: The need for means of transmitting data in a confidential and secure manner has become one of the most important subjects in the world of communications. Therefore, the search began for what would achieve not only the confidentiality of information sent through means of communication, but also high speed of transmission and minimal energy consumption, Thus, the encryption technology using DNA was developed which fulfills all these requirements [1]. The system proposes to achieve high protection of data sent over the Internet by applying the following objectives: 1. The message is encrypted using one of the DNA methods with a key generated by the Diffie-Hellman Ephemeral algorithm, part of this key is secret and this makes the process of predicting the key very difficult. 2. Ensuring the integrity and reliability of the transmitted data using the HMAC-HASH256 algorithm that is resistant to attacks, where the 256 hash function is used with a key generated from the Diffie-Hellman Ephemeral algorithm. 3. Analyzing the system by trying to measuring the impact of using encryption with authentication on cost and speed and calculating the time taken to implement the HMAC-SHA256 algorithm. System implementation was done by using IntelliJ IDEA with java FX.
The research aims to improve the effectiveness of internal control system according to a model COSO, by identifying the availability of system components according to the model and then improve the effectiveness of each component by focusing on areas for improvement in each component, as it was addressed to a model COSO and then Maamth with the environment, the current Iraqi by introducing some improvements on the form of some mechanisms of corporate governance of the Council of Directors, and senior management, the Audit Committee, Committee appointments, especially that supplies application available in the laws and legislation, the current Iraqi, taking into consideration to make some
... Show MoreA theoretical model is developed to determine time evolution of temperature at the surface of an opaque target placed in air for cases characterized by the formation of laser supported absorption waves (LSAW) plasmas. The model takes into account the power temporal variation throughout an incident laser pulse, (i.e. pulse shape, or simply: pulse profile).
Three proposed profiles are employed and results are compared with the square pulse approximation of a constant power.