Cryptography is the process of transforming message to avoid an unauthorized access of data. One of the main problems and an important part in cryptography with secret key algorithms is key. For higher level of secure communication key plays an important role. For increasing the level of security in any communication, both parties must have a copy of the secret key which, unfortunately, is not that easy to achieve. Triple Data Encryption Standard algorithm is weak due to its weak key generation, so that key must be reconfigured to make this algorithm more secure, effective, and strong. Encryption key enhances the Triple Data Encryption Standard algorithm securities. This paper proposed a combination of two efficient encryption algorithms to satisfy the purpose of information security by adding a new level of security to Triple Data Encryption Standard algorithm using Nth Degree Truncated Polynomial Ring Unit algorithm. This aim achieved by adding two new key functions, the first one is Enckey(), and the second one is Deckey() for encryption and decryption key of Triple Data Encryption Standard to make this algorithm more stronger. The obtained results of this paper also have good resistance against brute-force attack which makes the system more effective by applying Nth Degree Truncated Polynomial Ring Unit algorithm to encrypt and decrypt key of Triple Data Encryption Standard. Also, these modifications enhance the degree of complexity, increase key search space, and make the ciphered message difficult to be cracked by the attacker.
Let be any group with identity element (e) . A subgroup intersection graph of a subset is the Graph with V ( ) = - e and two separate peaks c and d contiguous for c and d if and only if , Where is a Periodic subset of resulting from . We find some topological indicators in this paper and Multi-border (Hosoya and Schultz) of , where , is aprime number.
This research will cover different aspects of estimating process of construction work in a desert area. The inherent difficulties which accompany the cost estimating of the construction works in desert environment in a developing country, will stem from the limited information available, resources scarcity, low level of skilled workers, the prevailing severe weather conditions and many others, which definitely don't provide a fair, reliable and accurate estimation. This study tries to present unit price to estimate the cost in preliminary phase of a project. Estimations are supported by developing mathematical equations based on the historical data of maintenance, new construction of managerial and school projects.
... Show MoreThe productivity of oil wells may be improved by determining the value of enhancing well productivity and the likely reasons or sources of formation damage after the well has been recognized as underperforming. Oil well productivity may be improved, but the economics of this gradual improvement may be compromised. It is important to analyze the influence of the skin effect on the recovery of the reserve.
The acid treatment evaluated for the well AD-12, primarily for the zone Mi4; using a license of Stimpro Stimulation Software to validate the experimental work to the field scale, this software is considered the most comprehensive instrument for planning and monitoring matrix acid treatments and utilizing actual data to prov
... Show MoreThe productivity of oil wells may be improved by determining the value of enhancing well productivity and the likely reasons or sources of formation damage after the well has been recognized as underperforming. Oil well productivity may be improved, but the economics of this gradual improvement may be compromised. It is important to analyze the influence of the skin effect on the recovery of the reserve. The acid treatment evaluated for the well AD-12, primarily for the zone Mi4; using a license of Stimpro Stimulation Software to validate the experimental work to the field scale, this software is considered the most comprehensive instrument for planning and monitoring matrix acid treatments and utilizing actual data to provide a far
... Show MoreContemporary residential neighborhoods suffer from weak sustainability of urban residential environments as a result of the adoption of inefficient spatial organization at the neighborhood unit level. This resulted negative characteristics which affected the achievement of sustainable development plans for the residential environment that constitute the majority of the urban fabric of cities.
The physical affordances ,within the vocabulary of recent times,overcame the spiritual ones and affected the residential environment. Accordingly,the concept of space changed in contemporary residential areas through the dominance of the physical aspect (mass) on the symbolic aspect (space).The modern technology occupied an important level b
... Show MoreBackground: Varicose vein (VV) is a common problem that mostly occurs in legs. This medical condition can influence the quality of life and working condition of nurses. Aim of the study: To estimate the prevalence of lower limbs varicosity and its associated risk factors among nurses. Methods: This a cross-sectional descriptive study was carried out among 100 nurses working Baghdad Teaching Hospital, Surgical Specialties Hospital, and Al- Kidney Teaching Hospital, Baghdad, Iraq from January 1st to May 10th, 2022. The participants were recruited in the study using systematic random sampling. The Occupational Sitting and Physical Activity and Aberdeen Varicose Vein Questionnaires were used for data gathering. Results: The prevalence o
... Show MoreInformation hiding strategies have recently gained popularity in a variety of fields. Digital audio, video, and images are increasingly being labelled with distinct but undetectable marks that may contain a hidden copyright notice or serial number, or even directly help to prevent unauthorized duplication. This approach is extended to medical images by hiding secret information in them using the structure of a different file format. The hidden information may be related to the patient. In this paper, a method for hiding secret information in DICOM images is proposed based on Discrete Wavelet Transform (DWT). Firstly. segmented all slices of a 3D-image into a specific block size and collecting the host image depend on a generated key
... Show MoreIn this study, the mobile phone traces concern an ephemeral event which represents important densities of people. This research aims to study city pulse and human mobility evolution that would be arise during specific event (Armada festival), by modelling and simulating human mobility of the observed region, depending on CDRs (Call Detail Records) data. The most pivot questions of this research are: Why human mobility studied? What are the human life patterns in the observed region inside Rouen city during Armada festival? How life patterns and individuals' mobility could be extracted for this region from mobile DB (CDRs)? The radius of gyration parameter has been applied to elaborate human life patterns with regards to (work, off) days for
... Show MoreData compression offers an attractive approach to reducing communication costs using available bandwidth effectively. It makes sense to pursue research on developing algorithms that can most effectively use available network. It is also important to consider the security aspect of the data being transmitted is vulnerable to attacks. The basic aim of this work is to develop a module for combining the operation of compression and encryption on the same set of data to perform these two operations simultaneously. This is achieved through embedding encryption into compression algorithms since both cryptographic ciphers and entropy coders bear certain resemblance in the sense of secrecy. First in the secure compression module, the given text is p
... Show MoreIn this study, we review the ARIMA (p, d, q), the EWMA and the DLM (dynamic linear moodelling) procedures in brief in order to accomdate the ac(autocorrelation) structure of data .We consider the recursive estimation and prediction algorithms based on Bayes and KF (Kalman filtering) techniques for correlated observations.We investigate the effect on the MSE of these procedures and compare them using generated data.