The technological development in the field of information and communication has been accompanied by the emergence of security challenges related to the transmission of information. Encryption is a good solution. An encryption process is one of the traditional methods to protect the plain text, by converting it into inarticulate form. Encryption implemented can be occurred by using some substitute techniques, shifting techniques, or mathematical operations. This paper proposed a method with two branches to encrypt text. The first branch is a new mathematical model to create and exchange keys, the proposed key exchange method is the development of Diffie-Hellman. It is a new mathematical operations model to exchange keys based on prime numbers and the possibility of using integer numbers. While the second branch of the proposal is the multi-key encryption algorithm. The current algorithm provides the ability to use more than two keys. Keys can be any kind of integer number (at least the last key is a prime number), not necessarily to be of the same length. The Encryption process is based on converting the text characters to suggested integer numbers, and these numbers are converted to other numbers by using a multilevel mathematical model many times (a multilevel process depending on the number of keys used), while the decryption process is a one-level process using just one key as the main key, while the other keys used as secondary keys. The messages are encoded before encryption (coded by ASCII or any suggested system). The algorithm can use an unlimited number of keys with a very large size (more than 7500 bytes), at least one of them a prime number. Exponentiation is also used for keys to increase complexity. The experiments proved the robustness of the key exchange protocol and the encryption algorithm in addition to the security. Comparing the suggested method with other methods ensures that the suggested method is more secure and flexible and easy to implement.
4-aminobenzenesulfonamide conjugates of ibuprofen (compound 10) and indomethacin (compound 11) have been designed and synthesized by the reaction of sulfanilamide (compound 7) with 2-(4-isobutylphenyl) propanoic acid (ibuprofen) and 2-(1-(4-chlorobenzoyl)-5-methoxy-2-methyl-1H-indol-3-yl)acetic acid (indomethacin) for the evaluation as potential anti-inflammatory agents with expected selectivity against COX-2 enzyme. In vivo acute anti-inflammatory activity of the synthesized final compounds (10 and 11) was evaluated in rats using egg-white induced edema model of inflammation in a dose equivalent to (10mg/Kg) of ibuprofen and (2mg/kg) of indomethacin. The tested compounds pr
... Show Moreالصيغة العامة للمعقدات الجديدة [M2(BDS)Cl4] الناتجة من تفاعل الليكاند الجديد] ن1,ن4-ثنائي(1أ –بنزو]د[ اميدازول-2-يل)-ن1,ن4-ثنائي(4-ثنائي مثيل امينو) بنزيل) سكسنمايد[ (BDS) مع الايونات الفلزية الكادميوم, الكوبلت, الزئبق, النحاس والنيكل. تم اشتقاق هذا الليكاند من تفاعل المواد الثلاث 4-(ثنائي ميثيل أمينو) بنزالدهيد، 2-أمينو بنزيميدازول، وكلوريد السكسينيل. تم تشخيص المركبات باستخدام مطيافية طيف الاشعة تحت الحمراء وطيف الرن
... Show MoreThe ciliate species isolated from midgut and hindgut of Rough-tailed gecko Cyrtopodion scabrum (Heyden, 1827), identified as Nyctotherus hardwickii was collected from many regions of Baghdad, Iraq. The current study deals with a description and comparison of the morphology and morphometric characters of this species for the first time in Iraq.
Naidid worms were sorted from 27 samples of aquatic macrophyta including ceratophyllum demersum , Potamogeton crispus and, Hydrilla verticellat with associated filamentous algae were collected from Euphrates River at Al-Mussayab city, 60 Km southwest Baghdad. The result of sorted worms revealed the presence of eight species of subfamily Naidinae, which are consider as new records for Iraq, including Stephensoniana trivandrana; Paranais frici, Ophidonais serpentine, Specaria josinae, Dero (Dero) evelinae , Dero (Aulophorus) indicus , Nais pseudobtusa and finally N. stolci. This investigation includes morphological descriptions for each species illustrated by identification criteria photos.
n this study new derivatives of Schiff bases (5-10) were synthesized from the new starting material 1 . Which has been synthesized by the reaction of (1 mol.) of dichloroacetic acid with two moles of morpholine, in the presence of potassium hydroxide, Ester derivatives 2 and 3 were synthesized by the reaction of 1 with methanol or ethanol respectively in the presence of sulphuric acid as catalyst . Compound 2 was also prepared from dimethylsulphate with high yield , 2 and 3 was used to synthesized 2,2-dimorpholinylacetohydrazide 4 via reaction with NH2NH2.H2O 80% .Imines (5-10) were synthesized via the reaction of 4 with appropriate aromatic aldehydes in the presence of G.A.A as a catalyst . Derivatives compounds (1-10) were identifie
... Show MoreOne of the most popular and legally recognized behavioral biometrics is the individual's signature, which is used for verification and identification in many different industries, including business, law, and finance. The purpose of the signature verification method is to distinguish genuine from forged signatures, a task complicated by cultural and personal variances. Analysis, comparison, and evaluation of handwriting features are performed in forensic handwriting analysis to establish whether or not the writing was produced by a known writer. In contrast to other languages, Arabic makes use of diacritics, ligatures, and overlaps that are unique to it. Due to the absence of dynamic information in the writing of Arabic signatures,
... Show MoreSignature verification involves vague situations in which a signature could resemble many reference samples or might differ because of handwriting variances. By presenting the features and similarity score of signatures from the matching algorithm as fuzzy sets and capturing the degrees of membership, non-membership, and indeterminacy, a neutrosophic engine can significantly contribute to signature verification by addressing the inherent uncertainties and ambiguities present in signatures. But type-1 neutrosophic logic gives these membership functions fixed values, which could not adequately capture the various degrees of uncertainty in the characteristics of signatures. Type-1 neutrosophic representation is also unable to adjust to various
... Show MoreThis paper critically looks at the studies that investigated the Social Network Sites in the Arab region asking whether they made a practical addition to the field of information and communication sciences or not. The study tried to lift the ambiguity of the variety of names, as well as the most important theoretical and methodological approaches used by these studies highlighting its scientific limitations. The research discussed the most important concepts used by these studies such as Interactivity, Citizen Journalism, Public Sphere, and Social Capital and showed the problems of using them because each concept comes out of a specific view to these websites. The importation of these concepts from a cultural and social context to an Ara
... Show More