The technological development in the field of information and communication has been accompanied by the emergence of security challenges related to the transmission of information. Encryption is a good solution. An encryption process is one of the traditional methods to protect the plain text, by converting it into inarticulate form. Encryption implemented can be occurred by using some substitute techniques, shifting techniques, or mathematical operations. This paper proposed a method with two branches to encrypt text. The first branch is a new mathematical model to create and exchange keys, the proposed key exchange method is the development of Diffie-Hellman. It is a new mathematical operations model to exchange keys based on prime numbers and the possibility of using integer numbers. While the second branch of the proposal is the multi-key encryption algorithm. The current algorithm provides the ability to use more than two keys. Keys can be any kind of integer number (at least the last key is a prime number), not necessarily to be of the same length. The Encryption process is based on converting the text characters to suggested integer numbers, and these numbers are converted to other numbers by using a multilevel mathematical model many times (a multilevel process depending on the number of keys used), while the decryption process is a one-level process using just one key as the main key, while the other keys used as secondary keys. The messages are encoded before encryption (coded by ASCII or any suggested system). The algorithm can use an unlimited number of keys with a very large size (more than 7500 bytes), at least one of them a prime number. Exponentiation is also used for keys to increase complexity. The experiments proved the robustness of the key exchange protocol and the encryption algorithm in addition to the security. Comparing the suggested method with other methods ensures that the suggested method is more secure and flexible and easy to implement.
The new compounds of pyrazolines were synthesized from the reaction of different acid hydrazide with ethylacetoacetate and ethanol under reflux. These compounds were obtained from many sequence reactions. The 4-acetyl-5-methyl-2,4-dihydro-3H-pyrazol-3-one compounds synthesized from the reaction of 5-methyl-2,4-dihydro-3H-pyrazol-3-one with acetyl chloride in calcium hydroxide and 1,4-dioxane. Finaly, Schiff bases were prepared via condensation reaction of products of mono- and tri ketone derivatives[IV]a, b with phenyl hydrazines as presented in (Scheme 1, 2). The synthesized compounds were identification by using FTIR, NMR and Mass spectroscopy (of some of them).
Since the Internet has been more widely used and more people have access to multimedia content, copyright hacking, and piracy have risen. By the use of watermarking techniques, security, asset protection, and authentication have all been made possible. In this paper, a comparison between fragile and robust watermarking techniques has been presented to benefit them in recent studies to increase the level of security of critical media. A new technique has been suggested when adding an embedded value (129) to each pixel of the cover image and representing it as a key to thwart the attacker, increase security, rise imperceptibility, and make the system faster in detecting the tamper from unauthorized users. Using the two watermarking ty
... Show MoreIn May 20th. 1985 two species of aphids were found on the roots of Vicia faba L. in Hammam region 30 Kilometer south of Mosul. Samples of these aphids were sent to the Commonwealth Institute of Entomology, London. ( No. 17002/9804 Asia ) and identified as being Smynthurodes betas westwood and Dysaphis crataegi (Kaltenbach) (APhididae : Homoptera). The first species was dominant. The latter species was also noticed on the roots of the common bishop's weed (Ammi majus L.) and on the wide carrot (Daucus carrota L.) of the family Umbelliferae (Bodenheimer & Swirski, 1957).
The research included preparation of new Schiff base (L) by two steps: preparation of precursor [bis(2-formyl-6-methoxyphenyl) succinate] (P) by reacting (3-methoxy salicyl aldehyde) with (succinoyl dichloride) as first step then react the prepared precursor (P) with (ethanethioamide) to have the new Schiff base [bis(2-((ethane thioyl imino) methyl)-6-methoxy phenyl) succinate] (L) as second step. Characterized compounds based on Mass spectra, 1 H, 13CNMR (for ligand (L)), FT-IR and UV spectrum, melting point, molar conduct, %C, %H, and %N, the percentage of the metal in complexes %M, magnetic susceptibility, while study corrosion inhibition (mild steel) in acid solution by weight loss. These measurements proved that by (Oxygen, Nitrogen, a
... Show MoreThe COVID-19 pandemic has profoundly affected the healthcare sector and the productivity of medical staff and doctors. This study employs machine learning to analyze the post-COVID-19 impact on the productivity of medical staff and doctors across various specialties. A cross-sectional study was conducted on 960 participants from different specialties between June 1, 2022, and April 5, 2023. The study collected demographic data, including age, gender, and socioeconomic status, as well as information on participants' sleeping habits and any COVID-19 complications they experienced. The findings indicate a significant decline in the productivity of medical staff and doctors, with an average reduction of 23% during the post-COVID-19 period. T
... Show MoreThe estimation of the parameters of Two Parameters Gamma Distribution in case of missing data has been made by using two important methods: the Maximum Likelihood Method and the Shrinkage Method. The former one consists of three methods to solve the MLE non-linear equation by which the estimators of the maximum likelihood can be obtained: Newton-Raphson, Thom and Sinha methods. Thom and Sinha methods are developed by the researcher to be suitable in case of missing data. Furthermore, the Bowman, Shenton and Lam Method, which depends on the Three Parameters Gamma Distribution to get the maximum likelihood estimators, has been developed. A comparison has been made between the methods in the experimental aspect to find the best meth
... Show More