The technological development in the field of information and communication has been accompanied by the emergence of security challenges related to the transmission of information. Encryption is a good solution. An encryption process is one of the traditional methods to protect the plain text, by converting it into inarticulate form. Encryption implemented can be occurred by using some substitute techniques, shifting techniques, or mathematical operations. This paper proposed a method with two branches to encrypt text. The first branch is a new mathematical model to create and exchange keys, the proposed key exchange method is the development of Diffie-Hellman. It is a new mathematical operations model to exchange keys based on prime numbers and the possibility of using integer numbers. While the second branch of the proposal is the multi-key encryption algorithm. The current algorithm provides the ability to use more than two keys. Keys can be any kind of integer number (at least the last key is a prime number), not necessarily to be of the same length. The Encryption process is based on converting the text characters to suggested integer numbers, and these numbers are converted to other numbers by using a multilevel mathematical model many times (a multilevel process depending on the number of keys used), while the decryption process is a one-level process using just one key as the main key, while the other keys used as secondary keys. The messages are encoded before encryption (coded by ASCII or any suggested system). The algorithm can use an unlimited number of keys with a very large size (more than 7500 bytes), at least one of them a prime number. Exponentiation is also used for keys to increase complexity. The experiments proved the robustness of the key exchange protocol and the encryption algorithm in addition to the security. Comparing the suggested method with other methods ensures that the suggested method is more secure and flexible and easy to implement.
Heterocyclic systems, which are essential in medicinal chemistry due to their promising cytotoxic activity, are one of the most important families of organic molecules found in nature or produced in the laboratory. As a result of coupling N-(4-nitrophenyl)-3-oxo-butanamide (3) using thiourea, indole-3-carboxaldehyde, or piperonal, the pyrimidine derivatives (5a and 5b) were produced. Furthermore, pyrimidine 9 was synthesized by reacting thiophene-2-carboxaldehyde with ethyl cyanoacetate and urea with potassium carbonate as a catalyst. The chalcones 11a and 11b were synthesized by reacting equal molar quantities of 1-naphthaldehy
... Show MoreThe formation of a Schiff-base with N2O2 donor atoms derived from the hydrazine segment and its metal complexes are reported. The Schiff-base ligand; N’-((1R,2S,4R,5S,Z)-2,4-diphenyl-3-azabicyclo[3.3.1]nonan-9-ylidene)furan-2-carbohydrazide (HL) was prepared from the reaction of furan-2-carbohydrazide with (1R, 2R, 4R, 5S)-2,4-diphenyl-3-azabicyclo[3.3.1]nonan-9-one (M1) in ethanol medium. The reaction of the title ligand with selected metal ions Cr(III), Mn(II), Ni(II), Cu(II), Zn(II) and Cd(II) gave complexes with the general formula [M(L)Cl2], (where: M = Cr(III), Mn(II), Ni(II), Cu(II), Zn(II) and Cd(II)). Spectroscopic analyses Fourier transform infrared (FT-IR), Nuclear Magnetic Resonance (NMR) Carbon-13 nuclear magnetic res
... Show MoreAmong a collection of leafhoppers from Erbil Province in Kurdistan/Iraq, a new species of the genus Arboridia Zakhvatkin, 1946 was designated and described here as a new species to the science. The erection of this species was mainly built on the external characters included the male genitalia. Sites and dates of collections so as the host-plants were verified.
