The technological development in the field of information and communication has been accompanied by the emergence of security challenges related to the transmission of information. Encryption is a good solution. An encryption process is one of the traditional methods to protect the plain text, by converting it into inarticulate form. Encryption implemented can be occurred by using some substitute techniques, shifting techniques, or mathematical operations. This paper proposed a method with two branches to encrypt text. The first branch is a new mathematical model to create and exchange keys, the proposed key exchange method is the development of Diffie-Hellman. It is a new mathematical operations model to exchange keys based on prime numbers and the possibility of using integer numbers. While the second branch of the proposal is the multi-key encryption algorithm. The current algorithm provides the ability to use more than two keys. Keys can be any kind of integer number (at least the last key is a prime number), not necessarily to be of the same length. The Encryption process is based on converting the text characters to suggested integer numbers, and these numbers are converted to other numbers by using a multilevel mathematical model many times (a multilevel process depending on the number of keys used), while the decryption process is a one-level process using just one key as the main key, while the other keys used as secondary keys. The messages are encoded before encryption (coded by ASCII or any suggested system). The algorithm can use an unlimited number of keys with a very large size (more than 7500 bytes), at least one of them a prime number. Exponentiation is also used for keys to increase complexity. The experiments proved the robustness of the key exchange protocol and the encryption algorithm in addition to the security. Comparing the suggested method with other methods ensures that the suggested method is more secure and flexible and easy to implement.
Abstract
The problem with the search at the reduction of adoption of new products, as there are three hypotheses of research have been formulated , the first one is no significant correlation between the religious and differences to customers and adopt new products, and This Study Aimed To Investigate The Relationship Between Religious differences for customers And New Products Adoption, Applied On Arab Mall Commercial Customers/ Egypt, an Analytical Model Is Developed As Guideline To Test The The Relationship Between Religious differences for customers And New Products Adoption, Aquantative Method With Deductive Approach Were Chosen In This Research . In Order To Collect Primary Data, A questionnaire Is
... Show MoreThis work includes two steps of synthesis, the first one is the synthesis of indole which was prepared according to literature of the reaction of phenyl hydrazine with acetaldehyde in glacial acetic acid afforded phenyl hydrazone of acetaldehyde , this product was fused with zinc chloride to give the indole.Reaction of cyclohexanone with phenyl hydrazine using the same procedure for the preparing giving 1,2,3,4-Tetrahydrocarbazole.Second step involved synthesis of a series of (17) of mannich bases derivatives of indole and 1,2,3,4-Tetrahydrocarbazle. Mannich reaction involves the condensation of aldehyde usually formaldehyde with different secondary amine and with compound containing an activated hydrogen.The reaction illustrated by the fo
... Show MoreBACKGROUND: Coronavirus current pandemic (COVID-19) is the striking subject worldwide hitting countries in an unexplained non-universal pattern. Bacillus Calmette–Guérin (BCG) vaccine was an adopted recent justification depending on its non-specific immune activation properties. Still the problem of post-vaccine short duration of protection needs to be solved. The same protective mechanism was identified in active or latent tuberculosis (TB). For each single patient of active TB, there are about nine cases of asymptomatic latent TB apparently normal individuals living within the community without restrictions carrying benefits of immune activation and involved in re-infection cycles in an excellent example of repeated immunity tr
... Show MoreThe research deals with an analytical approach between new media and traditional one in the light of the changes imposed by technology, which has been able to change a number of common concepts in the field of communication and media. The researcher tries to find an analytical explanation of the relationship between technology by being an influential factor in building the information society, which is the basis of new media, and the technical output that influenced the forms of social relations and linguistic construction as a human communication tool. The research deals with an analytical approach between new media and traditional one in the light of the changes imposed by technology, which has been able to change a number of comm
... Show MoreIn this paper, simulation studies and applications of the New Weibull-Inverse Lomax (NWIL) distribution were presented. In the simulation studies, different sample sizes ranging from 30, 50, 100, 200, 300, to 500 were considered. Also, 1,000 replications were considered for the experiment. NWIL is a fat tail distribution. Higher moments are not easily derived except with some approximations. However, the estimates have higher precisions with low variances. Finally, the usefulness of the NWIL distribution was illustrated by fitting two data sets
Advanced drug delivery systems offer undeniable benefits for drug delivery. In the past three decades, new methods have been proposed to develop a novel carriers for drug delivery. Nowadays, the major goal is to maximize therapeutic benefit while minimizing side effects. Drug delivery technique is clearly shifting from the micro to nanoscale. Nano-drug delivery systems (NDDSs) are the most promising approach utilized to improve the accuracy of drug delivery and the efficacy of drugs.In this narrative review article, we evaluate how delivery challenges associated with commercial marketed products and discuss newer DDS is being carried out to overcome these challenges .Different colloidal carrier systems such as carbon nanotube ,li
... Show MoreThis paper presents an approach to license plate localization and recognition. A proposed method is designed to control the opening of door gate based on the recognition of the license plates number in Iraq. In general the system consists of four stages; Image capturing, License plate cropping, character segmentation and character recognition. In the first stage, the vehicle photo is taken from standard camera placed on the door gate with a specific distance from the front of vehicle to be processed by our system. Then, the detection method searches for the matching of the license plate in the image with a standard plate. The segmentation stage is performed by is using edge detection. Then character recognition, done by comparing with templ
... Show Morethe main of this paper is to give a comprehensive presentation of estimating methods namely maximum likelihood bayes and proposed methods for the parameter