple resolutions and resolution provides a trade-off between efficiency and accuracy. The structure is built once, updated incrementally, and serves as a common data input for multiple mining an
... Show MoreThe research aimed at identifying the values of ball launch and ring entrance angle and relations among them as well as identifying the contribution of ball launch and angle variables in 3 point jump in basketball. The researchers hypothesized statistical relation between ball launch and entrance angle. They used the descriptive method on (10) basketball players best known for their 3 point jump shot. Each player is given (10) attempts and only attempts with a larger entrance angle in recorded. The results showed that the height of ball launch players an integral role in decreasing entrance angle as well as ball launch angle did not correlate with the entrance angle. Finally, ball launch variables have no effect or contribution on ball entr
... Show More