Two new nonsymmetrical mesogenic homologous series of terminal substituent ether (series [Vn]) and carboxy (series [VIn]) incorporating azobenzene and 1,3,4-oxadiazole group were synthesized. Both series have been All compounds thus isolated were purified and characterized by elemental analysis, Fourier Transform Infrared Spectroscopy, 1H NMR, along with thermal analysis and texture observation using Differential Scanning Calorimetry (DSC) and Polarizing Optical Microscopy (POM), respectively. All compounds of the first series exhibited liquid crystalline properties. The homologues [V1]-[V3] display a nematic mesophase, the compounds [V4]-[V7] exhibit a dimorphism behavior, nematic (N) and smectic A (SmA) mesophases, the compounds [V8] and
... Show MoreThe taxonomy of Ficus L., 1753 species is confusing because of the intense morphological variability and the ambiguity of the taxa. This study handled 36 macro-morphological characteristics to clarify the taxonomic identity of the taxa. The study revealed that Ficus is represented in the Egyptian gardens with forty-one taxa; 33 species, 4 subspecies and 4 varieties, and classified into five subgenera: Ficus Corner, 1960; Terega Raf., 1838; Sycomorus Raf., 1838; Synoecia (Miq.) Miq., 1867, and Spherosuke Raf.,1838; out of them seven were misidentified. Amongst, four new Ficus taxa were recently introduced to Egypt namely: F. lingua subsp. lingua Warb. ex De Wild. & T. Durand, 1901; F. pumila L., 1753; F. rumphii Blume, 1825, and F. su
... Show MoreThe main intention of this study was to investigate the development of a new optimization technique based on the differential evolution (DE) algorithm, for the purpose of linear frequency modulation radar signal de-noising. As the standard DE algorithm is a fixed length optimizer, it is not suitable for solving signal de-noising problems that call for variability. A modified crossover scheme called rand-length crossover was designed to fit the proposed variable-length DE, and the new DE algorithm is referred to as the random variable-length crossover differential evolution (rvlx-DE) algorithm. The measurement results demonstrate a highly efficient capability for target detection in terms of frequency response and peak forming that was isola
... Show MoreDuring COVID-19, wearing a mask was globally mandated in various workplaces, departments, and offices. New deep learning convolutional neural network (CNN) based classifications were proposed to increase the validation accuracy of face mask detection. This work introduces a face mask model that is able to recognize whether a person is wearing mask or not. The proposed model has two stages to detect and recognize the face mask; at the first stage, the Haar cascade detector is used to detect the face, while at the second stage, the proposed CNN model is used as a classification model that is built from scratch. The experiment was applied on masked faces (MAFA) dataset with images of 160x160 pixels size and RGB color. The model achieve
... Show MoreThis study identified the genus Coelastrella Chodat, 1922 which was isolated from a sediment sample taken from the Tigris river in Baghdad Governorate, Iraq. The alga was isolated and cultured in modified Chu 10 media and the morphological features of the isolated algae were observed in light microscopy (LM); it showed some characteristic features of this genus, such as its ellipsoidal or lemon- shaped cells, a visible pyrenoid and the chloroplast parietal. To ensure correct identification of the isolated alga, a molecular analysis using 18S rRNA gene and DNA sequencing revealed a match with C. terrestris (Reisigl) Hedewald & N. Hanagata 2002. This species is a new record in Iraq
... Show MoreA new Azo‐Schiff base ligand L was prepared by reaction of m‐hydroxy benzoic acid with (Schiff base B) of 3‐[2‐(1H–indol‐3‐yl)‐ethylimino]‐1.5‐dimethyl‐2‐phenyl‐2,3‐dihydro‐1H‐pyrazol‐4‐ylamine. This synthesized ligand was used for complexation with different metal ions like Ni(II), Co(II), Pd(II) and Pt(IV) by using a molar ratio of ligand: metal as 1:1. Resulted compounds were characterized by NMR (1H and 13C), UV–vis spectroscopy, TGA, FT‐IR, MS, elemental analysis, magnetic moment and molar conductivity studies. The activation thermodynamic parameters, such as ΔE*, ΔH*, ΔS*, ΔG*and
... Show MoreVarious theories have been proposed since in last century to predict the first sighting of a new crescent moon. None of them uses the concept of machine and deep learning to process, interpret and simulate patterns hidden in databases. Many of these theories use interpolation and extrapolation techniques to identify sighting regions through such data. In this study, a pattern recognizer artificial neural network was trained to distinguish between visibility regions. Essential parameters of crescent moon sighting were collected from moon sight datasets and used to build an intelligent system of pattern recognition to predict the crescent sight conditions. The proposed ANN learned the datasets with an accuracy of more than 72% in comp
... Show More