In this paper, we designed a new efficient stream cipher cryptosystem that depend on a chaotic map to encrypt (decrypt) different types of digital images. The designed encryption system passed all basic efficiency criteria (like Randomness, MSE, PSNR, Histogram Analysis, and Key Space) that were applied to the key extracted from the random generator as well as to the digital images after completing the encryption process.
The present work represents description of three new species of genus Anthrenus
Geoffory from Iraq, these are : A. aradensis sp. nov., A. fabrici sp. nov. and A.
unicolor sp. nov. Locality, host plants and date of collection were given.
Background. In cases of spontaneous subarachnoid haemorrhage (SAH) with multiple intracranial aneurysms (MIAs) detected on angiography, some radiological clues assist in determining the site of a ruptured aneurysm which is bleeding is quite beneficial for the selection of the best treatment strategy. Case description. We report a case of a 60 years old patient who presented with spontaneous SAH, sellar hematoma, and three different aneurysms detected in angiography. Although the right Posterior communicating artery (PcomA) aneurysms showed Murphy’s teat on angiography intraoperatively, we discovered that the right superior hypophyseal aneurysm (SHA) was the source of the index bleeding. Both aneurysms were clipped successfully. Co
... Show MoreIn this paper, a description of a design for new DES block cipher, namely DES64X and DES128X. The goals of this design, a part of its security level, are large implementation flexibility on various operating systems as well as high performances. The high level structure is based on the principle of DES and Feistel schema, and proposes the design of an efficient key-schedule algorithm which will output pseudorandomsequences of subkeys. The main goal is to reach the highest possible flexibility, in terms of round numbers, key size, and block size. A comparison of the proposed systems on 32-bit, 64-bit operating system, using 32-bit and 64-bit Java Virtual Machine (JVM), showed that the latter has much better performance than the former.
... Show MoreIn this research , phthallic anhydride ring is opened with 4-methyl aniline and acetone as a solvent to results the compound [I] that reacted with dimethyl sulphate and anhydrous sodium carbonate formation to phathalate ester [II], while the acid hydrazide compound [III], was obtained from mixed the compound [II]with hydrazine hydrate, Synthesis four type of shiff bases[IV]a-d was synthesized from the reaction of acid hydrazide [III] with aromatic aldehyde or ketone , when reacted Shiff bases with phthalic anhydride or naphthalicanhydride,I get eight derivatives of oxazepine [V]a-d , [VI]a-d. The bacterial activity of the new compounds studied by four species of bacteria: Esherichia Coli, Enterobactecloacae (Gram negative) and staphylococcu
... Show More Sixteen new complexes with the general formula [M(L)2(H2O)2] were prepared resulting from the reaction of the two new Schiff base ligands, which are: - L1= (E)-5-((2-hydroxybenzylidene)amino)-2-phenyl-2,4-dihydro-3H-pyrazol-3-one) L2 = (E)-5-((2-hydroxy-3-methoxybenzylidene)amino)-2-phenylpyrazolidin-3-one) With divalent metal ions (manganese, cobalt, nickel, copper, zinc, cadmium, mercury) and (tetravalent platinum). Ligands was derived from the reaction of the amine (5-amino-2-phenyl-2,4-dihydro-3H-pyrazol-3-one) with Salicylaldehyde and ortho-vanillin, which is linked to the metal ions via the nitrogen atoms are the isomethene group and the oxygen is the hydroxide group of t
... Show MoreThis article reveals the first record of the parasitoid wasp, Monodontomerus obscurus Westwood (Hymenoptera, Torymidae) from Iraq. A total of 27 specimens were emerged from mud nests of sphecoid wasp of Sceliphron sp. (Hymenoptera, Sphecidae), that collected from a wall at a residential garden in Dohuk province. A short morphological description is presented.
The purpose of this research is to synthesize a new mixed ligand Schiff base complexes of Co(II),Ni(II),Cu(II), Zn(II), Cd(II), and Hg(II),which are formulated from the Schiff base (L) that resulted from orthophathalaldehyde (2-PA) with 4-chloroaniline(4-NA). Diagnosis of prepared Ligand and its complexes is done by spectral methods as 1H–NMR, mass spectrometer, FTIR, UV-Vis, molar conductance, elemental microanalyses, atomic absoption and magnetic susceptibility. The analytical studyofall new complexes has shown octahedral geometries. Organic performance study of ligand Schiff base and its complexes reveals different activities agansit four types of bactria; two gram (+) and two gram (-) .
The present work involved preparation of new substituted and unsubstituted and poly imides (1-17) using reaction of acryloyl chloride with different amides (aliphatic ,aromatic) in the presence of a suitable solvent and amount tri ethyl amine (Et3N) with heating – the structure confirmation of all polymers were proved using FT-IR,1H-NMR,C13NMR and UV spectroscopy ,thermal analysis (TG) for some polymers confirmed their thermal stabilities . Other physical properties including softening and melting points, PH and solubility of the polymers were also measured
Newly series of 6,6’-((2-(Aryl)dihydropyrimidine-1,3(2H,4H)-diyl)bis(methylene))bis(2-methoxy phenol) (3a-i) were synthesized from cyclization of 6,6’-((propane-1,3-diylbis (azanediyl)) bis(methylene)) bis(2-methoxyphenol) with several aryl aldehyde in the presence of acetic acid. The newly compounds characterized from their IR, NMR and EIMs spectra. The antioxidant capacity of these compounds screened by utilizing DPPH and FRAP assays. Compounds 3g and 3i exhibited significant antioxidant capability in both assays. Docking study for these compounds as a potential inhibitors of gyrase enzyme were carried out. Compound 3g exhibited significant inhibition with binding free energies (DG) higher than novobiocin. compounds 2, 3a, 3b, 3
... Show MoreThe aim of this paper is to present a new methodology to find the private key of RSA. A new initial value which is generated from a new equation is selected to speed up the process. In fact, after this value is found, brute force attack is chosen to discover the private key. In addition, for a proposed equation, the multiplier of Euler totient function to find both of the public key and the private key is assigned as 1. Then, it implies that an equation that estimates a new initial value is suitable for the small multiplier. The experimental results show that if all prime factors of the modulus are assigned larger than 3 and the multiplier is 1, the distance between an initial value and the private key
... Show More