The technological development in the field of information and communication has been accompanied by the emergence of security challenges related to the transmission of information. Encryption is a good solution. An encryption process is one of the traditional methods to protect the plain text, by converting it into inarticulate form. Encryption implemented can be occurred by using some substitute techniques, shifting techniques, or mathematical operations. This paper proposed a method with two branches to encrypt text. The first branch is a new mathematical model to create and exchange keys, the proposed key exchange method is the development of Diffie-Hellman. It is a new mathematical operations model to exchange keys based on prime numbers and the possibility of using integer numbers. While the second branch of the proposal is the multi-key encryption algorithm. The current algorithm provides the ability to use more than two keys. Keys can be any kind of integer number (at least the last key is a prime number), not necessarily to be of the same length. The Encryption process is based on converting the text characters to suggested integer numbers, and these numbers are converted to other numbers by using a multilevel mathematical model many times (a multilevel process depending on the number of keys used), while the decryption process is a one-level process using just one key as the main key, while the other keys used as secondary keys. The messages are encoded before encryption (coded by ASCII or any suggested system). The algorithm can use an unlimited number of keys with a very large size (more than 7500 bytes), at least one of them a prime number. Exponentiation is also used for keys to increase complexity. The experiments proved the robustness of the key exchange protocol and the encryption algorithm in addition to the security. Comparing the suggested method with other methods ensures that the suggested method is more secure and flexible and easy to implement.
<p><span>A Botnet is one of many attacks that can execute malicious tasks and develop continuously. Therefore, current research introduces a comparison framework, called BotDetectorFW, with classification and complexity improvements for the detection of Botnet attack using CICIDS2017 dataset. It is a free online dataset consist of several attacks with high-dimensions features. The process of feature selection is a significant step to obtain the least features by eliminating irrelated features and consequently reduces the detection time. This process implemented inside BotDetectorFW using two steps; data clustering and five distance measure formulas (cosine, dice, driver & kroeber, overlap, and pearson correlation
... Show MoreBackground: Preoperative radiographical assessment of the maxillofacial lesions is of a great importance in guiding the surgeon during surgical procedure in reducing post-operative complications. This study highlighted the application of CBCT scan in the assessment of maxillofacial cystic and cystic like lesions as a part of advanced radiology Materials and methods: A total of 20 patients (15 males and 5 females) participated in this prospective study. CBCT scan (Kodak 9500 CBCT) with (DICOM) software utilized to perform scanning to all patients in order to assess lesion extension, morphological features and it’s relation to the adjacent vital structures. Results: In this study, the total cystic and cystic like lesions involving the
... Show MoreIn this study two types of extraction solvents were used to extract the undesirable polyaromatics, the first solvent was furfural which was used today in the Iraqi refineries and the second was NMP (N-methyl-2-pyrrolidone).
The studied effecting variables of extraction are extraction temperature ranged from 70 to 110°C and solvent to oil ratio in the range from 1:1 to 4:1.
The results of this investigation show that the viscosity index of mixed-medium lubricating oil fraction increases with increasing extraction temperature and reaches 107.82 for NMP extraction at extraction temperature 110°C and solvent to oil ratio 4:1, while the viscosity index reaches to 101 for furfural extraction at the same extraction temperature and same
Organophosphorus insecticide and growth regulator namely Ethephon (2-chloroethylphosphonic acid) are widely used as a ripening process accelerator and a cultivation duration inhibitor. Pomegranate extract (PPE) has recently been taken into consideration due to its pharmacological effects especially those associated with renal diseases. Thus, this study aims to investigate the possible protective effect of PPE against ethephon-induced nephrotoxicity in rats. In this study four groups of adult male rats were divided into control group, PPE 400 mg/kg group, Ethephon 250 mg/kg group, and finally, PPE + Ethephon group (treated with the same dose of PPE group and Ethephon group). In the current study, kidney function parameters (KIM-1, creatin
... Show MoreAbstract. In this research, the uranium concentration in (16) water samples collected from some agricultural areas surrounded with AlTuwitha nuclear site in Baghdad-Iraq was measured by using a CR-39 detector. The concentration of uranium in this study was from (0.6 ± 0.33mg/l) to (2.51 ± 0.49 mg/l), and the weighted average for the concentrations (1.262 ± 0.402 mg/l). The results showed it is a concentration of uranium level in water samples studied is higher than the allowed limit recommended by WHO and ICRP.
Abstract:
This study aims to identify the level of patients’ satisfaction among a sample of hospitalized patients in the targeted hospital (Al-Kindy Teaching Hospital, and Al-Yarmook Teaching Hospital). Moreover, this study highlights the reality of services for patients, especially in the targeted governmental teaching hospitals. The Patient Satisfaction with Nursing Care (PSNCS) has been measured in these hospitals through the revised scale by Tang et al, (2013).This scale includes four major domains; Health Information (5 items), Influencing Support (4 items), Decision Control (4 items), Specialized Technical Competence (7 items). The method of surveying patients’ opinions about the degree
... Show MoreThe nucleon momentum distributions (NMD) and elastic electron scattering form factors of the ground state for some 1f-2p-shell nuclei, such as 58Ni, 60Ni, 62Ni, and 64Ni
isotopes have been calculated in the framework of the coherent fluctuation model (CFM) and expressed in terms of the weight function lf(x)l2 . The weight function (fluctuation function) has been related to the nucleon density distribution (NDD) of the nuclei and determined from the theory and experiment. The NDD is derived from a simple method based on the use of the single particle wave functions of the harmonic oscillator potential and the occupation numbers of the states. The feature of the l
The study aims to achieve several objectives, including follow-up scientific developments and transformations in the modern concepts of the Holistic Manufacturing System for the purpose of identifying the methods of switching to the entrances of artificial intelligence, and clarifying the mechanism of operation of the genetic algorithm under the Holonic Manufacturing System, to benefit from the advantages of systems and to achieve the maximum savings in time and cost of machines Using the Holistic Manufacturing System method and the Genetic algorithm, which allows for optimal maintenance time and minimizing the total cost, which in turn enables the workers of these machines to control the vacations in th
... Show More